A Perception Model of Spam Risk Assessment Inspired by Danger Theory of Artificial Immune Systems

Abstract This present paper relates Danger Theory of Artificial Immune Systems, which has been introduced by Polly Matzinger in 1994 with the application in risk assessment. As to relate the concept of Danger Theory in risk assessment, a situation of determination severity level for detected Short Messaging Service (SMS) spam is applied. However, further testing is needed as to demonstrate the explained concept. Danger Model that based on the idea of the immune system is appear to be suitable as the fundamental principles and the most generic available solution as to assimilate its theory into the risk assessment environment especially that involve severe or hazardous impacts.

[1]  Julie Greensmith,et al.  Detecting Danger: The Dendritic Cell Algorithm , 2010, ArXiv.

[2]  M. Z. Jali,et al.  Integrated Mobile Spam Model Using Artificial Immune System Algorithms urul , 2014 .

[3]  Labiba Souici-Meslati,et al.  Immunological Approach for Intrusion Detection , 2014, ARIMA J..

[4]  Jinquan Zeng,et al.  Artificial immunity-based model for information system security risk evaluation , 2010, 2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT).

[5]  G. Pereira Artificial Immune System Algorithm based on Danger Theory , 2011 .

[6]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.

[7]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[8]  Colin Pattinson,et al.  AHP Implemented Security Assessment and Security Weight Verification , 2010, 2010 IEEE Second International Conference on Social Computing.

[9]  Bo Zhou,et al.  Information Security Risk Assessment Based on Artificial Immune Danger Theory , 2009, 2009 Fourth International Multi-Conference on Computing in the Global Information Technology.

[10]  Yu-Lun Huang,et al.  An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks , 2011, IEEE Transactions on Reliability.

[11]  Rongrong Fu,et al.  A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus , 2012, J. Networks.

[12]  Ronald S. Ross,et al.  Guide for Conducting Risk Assessments , 2012 .