Abstract
Spam is a serious universal problem which causes problems for almost all computer users. This issue affects not only normal users of the internet, but also causes a big problem for companies and organizations since it costs a huge amount of money in lost productivity, wasting users’ time and network bandwidth. Many studies on spam indicate that spam cost organizations billions of dollars yearly. This work presents a machine learning method inspired by the human immune system called Artificial Immune System (AIS) which is a new emerging method that still needs further exploration. Core modifications were applied on the standard AIS with the aid of the Genetic Algorithm. Also an Artificial Neural Network for spam detection is applied with a new manner. SpamAssassin corpus is used in all our simulations.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Abi-Haidar A, Rocha LM (2008) Adaptive spam detection inspired by the immune system. In: Bullock S, Noble J, Watson RA, Bedau MA (eds) Artificial life XI: Eleventh International Conference on the simulation and synthesis of living systems. MIT Press (in press)
Abu-Nimeh S, Nappa D, Wang X, Nair S (2007) A comparison of machine learning techniques for phishing detection. ACM, Pittsburgh
Agrawal R, Bayardo RJ, Srikant R (2000) Athena:mining-based interactive management of text databases. In: Proceedings of 7th international conference on extending database technology (EDBT’00). Konstanz, Germany, pp 365–379
Alexandru C, Researcher C (2009) BitDefender Antispam NeuNet Whitepaper, BitDefender AntiSpam Laboratory, www.bitdefender.com. Accessed 15 Jan 2009
Androutsopoulos I, Koutsias J, Chandrinos K, Paliouras G, Spyropoulos C (2000a) An evaluation of naive Bayesian antispam filtering. In: Potamias G, Moustakis V, van Someren M (eds) Proceedings of the workshop on machine learning in the new information age, 11th European conference on machine learning (ECML 2000). Barcelona, Spain, pp 9–17
Androutsopoulos I, Paliouras G, Karkaletsis V, Sakkis G, Spyropoulos C, Stamatopoulos P (2000b) Learning to filter spam e-mail: a comparison of a naive Bayesian and a memorybased approach. In: Zaragoza H, Gallinari P, Rajman M (eds) Proceedings of the workshop on machine learning and textual information access, 4th European conference on principles and practice of knowledge discovery in databases (PKDD 2000), Lyon, France, pp 1–13
Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD (2000c) An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: Proceedings of SIGIR, 2000. Annual ACM conference on research and development in information retrieval proceedings of the 23rd annual international ACM SIGIR conference on research and development in information, pp 160–167, 2000. ISBN:1-58113-226-3
Androutsopoulos I, Koutsias J, Chandrinos KV, Paliouras G, Spyropoulos CD (2000d) An evaluation of Naive Bayesian antispam filtering. In: Proceedings of the workshop on machine learning in the new information age
Atkins S (2003) Size and cost of the problem. In: Proceedings of the fifty-sixth internet engineering task force (IETF) meeting. SpamCon Foundation
Bailey SP, Lieutenant, United States Navy B.S. (2006) Master Thesis, Illinois Institute of Technology, 1997 Submitted in partial fulfillment of the requirements for the degree of master of science in electrical engineering from the naval postgraduate school, neural network design on the src-6 reconfigurable computer
Balakrishnan K, Honavar V (2008) Evolutionary design of neural architectures, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.8973. Accessed 1 Jan 2008
Balthrop J, Forrest S, Glickman M (2002) Revisiting lisys: parameters and normal behavior. In: Proceedings of the congress on evolutionary computation, pp 1045–1050
Bart T, Binargrl S (2003) Learning spam: simple techniques for freely-available software. In: Proceedings of the Usenix annual technical conference, Freenix Track 2003, http://web.cecs.pdx.edu/~bart/papers/spam.pdf. Accessed 20 Jun 2008
Batista E (2001) A fight to Ban Cellphone Spam, WiredNews, 6 July 2000, available from http://www.wired.com/news/business/0,1283,37376,00.html; Spam a new nuisance for wireless users, USAToday, 13 April 2001. Accessed 10 Jan 2008
Bekker S (2003) Spam to Cost U.S. Companies $10 Billion in 2003, ENT News, viewed May 11 2005, http://www.entmag.com/news/article.asp?EditorialsID=5651. Accessed 10 Feb 2009
Boulevard A, Ramon S (2008) An introduction to neural networks a white paper visual numerics, Inc. December 2004 Visual Numerics, Inc. 12657, CA 94583 USA, www.vni.com. Accessed 10 Oct 2008
Bradley D, Tyrrell A (2000) Immunotronics: Hardware fault tolerance inspired by the immune system. In: Proceedings of the 3rd international conference on evoluable systems (ICES2000). Springer, Berlin, vol 1801, pp 11–20
Brutlag JD, Meek C (2000) Challenges of the E-mail domain for text classification. In: Proceedings of the 17th international conference on machine learning. Stanford University, USA, pp 103– 110
Burnet FM (1959) The clonal selection theory of acquired immunity. Cambridge University Press. http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=1522512. Accessed 10 Oct 2008
Burnet FM (1978) Clonal selection and after. In: Bell GI, Perelson AS, Pimbley GH (eds) Theoretical immunology. Marcel Dekker Inc., London, pp 63–85
Cao Y, Dasgupta D (2003) An immunogenetic approach in chemical spectrum recognition. In: Dasgupta D, Dasgupta D (eds) Chap. 36 in the edited volume, Advances in Evolutionary Computing. Springer, Berlin
Cardoso-Cachopo A, Oliveira A (2003) An empirical comparison of text categorisation methods. In: Nascimento MA, Moura ES, Oliveira AL (eds) Proceedings of conference on string processing and information retrieval. Springer, Berlin, pp 183–196
Carneiro J, Leon K, Caramalho Í, van den Dool C, Gardner R, Oliveira V, Bergman M, Sepúlveda N, Paixão T, Faro J et al (2007) When three is not a crowd: a cross regulation Model of the dynamics and repertoire selection of regulatory CD4 T cells. Immunol Rev 216(1): 48–68
Carol MC, Prodeus AP (1998) Linkages of innate and adaptive immunity. Curr Opin Imm 10: 36–40
Carpinter J, Ray H (2006) Tightening the net: a review of current and next generation spam filtering tools. Department of Computer Science and Software Engineering, University of Canterbury, Christchurch, New Zealand Computers & Security 566–578, Journal homepage: www.elsevier.com/locate/cose , 25. Elsevier
Carreras X, Andm’Arquez L (2001) Boosting trees for antispam e-mail filtering. In: Proceedings of RANLP-2001, 4th international conference on recent advances in natural language processing. www.lsi.upc.edu/~carreras/pub/boospamev.ps. Accessed 15 Dec 2008
Chhabra S (2005) Master Thesis, “Fighting Spam, Phishing and E-mail Fraud”. A Thesis submitted in partial satisfaction of the requirements for the degree of Master of Science in Computer Science, University of California, Riverside
Chhabra S, Yerazunis WS, Siefkes C (2004) Spam filtering using a markov random field model with variable weighting schemas. In: Proceedings of the fourth IEEE international conference on data mining, pp 347–350
Christianini N, Shawe-Taylor J (2000) An introduction to support vector machines: and other kernel-based learning methods. Cambridge University Press, Cambridge. http://cambridge.org/uk/catalogue/catalogue.asp?isbn=9780521780193. Accessed 10 Jan 2009
Chuan Z, Xianliang L, Mengshu H, Xu Z (2004) A LVQ-based neural network anti-spam e-mail approach. College of Computer Science and Engineering of UEST of China, Chengdu, China 610054
Chuan Z, Xianliang L, Mengshu H, Xu Z (2005) A LVQ-based neural network anti-spam e-mail approach January ACM SIGOPS. Oper Syst Rev 39(1)
CipherTrust Inc (2004) Controlling Spam The IronMail® Way, http://wwwciphertrustcom/files/forms/landing_template.php?sp. Accessed Jan 2008
Çiltik A (2006) Master Thesis, Time efficient spam e-mail filtering for turkish. Submitted to the Institute for Graduate Studies in Science and Engineering in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering
Cohen WW (2008) Learning rules that classify e-mail. In: Proceedings of the 1996 AAAI spring symposium on machine learning in information access, California. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.51.4129. Accessed 20 Dec 2008
Colaco C (1998) Acquired wisdom in innate immunity. Imm Today 19(1):50, http://www.sciencedirect.com/science?. Accessed 10 Jan 2009
Cook D (2006) Catching spam before it arrives: domain specific dynamic blacklists. In: Proceedings of the 2006 Australasian workshops on grid computing and e-research. ACM, Australian Computer Society, vol 54, pp 193–202. ISBN~ISSN:1445-1336, 1-920-68236-8
Cristiani N, Scholkopf B (2002) Support vector machines and kernel methods: the new generation of learning machines. AI Mag 23(3): 31–41
Clark J (2000) PhD thesis, University of Sydney, Australia. E-mail classification: a hybrid approach combining genetic algorithm with neural networks
Clark J, Koprinska I, Poon J (2003) A neural network based approach to automated e-mail classification. Proc IEEE/WIC Int Conf 13(17): 702–705
Dalvi N, Domingos P, Mausam, Sanghai Sumit, Verma Deepak (2004) Adversarial classification. In: KDD ’04: Proceedings of the 2004 ACM SIGKDD international conference on knowledge discovery and data mining. ACM Press, New York, pp 99–108
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2004) An open digest-based technique for spam detection. In: Proceedings of the 2004 international workshop on security in parallel and distributed systems
Damiani E, Vimercati SDCD, Paraboschi S, Samarati (2004) An open digest-based technique for spam detection. Paper presented to the 2004 international workshop on security in parallel and distributed systems, San Francisco, CA
Dasgupta D (2006) University of Memphis, USA. IEEE Comput Intell Mag 1(4): 40–49
Dasgupta D (1999) Immune-based intrusion detection system: a general framework. In: Proceedings of the 22nd national information systems security conference (NISSC), http://scholar.google.com/scholar?hl=ar&lr=&q=Immune-based+intrusion+detection+system%3A+A+general+framework. Accessed 10 Oct 2008
Dasgupta D, Forrest S (1996) Novelty detection in time series data using immunology. In: ISCA 5th international conference on intelligent systems, Reno, Nevada
Dasgupta D, KrishnaKumar K, Wong D, Berry M (2004) Negative selection algorithm for aircraft fault detection. In: The proceedings of the third international conference, ICARIS 2004 on artificial immune systems, Catania, Sicily, Italy
de Castro LN (2001) An introduction to the artificial immune systems, ICANNGA, 2001, Prague
de Castro LN (2003) Artificial immune system as novel soft computing paradigm. Soft Comput J 7(7)
de Castro LN, Von Zuben FJ (1999) Artificial immune Systems: part I—basic theory and applications, Technical Report TR—DCA 01/99
de Castro, Timmis J (2002) Artificial immune systems: a novel paradigm to pattern recognition. Computing Laboratory University of Kent at Canterbury Kent, Canterbury, UK, , Corchado JM, Alonso L, Fyfe C (eds) Artificial neural networks in pattern recognition, SOCO-2002. University of Paisley, UK, pp 67–84
de Castro LN, Von Zuben FJ (2009) Technical report DCA-RT 02/00 February, 2000 artificial immune systems: part II. A survey of applications, http://scholar.google.com/scholar?hl=ar&lr=&q=Technical+Report+DCA-.pdf. Accessed 10 Jan 2009
De Castro LN, Timmis (2002) Artificial immune system, a new computational intelligence approach. Springer, Berlin, http://books.google.com/books?hl=. Accessed 10 Jan 2008
De Castro LN, Timmis (2002) Artificial immune system, a novel paradigm for pattern recognition, In: Alonso L, Corchado J, Fyfe C (eds) Artificial neural network in pattern recognition. University of Paisley, pp. 67–84
Deepak P, Parameswaran S (2005) Spam filtering using spam mail communities. In: Proceedings. The 2005 symposium on applications and the internet, pp 377–383
Delany SJ (2006) PhD Thesis. Using case-based reasoning for spam filtering. A thesis submitted to the Dublin Institute of Technology in fulfillment of the requirements for the degree of Doctor of Philosophy School of Computing, Dublin Institute of Technology
Dimmock N, Maddison I (2004) Peer-to-peer collaborative spam detection. ACM Student magazine, Issue 11.2, Spam, winter
Dorigo M (1992) Optimization, learning and natural algorithms. PhD thesis, DEI, Politecnico di Milano, Italia (in Italian)
Dorigo M (1999) Ant algorithms for discrete optimization. Artif Life Spring 5(2): 137–172
Drakeand CE, Oliver JJ, Koontz EJ (2004) Anatomy of a phishing E-mail. In: Proceedings of the first conference on E-mail and Anti-spam (CEAS)
Drewes R (2002) An artificial neural network spam classifier, Rich Drewes, viewed May 8 2005, http://www.interstice.com/drewes/cs676/spamnn/spam-nn.html. accessed 1 Jan 2009
Drucker H,Wu D, Vapnik VN (1999) Support vector machines for spam categorization. IEEE transactions on neural networks (FANO, R. 1961). Transmiss Inf 10(5):1048–1054, doi:10.1109/72.788645
Drucker H, Wu D, Vapnik V (1999) Support vector machines for spam categorisation. IEEE Trans Neural Netw 10(5): 1048–1055
Dumais S, Platt J, Heckerman D, Sahami M (1998) Inductive learning algorithms and representations for text categorisation. In: Proceedings of ACM 7th international conference on information and knowledge management (CIKM 98). ACM Press, London, pp 148–155
Fearon DT, Locksley RM (1996) The instructive role of innate immunity in the acquired immune response. Science 272: 50–53
Forrest S, Hofmeyr S, Somayaji A (1997) Computer immunology. Commun ACM 40(10): 88–96
Garrett SM (2005) Computational biology group. How do we evaluate artificial immune systems? By the Massachusetts Institute of Technology Evolutionary Computation. Department of Computer Science, University of Wales, Aberystwyth, Wales, vol 13(2), pp 145–178
Gauthronet S, Drouard E (2001) Unsolicited commercial communications and data protection, Commission of the European Communities. http://books.google.jo/books?id=_H9sBl9eN5sC&pg. Accessed 20 Dec 2008
Gee K (2003) Using latent semantic indexing to filter spam, SAC 2003, Florida, USA. In: Proceedings of the 2003 ACM symposium on applied computing, pp 460–464, 2003. ISBN: 1-58113-624-2
Goodman J, Cormack GV, Heckerman D (2007) Spam and the Ongoing Battle. Commun ACM 50(2)
Graham (2003) Better Bayesian filtering. Paper presented to 2003 spam conference, vol 167. In: Proceedings of the 2006 Australasian workshops on Grid computing and e-research. ACM international conference proceeding series, vol 54, pp 193–202
Graham P (2009) A plan for spam by, http://www.paulgraham.com/spam.html. Accessed 2 Jan 2009
Graham-Cumming J (2005) People and spam. In: MIT spam conference, 2005. http://www.jgc.org/pdf/spamconf2005.pdf. Accessed 1 Jan 2009
Gulyás C (2006) Master Thesis. Creation of a Bayesian network-based meta spam filter, using the analysis of different spam filters, Budapest, 16th May 2006
Hagan MT, Demuth HB, Beale MH (2002) Neural network design. University of Colorado at Boulder, Boulder
Hawley AE (1997) Taking spam out of your cyberspace diet: common law applied to bulk unsolicited advertising via electronic mail. Univ Missouri Kansas City Law Rev 66: 381–423
Hershkop S (2006) PhD Thesis. Partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences, Columbia University, Behavior-based e-mail analysis with application to spam detection (submitted)
Hofmeyr SA, Forrest S (2000) Architecture for an artificial immune system. Evolut Comput 8(4): 443–473
Hulten G, Goodman J, Rounthwaite R (2004) Filtering spam e-mail on a global scale’. In: Proceedings of the 13th international world wide web conference on alternate track papers \ posters. ACM Press, New York, pp 366–367
Itskevitch J (2001) Master Thesis. A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Computing Science, Simon Fraser University, Automatic hierarchical e-mail classification using association rules
Janeway CA Jr (1992) The immune system evolved to discriminate infectious nonself from noninfectious self. Imm. Today 13(1): 11–16
Janeway CA Jr (1993) How the immune system recognizes invaders. Scientif Am 269(3): 41–47
Janeway CA Jr, Travers P (1997) Immunobiology the immune system in health and disease. Artes Médicas (in Portuguese), 2nd edn
Joachims T (1998) Text categorization with support vector machines: learning with many relevant features. In: Nedellec C, Rouveirol C (eds) Proceedings of ECML-98, 10th European conference on machine learning, number 1398 in LNCS. Springer, Heidelberg, pp 137–142
Joachims T (2001) A statistical learning model of text classification with support vector machines. In: Proceedings of the 24thACMinternational conference on research and development in information retrieval. ACM Press, London, pp 128–136
Khong W-K (2001) Master Thesis. The law and economics of junk e-mails (spam). Thesis submitted to the Erasemus Programme In Law And Economics In Partial Fulfilment of the Degree of European Master In Law And Economics
Khorsi A (2007) An overview of content-based spam filtering techniques. Informatica 31: 269–277
Kim J, Bentley P (2002) Toward an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Proceedings of the 2002 congress on evolutionary computation (CEC 2002), Honolulu, pp 1244–1252
Kim J, Wilson WO (2005) Uwe Aickelin, and Julie McLeod. Cooperative Automated Worm Response and Detection Immune ALgorithm (CARDINAL) Inspired by T-cell Immunity and Tolerance. In the proceedings of the fourth international conference, ICARIS 2005 on Artificial Immune Systems, Banff, Alberta, pp 168–181
Kolcz A, Alspector J (2001) Svm-based filtering of e-mail spam with content-specific misclassification costs. In: Proceedings of the TextDM’01 workshop on text mining—held at the 2001 IEEE international conference on data mining, TextDM’2001 (IEEE ICDM-2001 workshop on text mining), IEEE, pp 123–130
Krishnakumar K, Neidhoefer J (1999) Immunized adaptive critic for an autonomous aircraft control application. In: Artificial immune systems and their applications, Chap. 20. Springer, Berlin, pp 221–240
Livingston B (2001) Inside the spammer’s world. http://news.com.com/2010-1071-281499.html. Accessed 15 Jan 2009
Liu X-b, Zhang N (2006) Incremental immune-inspired clustering approach to behavior-based anti-spam technology. Int J Inf Technol 12(3)
María J, Cajigas G, Puertas E (2006) Content based SMS spam filtering, DocEng’06, October 10–13. ACM, Amsterdam, 1-59593-515-0/06/0010
María J, Cajigas G, Puertas E (2006) Content based SMS spam filtering, DocEng’06, October 10–13, 2006. ACM, Amsterdam, 1-59593-515-0/06/0010
Medlock B (2003) Master Thesis, A Generative, Adaptive Language model Approach to spam filtering. Thesis Submitted in part fulfillment of the University of Cambridge MPhil degree in computer speech, text and internet technology
Medzhitov R, Janeway CA Jr (1997) Innate immunity: impact on the adaptive immune response. Curr Opin Imm 9: 4–9
Medzhitov R, Janeway CA Jr (1997) Innate immunity: the virtues of a nonclonal system of recognition. Cell 91: 295–298
Medzhitov R, Janeway CA Jr (1998) Innate immune recognition and control of adaptive immune responses. Semin Imm 10: 351–353
Messaging Anti-Abuse Working Group (2006) MAAWG E-mail metrics Program, First Quarter 2006 Reports. www.maawg.org/about/FINAL_1Q2006_Metrics_Report.pdf. Accessed 10 Jan 2009
Mitchell T (1997) Machine learning. Commun ACM 42(11): 30–36 ISSN: 0001-0782, 1999
Millerk C (2009) Group product manager, enterprise e-mail security, neural network-based antispam heuristics, http://neuro.bstu.by/our/antispam.pdf. Accessed 10 Jan 2009
Miller C (2008) Group product manager, enterprise e-mail security, neural network-based antispam heuristics, http://wwwciphertrustcom/files/forms/landing_template.php?sp. Accessed 10 Jan 2008
Neal M (2003) Meta-stable memory in an artificial immune network. In: The proceedings of second international conference on artificial immune systems (ICARIS). Napier University, Edinburgh
O’Brien C, Vogel C (2003) Spam filters: bayes vs. chi-squared; letters vs. words. In: ISICT ’03: Proceedings of the 1st international symposium on information and communication technologies. Trinity College, Dublin, pp 291–296
Oda T (2003) Tony White, increasing the accuracy of a spam-detection immune system. In: Proceedings of the congress on evolutionary computation (CEC 2003), Canberra, Australia. Proceedings, vol 1, pp 390–396, http://terri.zone12.com/doc/academic/spam_cec2003.pdf. Accessed 1 Feb 2008
Oda T, White T (2003) Developing an immunity to spam, Genetic and evolutionary computation conference, Chicago, IL. In: Proceedings, part I series: lecture notes in computer science, vol 2723, pp 231–242. Springer, Berlin
Oda T, White T (2005) Immunity from spam: an analysis of an artificial immune system for junk e-mail detection. In: Proceedings of artificial immune systems: 4th international conference, ICARIS, Banff, AB, Canada, August 14–17, 2005. Lecture notes in computer science 3627. Springer, Berlin, pp 276–289
Ozgur L, Gungor T, Gurgen F (2004) Adaptive anti-spam filtering for agglutinative languages: a special case for Turkish, http://www.cmpe.boun.edu.tr/~gungort/papers/Adaptive%20Anti-Spam.pdf. Accessed 10 Oct 2008
Pantel P, Lin D (1998) Spamcop: a spam classification & organization program. In: Learning for text categorization: Papers from the 1998 Workshop. AAAI Technical Report WS-98-05, Madison, WI
Parish CR, O’Neill ER (1997) Dependence of the adaptive immune response on innate immunity: some questions answered but new paradoxes emerge. Imm Cell Biol 75: 523–527
Pascucci A (2006) Toward a PhD Thesis on Pattern Recognition http://www.dis.uniroma1.it/~dottorato/db/relazioni/relaz_pascucci_1.pdf. Accessed 10 Jan 2009
Pelletier L, Almhana J, Choulakian V (2004) Adaptive filtering of spam. In: Proceedings. Second annual conference on communication networks and services research, pp 218–224
Pogula Sridhar S (2005) Master Thesis developing neural network applications using labview, A thesis presented to the faculty of the Graduate School University of Missouri-Columbia. In Partial Fulfillment Of the Requirements for the Degree Master of Science, Dr. Robert W. McLaren, Thesis Supervisor
Postel J (1975) RFC706: on the junk mail problem. Technical report, Network Working Group, http://www.faqs.org/rfcs/rfc706.html. Accessed 20 Feb 2008
Puniškis D, Laurutis R, Dirmeikis R (2006) An artificial neural nets for spam e-mail recognition. Electron Electric Eng 5(69):1392–1215. http://www.ee.ktu.lt/journal/2006/5/1392-1215-2006-05-02-73.pdf. Accessed 10 April 2008
Puniškis D, Laurutis R, Dirmeikis R (2008) An artificial neural nets for spam e-mail recognition, 2006, http://www.ee.ktu.lt/journal/2006/5/1392-1215-2006-05-02-73.pdf. Accessed 10 Jan 2008
Saarinen J (2003) Spammers hit below men’s belts. http://www.nzherald.co.nz/storydisplay.cfm?storyID=3518097. Accessed 20 Feb 2009
Sahami M, Dumais S, Heckerman D, Horvitz E (1998) A Bayesian approach to filtering junk e-mail. In learning for text categorization: Papers from the 1998Workshop. AAAI Technical Report WS-98-05, Madison, WI. http://www.aaai.org/Library/Workshops/1998/ws98-05-009.php. Accessed 1 Dec 2008
Sarafijanovic S, Le Boudec J-Y (2007) Artificial immune system for collaborative spam filtering, EPFL, Switzerland, Technical Report LCA-REPORT-2007-008, EPFL
Scavenger (2003) Master Thesis. A junk mail classification program. A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science, Department of Computer Science and Engineering, College of Engineering, University of South Florida, January 20, 2003
Schneider K (2003) A comparison of event models for naive bayes antispam e-mail filtering. In: Proceedings of the 11th conference of the European chapter of the association for computational linguistics (EACL’03) http://scholar.google.com/scholar?hl=ar&lr=&q=Schneider.+K.+2003.+A+comparison+of+event+models+for+naive+bayes+antispam+e-mail+filtering. Accessed 20 Nov 2008
Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34(1): 1–47
Secker A, Freitas AA, Timmis J (2003) Computing Laboratory University of Kent AISEC. An artificial immune system for e-mail classification, vol 1, pp 131–138, ISSN: ISBN: 0-7803-7804-0
Simon H (1983) Why should machines learn? An artificial intelligence approach. Mach Learn 1:392–399, http://books.google.com/books?hl=ar&lr=&id. Accessed 1 Jan 2009
Soonthornphisaj N, Chaikulseriwat K, Tang-On P (2002) Anti-spam filtering: a centroid-based classification approach. In: 2002 6th International conference on signal processing, vol 2, pp 1096–1099, 26–30 Aug. 2002
Stuart I, Cha S-H, Tappert C (2004) A neural network classifier for junk e-mail. In: Proceedings of student/faculty research Day, CSIS, Pace University
Timmis J, Knight T, De Castro LN, Hart E (2004) An overview of artificial immune systems. In: Paton R, Bolouri H, Holcombe M, Parish JH, Tateson R (eds) Computation in cells and tissues: perspectives and tools for thought. Natural computation series. Springer, Berlin, pp 51–86
Timmis J, Neal M, Hunt J (1999) An artificial immune system for data analysis. In: The proceedings of the international workshop on intelligent processing in cells and tissues (IPCAT)
Timmis J, Neal M, Knight T (2002) AINE: machine learning inspired by the immune system. IEEE Trans Evolut Comput 1(4): 40–49
Tonegawa S (1983) Somatic generation of antibody diversity. Nature 302: 575–581
Tretyakov K (2004) Machine learning techniques in spam filtering. Institute of Computer Science, University of Tartu, Data mining problem-oriented Seminar, MTAT.03.177, pp 60–79
Vapnik V (1999) The nature of statistical learning theory. Statistics for engineering and information science, 2nd edn. Springer, New York (Originally published as a monograph 2nd ed., 2000, XIX, 314 p. 48 illus., Hardcover ISBN: 978-0-387-98780-4, 2000)
Vinther M (2002) Intelligent junk mail detection using neural networks, http://www.logicnet.dk/reports/JunkDetection/JunkDetection.htm. Accessed 10 Jun 2008
Weinberg GR (2005) Master Thesis. To the engineering systems division in partial fulfillment of the requirements for the Degree of Master of Science in Technology And Policyat The Massachusetts Institute of Technology. A system analysis of the spam problem, Massachusetts Institute Of Technology (submitted)
Whitley D (2009) Genetic algorithms and neural networks. Genetic Algorithms Eng Comput Sci, http://scholar.google.com/scholar?hl=ar&lr=&q=Genetic+Algorithms+and+Neural+Networks.+Genetic+Algorithms+in+Engineering+and+Computer+Science. Accessed 10 Jan 2009
Wiehes A (2005) Master Thesis, Comparing anti spam methods, Master of Science in Information Security, Department of Computer Science and Media Technology, Gjøvik University College
Yao X (1999) Evolving artificial neural networks. Proc IEEE 87(9):1423–1447
Yoshida K, Adachi F, Washio T, Motoda H, Homma T, Nakashima A, Fujikawa H, Yamazaki K (2004) Density-based spam detector. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining. ACM Press, Seattle, pp 486–93
Yue X, Abraham A, Chi Z-X, Hao Y-Y, Mo H (2006) Artificial immune system inspired behavior-based anti-spam filter. Springer, Berlin, vol 11(8)
Zhang I, Yao T (2003) Filtering junk mail with a maximum entropy model. In: Proceedings of 20th international conference on computer processing of oriental languages (ICCPOL03), pp 446–453. Received January 2004; revised August 2004; accepted August 2004. ACM Transactions on Asian language information processing, vol 3, No. 4, Dec. 2004
Zhang L, Zhu J, Yao T (2004) Natural Language Processing Laboratory, Institute of Computer Software & Theory Northeastern University, An Evaluation of Statistical Spam Filtering Techniques. ACM Trans Asian Language Inf Process 3(4): 243–269
Zhang L, Zhu J, Yao T (2004) An evaluation of statistical spam filtering techniques. ACM Trans Asian Language Inf Process (TALIP) 3(4): 243–269
Zhan C, Xianliang L, Mengshu H, Xu Z (2005) A lvq-based neural network anti-spam e-mail approach. SIGOPS Oper Syst Rev 39(1): 34–39
Zhou D, Burges CJC, Tao T (2007) Transductive link spam detection. Microsoft research one microsoft way Redmond, WA 98052. ACM, AIRWeb ’07, Banff, Alberta 978-1-59593-732-2
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zitar, R.A., Hamdan, A. Genetic optimized artificial immune system in spam detection: a review and a model. Artif Intell Rev 40, 305–377 (2013). https://doi.org/10.1007/s10462-011-9285-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10462-011-9285-z