Skip to main content

Advertisement

Log in

Genetic optimized artificial immune system in spam detection: a review and a model

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

Spam is a serious universal problem which causes problems for almost all computer users. This issue affects not only normal users of the internet, but also causes a big problem for companies and organizations since it costs a huge amount of money in lost productivity, wasting users’ time and network bandwidth. Many studies on spam indicate that spam cost organizations billions of dollars yearly. This work presents a machine learning method inspired by the human immune system called Artificial Immune System (AIS) which is a new emerging method that still needs further exploration. Core modifications were applied on the standard AIS with the aid of the Genetic Algorithm. Also an Artificial Neural Network for spam detection is applied with a new manner. SpamAssassin corpus is used in all our simulations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Abi-Haidar A, Rocha LM (2008) Adaptive spam detection inspired by the immune system. In: Bullock S, Noble J, Watson RA, Bedau MA (eds) Artificial life XI: Eleventh International Conference on the simulation and synthesis of living systems. MIT Press (in press)

  • Abu-Nimeh S, Nappa D, Wang X, Nair S (2007) A comparison of machine learning techniques for phishing detection. ACM, Pittsburgh

    Google Scholar 

  • Agrawal R, Bayardo RJ, Srikant R (2000) Athena:mining-based interactive management of text databases. In: Proceedings of 7th international conference on extending database technology (EDBT’00). Konstanz, Germany, pp 365–379

  • Alexandru C, Researcher C (2009) BitDefender Antispam NeuNet Whitepaper, BitDefender AntiSpam Laboratory, www.bitdefender.com. Accessed 15 Jan 2009

  • Androutsopoulos I, Koutsias J, Chandrinos K, Paliouras G, Spyropoulos C (2000a) An evaluation of naive Bayesian antispam filtering. In: Potamias G, Moustakis V, van Someren M (eds) Proceedings of the workshop on machine learning in the new information age, 11th European conference on machine learning (ECML 2000). Barcelona, Spain, pp 9–17

  • Androutsopoulos I, Paliouras G, Karkaletsis V, Sakkis G, Spyropoulos C, Stamatopoulos P (2000b) Learning to filter spam e-mail: a comparison of a naive Bayesian and a memorybased approach. In: Zaragoza H, Gallinari P, Rajman M (eds) Proceedings of the workshop on machine learning and textual information access, 4th European conference on principles and practice of knowledge discovery in databases (PKDD 2000), Lyon, France, pp 1–13

  • Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD (2000c) An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: Proceedings of SIGIR, 2000. Annual ACM conference on research and development in information retrieval proceedings of the 23rd annual international ACM SIGIR conference on research and development in information, pp 160–167, 2000. ISBN:1-58113-226-3

  • Androutsopoulos I, Koutsias J, Chandrinos KV, Paliouras G, Spyropoulos CD (2000d) An evaluation of Naive Bayesian antispam filtering. In: Proceedings of the workshop on machine learning in the new information age

  • Atkins S (2003) Size and cost of the problem. In: Proceedings of the fifty-sixth internet engineering task force (IETF) meeting. SpamCon Foundation

  • Bailey SP, Lieutenant, United States Navy B.S. (2006) Master Thesis, Illinois Institute of Technology, 1997 Submitted in partial fulfillment of the requirements for the degree of master of science in electrical engineering from the naval postgraduate school, neural network design on the src-6 reconfigurable computer

  • Balakrishnan K, Honavar V (2008) Evolutionary design of neural architectures, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.8973. Accessed 1 Jan 2008

  • Balthrop J, Forrest S, Glickman M (2002) Revisiting lisys: parameters and normal behavior. In: Proceedings of the congress on evolutionary computation, pp 1045–1050

  • Bart T, Binargrl S (2003) Learning spam: simple techniques for freely-available software. In: Proceedings of the Usenix annual technical conference, Freenix Track 2003, http://web.cecs.pdx.edu/~bart/papers/spam.pdf. Accessed 20 Jun 2008

  • Batista E (2001) A fight to Ban Cellphone Spam, WiredNews, 6 July 2000, available from http://www.wired.com/news/business/0,1283,37376,00.html; Spam a new nuisance for wireless users, USAToday, 13 April 2001. Accessed 10 Jan 2008

  • Bekker S (2003) Spam to Cost U.S. Companies $10 Billion in 2003, ENT News, viewed May 11 2005, http://www.entmag.com/news/article.asp?EditorialsID=5651. Accessed 10 Feb 2009

  • Boulevard A, Ramon S (2008) An introduction to neural networks a white paper visual numerics, Inc. December 2004 Visual Numerics, Inc. 12657, CA 94583 USA, www.vni.com. Accessed 10 Oct 2008

  • Bradley D, Tyrrell A (2000) Immunotronics: Hardware fault tolerance inspired by the immune system. In: Proceedings of the 3rd international conference on evoluable systems (ICES2000). Springer, Berlin, vol 1801, pp 11–20

  • Brutlag JD, Meek C (2000) Challenges of the E-mail domain for text classification. In: Proceedings of the 17th international conference on machine learning. Stanford University, USA, pp 103– 110

  • Burnet FM (1959) The clonal selection theory of acquired immunity. Cambridge University Press. http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=1522512. Accessed 10 Oct 2008

  • Burnet FM (1978) Clonal selection and after. In: Bell GI, Perelson AS, Pimbley GH (eds) Theoretical immunology. Marcel Dekker Inc., London, pp 63–85

    Google Scholar 

  • Cao Y, Dasgupta D (2003) An immunogenetic approach in chemical spectrum recognition. In: Dasgupta D, Dasgupta D (eds) Chap. 36 in the edited volume, Advances in Evolutionary Computing. Springer, Berlin

    Google Scholar 

  • Cardoso-Cachopo A, Oliveira A (2003) An empirical comparison of text categorisation methods. In: Nascimento MA, Moura ES, Oliveira AL (eds) Proceedings of conference on string processing and information retrieval. Springer, Berlin, pp 183–196

    Chapter  Google Scholar 

  • Carneiro J, Leon K, Caramalho Í, van den Dool C, Gardner R, Oliveira V, Bergman M, Sepúlveda N, Paixão T, Faro J et al (2007) When three is not a crowd: a cross regulation Model of the dynamics and repertoire selection of regulatory CD4 T cells. Immunol Rev 216(1): 48–68

    Google Scholar 

  • Carol MC, Prodeus AP (1998) Linkages of innate and adaptive immunity. Curr Opin Imm 10: 36–40

    Article  Google Scholar 

  • Carpinter J, Ray H (2006) Tightening the net: a review of current and next generation spam filtering tools. Department of Computer Science and Software Engineering, University of Canterbury, Christchurch, New Zealand Computers & Security 566–578, Journal homepage: www.elsevier.com/locate/cose , 25. Elsevier

  • Carreras X, Andm’Arquez L (2001) Boosting trees for antispam e-mail filtering. In: Proceedings of RANLP-2001, 4th international conference on recent advances in natural language processing. www.lsi.upc.edu/~carreras/pub/boospamev.ps. Accessed 15 Dec 2008

  • Chhabra S (2005) Master Thesis, “Fighting Spam, Phishing and E-mail Fraud”. A Thesis submitted in partial satisfaction of the requirements for the degree of Master of Science in Computer Science, University of California, Riverside

  • Chhabra S, Yerazunis WS, Siefkes C (2004) Spam filtering using a markov random field model with variable weighting schemas. In: Proceedings of the fourth IEEE international conference on data mining, pp 347–350

  • Christianini N, Shawe-Taylor J (2000) An introduction to support vector machines: and other kernel-based learning methods. Cambridge University Press, Cambridge. http://cambridge.org/uk/catalogue/catalogue.asp?isbn=9780521780193. Accessed 10 Jan 2009

  • Chuan Z, Xianliang L, Mengshu H, Xu Z (2004) A LVQ-based neural network anti-spam e-mail approach. College of Computer Science and Engineering of UEST of China, Chengdu, China 610054

  • Chuan Z, Xianliang L, Mengshu H, Xu Z (2005) A LVQ-based neural network anti-spam e-mail approach January ACM SIGOPS. Oper Syst Rev 39(1)

  • CipherTrust Inc (2004) Controlling Spam The IronMail® Way, http://wwwciphertrustcom/files/forms/landing_template.php?sp. Accessed Jan 2008

  • Çiltik A (2006) Master Thesis, Time efficient spam e-mail filtering for turkish. Submitted to the Institute for Graduate Studies in Science and Engineering in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering

  • Cohen WW (2008) Learning rules that classify e-mail. In: Proceedings of the 1996 AAAI spring symposium on machine learning in information access, California. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.51.4129. Accessed 20 Dec 2008

  • Colaco C (1998) Acquired wisdom in innate immunity. Imm Today 19(1):50, http://www.sciencedirect.com/science?. Accessed 10 Jan 2009

    Google Scholar 

  • Cook D (2006) Catching spam before it arrives: domain specific dynamic blacklists. In: Proceedings of the 2006 Australasian workshops on grid computing and e-research. ACM, Australian Computer Society, vol 54, pp 193–202. ISBN~ISSN:1445-1336, 1-920-68236-8

  • Cristiani N, Scholkopf B (2002) Support vector machines and kernel methods: the new generation of learning machines. AI Mag 23(3): 31–41

    Google Scholar 

  • Clark J (2000) PhD thesis, University of Sydney, Australia. E-mail classification: a hybrid approach combining genetic algorithm with neural networks

  • Clark J, Koprinska I, Poon J (2003) A neural network based approach to automated e-mail classification. Proc IEEE/WIC Int Conf 13(17): 702–705

    Google Scholar 

  • Dalvi N, Domingos P, Mausam, Sanghai Sumit, Verma Deepak (2004) Adversarial classification. In: KDD ’04: Proceedings of the 2004 ACM SIGKDD international conference on knowledge discovery and data mining. ACM Press, New York, pp 99–108

  • Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2004) An open digest-based technique for spam detection. In: Proceedings of the 2004 international workshop on security in parallel and distributed systems

  • Damiani E, Vimercati SDCD, Paraboschi S, Samarati (2004) An open digest-based technique for spam detection. Paper presented to the 2004 international workshop on security in parallel and distributed systems, San Francisco, CA

  • Dasgupta D (2006) University of Memphis, USA. IEEE Comput Intell Mag 1(4): 40–49

    Google Scholar 

  • Dasgupta D (1999) Immune-based intrusion detection system: a general framework. In: Proceedings of the 22nd national information systems security conference (NISSC), http://scholar.google.com/scholar?hl=ar&lr=&q=Immune-based+intrusion+detection+system%3A+A+general+framework. Accessed 10 Oct 2008

  • Dasgupta D, Forrest S (1996) Novelty detection in time series data using immunology. In: ISCA 5th international conference on intelligent systems, Reno, Nevada

  • Dasgupta D, KrishnaKumar K, Wong D, Berry M (2004) Negative selection algorithm for aircraft fault detection. In: The proceedings of the third international conference, ICARIS 2004 on artificial immune systems, Catania, Sicily, Italy

  • de Castro LN (2001) An introduction to the artificial immune systems, ICANNGA, 2001, Prague

  • de Castro LN (2003) Artificial immune system as novel soft computing paradigm. Soft Comput J 7(7)

  • de Castro LN, Von Zuben FJ (1999) Artificial immune Systems: part I—basic theory and applications, Technical Report TR—DCA 01/99

  • de Castro, Timmis J (2002) Artificial immune systems: a novel paradigm to pattern recognition. Computing Laboratory University of Kent at Canterbury Kent, Canterbury, UK, , Corchado JM, Alonso L, Fyfe C (eds) Artificial neural networks in pattern recognition, SOCO-2002. University of Paisley, UK, pp 67–84

    Google Scholar 

  • de Castro LN, Von Zuben FJ (2009) Technical report DCA-RT 02/00 February, 2000 artificial immune systems: part II. A survey of applications, http://scholar.google.com/scholar?hl=ar&lr=&q=Technical+Report+DCA-.pdf. Accessed 10 Jan 2009

  • De Castro LN, Timmis (2002) Artificial immune system, a new computational intelligence approach. Springer, Berlin, http://books.google.com/books?hl=. Accessed 10 Jan 2008

  • De Castro LN, Timmis (2002) Artificial immune system, a novel paradigm for pattern recognition, In: Alonso L, Corchado J, Fyfe C (eds) Artificial neural network in pattern recognition. University of Paisley, pp. 67–84

  • Deepak P, Parameswaran S (2005) Spam filtering using spam mail communities. In: Proceedings. The 2005 symposium on applications and the internet, pp 377–383

  • Delany SJ (2006) PhD Thesis. Using case-based reasoning for spam filtering. A thesis submitted to the Dublin Institute of Technology in fulfillment of the requirements for the degree of Doctor of Philosophy School of Computing, Dublin Institute of Technology

  • Dimmock N, Maddison I (2004) Peer-to-peer collaborative spam detection. ACM Student magazine, Issue 11.2, Spam, winter

  • Dorigo M (1992) Optimization, learning and natural algorithms. PhD thesis, DEI, Politecnico di Milano, Italia (in Italian)

  • Dorigo M (1999) Ant algorithms for discrete optimization. Artif Life Spring 5(2): 137–172

    Article  Google Scholar 

  • Drakeand CE, Oliver JJ, Koontz EJ (2004) Anatomy of a phishing E-mail. In: Proceedings of the first conference on E-mail and Anti-spam (CEAS)

  • Drewes R (2002) An artificial neural network spam classifier, Rich Drewes, viewed May 8 2005, http://www.interstice.com/drewes/cs676/spamnn/spam-nn.html. accessed 1 Jan 2009

  • Drucker H,Wu D, Vapnik VN (1999) Support vector machines for spam categorization. IEEE transactions on neural networks (FANO, R. 1961). Transmiss Inf 10(5):1048–1054, doi:10.1109/72.788645

    Google Scholar 

  • Drucker H, Wu D, Vapnik V (1999) Support vector machines for spam categorisation. IEEE Trans Neural Netw 10(5): 1048–1055

    Article  Google Scholar 

  • Dumais S, Platt J, Heckerman D, Sahami M (1998) Inductive learning algorithms and representations for text categorisation. In: Proceedings of ACM 7th international conference on information and knowledge management (CIKM 98). ACM Press, London, pp 148–155

  • Fearon DT, Locksley RM (1996) The instructive role of innate immunity in the acquired immune response. Science 272: 50–53

    Article  Google Scholar 

  • Forrest S, Hofmeyr S, Somayaji A (1997) Computer immunology. Commun ACM 40(10): 88–96

    Article  Google Scholar 

  • Garrett SM (2005) Computational biology group. How do we evaluate artificial immune systems? By the Massachusetts Institute of Technology Evolutionary Computation. Department of Computer Science, University of Wales, Aberystwyth, Wales, vol 13(2), pp 145–178

  • Gauthronet S, Drouard E (2001) Unsolicited commercial communications and data protection, Commission of the European Communities. http://books.google.jo/books?id=_H9sBl9eN5sC&pg. Accessed 20 Dec 2008

  • Gee K (2003) Using latent semantic indexing to filter spam, SAC 2003, Florida, USA. In: Proceedings of the 2003 ACM symposium on applied computing, pp 460–464, 2003. ISBN: 1-58113-624-2

  • Goodman J, Cormack GV, Heckerman D (2007) Spam and the Ongoing Battle. Commun ACM 50(2)

  • Graham (2003) Better Bayesian filtering. Paper presented to 2003 spam conference, vol 167. In: Proceedings of the 2006 Australasian workshops on Grid computing and e-research. ACM international conference proceeding series, vol 54, pp 193–202

  • Graham P (2009) A plan for spam by, http://www.paulgraham.com/spam.html. Accessed 2 Jan 2009

  • Graham-Cumming J (2005) People and spam. In: MIT spam conference, 2005. http://www.jgc.org/pdf/spamconf2005.pdf. Accessed 1 Jan 2009

  • Gulyás C (2006) Master Thesis. Creation of a Bayesian network-based meta spam filter, using the analysis of different spam filters, Budapest, 16th May 2006

  • Hagan MT, Demuth HB, Beale MH (2002) Neural network design. University of Colorado at Boulder, Boulder

    Google Scholar 

  • Hawley AE (1997) Taking spam out of your cyberspace diet: common law applied to bulk unsolicited advertising via electronic mail. Univ Missouri Kansas City Law Rev 66: 381–423

    Google Scholar 

  • Hershkop S (2006) PhD Thesis. Partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences, Columbia University, Behavior-based e-mail analysis with application to spam detection (submitted)

  • Hofmeyr SA, Forrest S (2000) Architecture for an artificial immune system. Evolut Comput 8(4): 443–473

    Article  Google Scholar 

  • Hulten G, Goodman J, Rounthwaite R (2004) Filtering spam e-mail on a global scale’. In: Proceedings of the 13th international world wide web conference on alternate track papers \ posters. ACM Press, New York, pp 366–367

  • Itskevitch J (2001) Master Thesis. A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Computing Science, Simon Fraser University, Automatic hierarchical e-mail classification using association rules

  • Janeway CA Jr (1992) The immune system evolved to discriminate infectious nonself from noninfectious self. Imm. Today 13(1): 11–16

    Article  Google Scholar 

  • Janeway CA Jr (1993) How the immune system recognizes invaders. Scientif Am 269(3): 41–47

    Google Scholar 

  • Janeway CA Jr, Travers P (1997) Immunobiology the immune system in health and disease. Artes Médicas (in Portuguese), 2nd edn

  • Joachims T (1998) Text categorization with support vector machines: learning with many relevant features. In: Nedellec C, Rouveirol C (eds) Proceedings of ECML-98, 10th European conference on machine learning, number 1398 in LNCS. Springer, Heidelberg, pp 137–142

    Google Scholar 

  • Joachims T (2001) A statistical learning model of text classification with support vector machines. In: Proceedings of the 24thACMinternational conference on research and development in information retrieval. ACM Press, London, pp 128–136

    Google Scholar 

  • Khong W-K (2001) Master Thesis. The law and economics of junk e-mails (spam). Thesis submitted to the Erasemus Programme In Law And Economics In Partial Fulfilment of the Degree of European Master In Law And Economics

  • Khorsi A (2007) An overview of content-based spam filtering techniques. Informatica 31: 269–277

    MATH  Google Scholar 

  • Kim J, Bentley P (2002) Toward an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Proceedings of the 2002 congress on evolutionary computation (CEC 2002), Honolulu, pp 1244–1252

  • Kim J, Wilson WO (2005) Uwe Aickelin, and Julie McLeod. Cooperative Automated Worm Response and Detection Immune ALgorithm (CARDINAL) Inspired by T-cell Immunity and Tolerance. In the proceedings of the fourth international conference, ICARIS 2005 on Artificial Immune Systems, Banff, Alberta, pp 168–181

  • Kolcz A, Alspector J (2001) Svm-based filtering of e-mail spam with content-specific misclassification costs. In: Proceedings of the TextDM’01 workshop on text mining—held at the 2001 IEEE international conference on data mining, TextDM’2001 (IEEE ICDM-2001 workshop on text mining), IEEE, pp 123–130

  • Krishnakumar K, Neidhoefer J (1999) Immunized adaptive critic for an autonomous aircraft control application. In: Artificial immune systems and their applications, Chap. 20. Springer, Berlin, pp 221–240

    Google Scholar 

  • Livingston B (2001) Inside the spammer’s world. http://news.com.com/2010-1071-281499.html. Accessed 15 Jan 2009

  • Liu X-b, Zhang N (2006) Incremental immune-inspired clustering approach to behavior-based anti-spam technology. Int J Inf Technol 12(3)

  • María J, Cajigas G, Puertas E (2006) Content based SMS spam filtering, DocEng’06, October 10–13. ACM, Amsterdam, 1-59593-515-0/06/0010

  • María J, Cajigas G, Puertas E (2006) Content based SMS spam filtering, DocEng’06, October 10–13, 2006. ACM, Amsterdam, 1-59593-515-0/06/0010

  • Medlock B (2003) Master Thesis, A Generative, Adaptive Language model Approach to spam filtering. Thesis Submitted in part fulfillment of the University of Cambridge MPhil degree in computer speech, text and internet technology

  • Medzhitov R, Janeway CA Jr (1997) Innate immunity: impact on the adaptive immune response. Curr Opin Imm 9: 4–9

    Article  Google Scholar 

  • Medzhitov R, Janeway CA Jr (1997) Innate immunity: the virtues of a nonclonal system of recognition. Cell 91: 295–298

    Article  Google Scholar 

  • Medzhitov R, Janeway CA Jr (1998) Innate immune recognition and control of adaptive immune responses. Semin Imm 10: 351–353

    Article  Google Scholar 

  • Messaging Anti-Abuse Working Group (2006) MAAWG E-mail metrics Program, First Quarter 2006 Reports. www.maawg.org/about/FINAL_1Q2006_Metrics_Report.pdf. Accessed 10 Jan 2009

  • Mitchell T (1997) Machine learning. Commun ACM 42(11): 30–36 ISSN: 0001-0782, 1999

    Article  Google Scholar 

  • Millerk C (2009) Group product manager, enterprise e-mail security, neural network-based antispam heuristics, http://neuro.bstu.by/our/antispam.pdf. Accessed 10 Jan 2009

  • Miller C (2008) Group product manager, enterprise e-mail security, neural network-based antispam heuristics, http://wwwciphertrustcom/files/forms/landing_template.php?sp. Accessed 10 Jan 2008

  • Neal M (2003) Meta-stable memory in an artificial immune network. In: The proceedings of second international conference on artificial immune systems (ICARIS). Napier University, Edinburgh

    Google Scholar 

  • O’Brien C, Vogel C (2003) Spam filters: bayes vs. chi-squared; letters vs. words. In: ISICT ’03: Proceedings of the 1st international symposium on information and communication technologies. Trinity College, Dublin, pp 291–296

  • Oda T (2003) Tony White, increasing the accuracy of a spam-detection immune system. In: Proceedings of the congress on evolutionary computation (CEC 2003), Canberra, Australia. Proceedings, vol 1, pp 390–396, http://terri.zone12.com/doc/academic/spam_cec2003.pdf. Accessed 1 Feb 2008

  • Oda T, White T (2003) Developing an immunity to spam, Genetic and evolutionary computation conference, Chicago, IL. In: Proceedings, part I series: lecture notes in computer science, vol 2723, pp 231–242. Springer, Berlin

  • Oda T, White T (2005) Immunity from spam: an analysis of an artificial immune system for junk e-mail detection. In: Proceedings of artificial immune systems: 4th international conference, ICARIS, Banff, AB, Canada, August 14–17, 2005. Lecture notes in computer science 3627. Springer, Berlin, pp 276–289

  • Ozgur L, Gungor T, Gurgen F (2004) Adaptive anti-spam filtering for agglutinative languages: a special case for Turkish, http://www.cmpe.boun.edu.tr/~gungort/papers/Adaptive%20Anti-Spam.pdf. Accessed 10 Oct 2008

  • Pantel P, Lin D (1998) Spamcop: a spam classification & organization program. In: Learning for text categorization: Papers from the 1998 Workshop. AAAI Technical Report WS-98-05, Madison, WI

  • Parish CR, O’Neill ER (1997) Dependence of the adaptive immune response on innate immunity: some questions answered but new paradoxes emerge. Imm Cell Biol 75: 523–527

    Article  Google Scholar 

  • Pascucci A (2006) Toward a PhD Thesis on Pattern Recognition http://www.dis.uniroma1.it/~dottorato/db/relazioni/relaz_pascucci_1.pdf. Accessed 10 Jan 2009

  • Pelletier L, Almhana J, Choulakian V (2004) Adaptive filtering of spam. In: Proceedings. Second annual conference on communication networks and services research, pp 218–224

  • Pogula Sridhar S (2005) Master Thesis developing neural network applications using labview, A thesis presented to the faculty of the Graduate School University of Missouri-Columbia. In Partial Fulfillment Of the Requirements for the Degree Master of Science, Dr. Robert W. McLaren, Thesis Supervisor

  • Postel J (1975) RFC706: on the junk mail problem. Technical report, Network Working Group, http://www.faqs.org/rfcs/rfc706.html. Accessed 20 Feb 2008

  • Puniškis D, Laurutis R, Dirmeikis R (2006) An artificial neural nets for spam e-mail recognition. Electron Electric Eng 5(69):1392–1215. http://www.ee.ktu.lt/journal/2006/5/1392-1215-2006-05-02-73.pdf. Accessed 10 April 2008

    Google Scholar 

  • Puniškis D, Laurutis R, Dirmeikis R (2008) An artificial neural nets for spam e-mail recognition, 2006, http://www.ee.ktu.lt/journal/2006/5/1392-1215-2006-05-02-73.pdf. Accessed 10 Jan 2008

  • Saarinen J (2003) Spammers hit below men’s belts. http://www.nzherald.co.nz/storydisplay.cfm?storyID=3518097. Accessed 20 Feb 2009

  • Sahami M, Dumais S, Heckerman D, Horvitz E (1998) A Bayesian approach to filtering junk e-mail. In learning for text categorization: Papers from the 1998Workshop. AAAI Technical Report WS-98-05, Madison, WI. http://www.aaai.org/Library/Workshops/1998/ws98-05-009.php. Accessed 1 Dec 2008

  • Sarafijanovic S, Le Boudec J-Y (2007) Artificial immune system for collaborative spam filtering, EPFL, Switzerland, Technical Report LCA-REPORT-2007-008, EPFL

  • Scavenger (2003) Master Thesis. A junk mail classification program. A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science, Department of Computer Science and Engineering, College of Engineering, University of South Florida, January 20, 2003

  • Schneider K (2003) A comparison of event models for naive bayes antispam e-mail filtering. In: Proceedings of the 11th conference of the European chapter of the association for computational linguistics (EACL’03) http://scholar.google.com/scholar?hl=ar&lr=&q=Schneider.+K.+2003.+A+comparison+of+event+models+for+naive+bayes+antispam+e-mail+filtering. Accessed 20 Nov 2008

  • Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34(1): 1–47

    Article  Google Scholar 

  • Secker A, Freitas AA, Timmis J (2003) Computing Laboratory University of Kent AISEC. An artificial immune system for e-mail classification, vol 1, pp 131–138, ISSN: ISBN: 0-7803-7804-0

  • Simon H (1983) Why should machines learn? An artificial intelligence approach. Mach Learn 1:392–399, http://books.google.com/books?hl=ar&lr=&id. Accessed 1 Jan 2009

    Google Scholar 

  • Soonthornphisaj N, Chaikulseriwat K, Tang-On P (2002) Anti-spam filtering: a centroid-based classification approach. In: 2002 6th International conference on signal processing, vol 2, pp 1096–1099, 26–30 Aug. 2002

  • Stuart I, Cha S-H, Tappert C (2004) A neural network classifier for junk e-mail. In: Proceedings of student/faculty research Day, CSIS, Pace University

  • Timmis J, Knight T, De Castro LN, Hart E (2004) An overview of artificial immune systems. In: Paton R, Bolouri H, Holcombe M, Parish JH, Tateson R (eds) Computation in cells and tissues: perspectives and tools for thought. Natural computation series. Springer, Berlin, pp 51–86

  • Timmis J, Neal M, Hunt J (1999) An artificial immune system for data analysis. In: The proceedings of the international workshop on intelligent processing in cells and tissues (IPCAT)

  • Timmis J, Neal M, Knight T (2002) AINE: machine learning inspired by the immune system. IEEE Trans Evolut Comput 1(4): 40–49

    Google Scholar 

  • Tonegawa S (1983) Somatic generation of antibody diversity. Nature 302: 575–581

    Article  Google Scholar 

  • Tretyakov K (2004) Machine learning techniques in spam filtering. Institute of Computer Science, University of Tartu, Data mining problem-oriented Seminar, MTAT.03.177, pp 60–79

  • Vapnik V (1999) The nature of statistical learning theory. Statistics for engineering and information science, 2nd edn. Springer, New York (Originally published as a monograph 2nd ed., 2000, XIX, 314 p. 48 illus., Hardcover ISBN: 978-0-387-98780-4, 2000)

  • Vinther M (2002) Intelligent junk mail detection using neural networks, http://www.logicnet.dk/reports/JunkDetection/JunkDetection.htm. Accessed 10 Jun 2008

  • Weinberg GR (2005) Master Thesis. To the engineering systems division in partial fulfillment of the requirements for the Degree of Master of Science in Technology And Policyat The Massachusetts Institute of Technology. A system analysis of the spam problem, Massachusetts Institute Of Technology (submitted)

  • Whitley D (2009) Genetic algorithms and neural networks. Genetic Algorithms Eng Comput Sci, http://scholar.google.com/scholar?hl=ar&lr=&q=Genetic+Algorithms+and+Neural+Networks.+Genetic+Algorithms+in+Engineering+and+Computer+Science. Accessed 10 Jan 2009

  • Wiehes A (2005) Master Thesis, Comparing anti spam methods, Master of Science in Information Security, Department of Computer Science and Media Technology, Gjøvik University College

  • Yao X (1999) Evolving artificial neural networks. Proc IEEE 87(9):1423–1447

    Google Scholar 

  • Yoshida K, Adachi F, Washio T, Motoda H, Homma T, Nakashima A, Fujikawa H, Yamazaki K (2004) Density-based spam detector. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining. ACM Press, Seattle, pp 486–93

  • Yue X, Abraham A, Chi Z-X, Hao Y-Y, Mo H (2006) Artificial immune system inspired behavior-based anti-spam filter. Springer, Berlin, vol 11(8)

  • Zhang I, Yao T (2003) Filtering junk mail with a maximum entropy model. In: Proceedings of 20th international conference on computer processing of oriental languages (ICCPOL03), pp 446–453. Received January 2004; revised August 2004; accepted August 2004. ACM Transactions on Asian language information processing, vol 3, No. 4, Dec. 2004

  • Zhang L, Zhu J, Yao T (2004) Natural Language Processing Laboratory, Institute of Computer Software & Theory Northeastern University, An Evaluation of Statistical Spam Filtering Techniques. ACM Trans Asian Language Inf Process 3(4): 243–269

    Article  Google Scholar 

  • Zhang L, Zhu J, Yao T (2004) An evaluation of statistical spam filtering techniques. ACM Trans Asian Language Inf Process (TALIP) 3(4): 243–269

    Article  Google Scholar 

  • Zhan C, Xianliang L, Mengshu H, Xu Z (2005) A lvq-based neural network anti-spam e-mail approach. SIGOPS Oper Syst Rev 39(1): 34–39

    Article  Google Scholar 

  • Zhou D, Burges CJC, Tao T (2007) Transductive link spam detection. Microsoft research one microsoft way Redmond, WA 98052. ACM, AIRWeb ’07, Banff, Alberta 978-1-59593-732-2

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raed Abu Zitar.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zitar, R.A., Hamdan, A. Genetic optimized artificial immune system in spam detection: a review and a model. Artif Intell Rev 40, 305–377 (2013). https://doi.org/10.1007/s10462-011-9285-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-011-9285-z

Keywords

Navigation