Skip to main content

Controlling Spam: Immunity-based Approach

  • Conference paper
Intelligent Information Processing and Web Mining

Part of the book series: Advances in Soft Computing ((AINSC,volume 35))

  • 599 Accesses

Abstract

Using electronic mail (e-mail) we can communicate freely and almost at no cost. It creates new possibilities for companies that can use e-mail to send advertisements to their clients (that is called direct-mailing). The term spam refers mostly to that kind of advertisements. Massively sent unsolicited e-mails attack many Internet users. Unfortunately, this kind of message can not be filtered out by simple rule-based filters. In this paper we will extend artificial immune system (AIS) proposed in [6] which is based on mammalian immune system and designed to protect users from spam. Generally AIS are also used to detect computer viruses or to detect anomalies in computer networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1. S. Augustyniak, Spam costs, anti-spam pays (in Polish), 2004

    Google Scholar 

  2. 2. L. N. de Castro, F. J. Von Zuben, Learning and Optimization Using the Clonal Selection Principle, IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems, 6 (3), pp. 239–251, 2002

    Google Scholar 

  3. 3. D. Dasgupta, F. Gonzales, An Immunity-based Technique to Characterize Intrusions in Computer Networks, IEEE Trans. on Evolutionary Computation, vol. 6, N3, June 2002, pp. 281–291

    Article  Google Scholar 

  4. 4. P. K. Harmer, P. D. Wiliams, G. H. Gunsch, G. B. Lamont, An Artificial Immune System Architecture for Computer Security Applications, IEEE Trans. on Evolutionary Computations Computation, vol. 6, N3, June 2002, pp. 252– 279

    Article  Google Scholar 

  5. 5. S. A. Hofmeyr, S. Forrest, Architecture for an Artificial immune system, IEEE Trans. on Evolutionary Computation, vol. 8, N4, June 2000, pp. 443–473

    Google Scholar 

  6. 6. T. Oda, T. White, Developing an Immunity to Spam, GECCO 2003, pp. 231– 242

    Google Scholar 

  7. 7. F. SeredyƄski, P. Bouvry, D. R. Rutkowski, Anomaly Detection System for Network Security: Immunity-based Approach, IIPWM 2005, pp. 486–490

    Google Scholar 

  8. 8. S. R. White, M. Swimmer, E. J. Pring, W. C. Arnold, D. M. Chess, J. F. Morar, Anatomy of a commercial-grade immune system. Technical report, IBM Thomas J. Watson Research Center, 2002

    Google Scholar 

  9. 9. S. T. WierzchoƄ, Artificial Immune Systems. Theory and Applications (in Polish), 2001

    Google Scholar 

  10. 10. http://nospam-pl.net

    Google Scholar 

  11. 11. http://spamassassin.apache.org/, spamassassin website

    Google Scholar 

  12. 12. http://www.mail-abuse.com

    Google Scholar 

  13. 13. http://www.nwlink.com/~jhanks/spam.html, spam addresses

    Google Scholar 

  14. 14. http://www.sv-cs.com/spam.html, spam words

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer

About this paper

Cite this paper

Kawecki, K., SeredyƄski, F., Pilski, M. (2006). Controlling Spam: Immunity-based Approach. In: KƂopotek, M.A., WierzchoƄ, S.T., Trojanowski, K. (eds) Intelligent Information Processing and Web Mining. Advances in Soft Computing, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-33521-8_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-33521-8_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33520-7

  • Online ISBN: 978-3-540-33521-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics