Hybrid email spam detection model with negative selection algorithm and differential evolution

被引:56
作者
Idris, Ismaila [1 ,2 ]
Selamat, Ali [1 ,2 ]
Omatu, Sigeru [3 ]
机构
[1] Univ Teknol Malaysia, Knowledge Econ Res Alliance, SERG, Johor Baharu 81310, Johor, Malaysia
[2] Univ Teknol Malaysia, Fac Comp, Johor Baharu 81310, Johor, Malaysia
[3] Dept Elect Informat & Commun Engn, Asahi Ku, Osaka 5358585, Japan
关键词
Negative selection algorithm; Differential evolution; email; Spam; Non-spam; Detector generation; IMMUNE ALGORITHM; DESIGN; OPTIMIZATION; MALWARE;
D O I
10.1016/j.engappai.2013.12.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Email spam is an increasing problem that not only affects normal users of internet but also causes a major problem for companies and organizations. Earlier techniques have been impaired by the adaptive nature of unsolicited email spam. Inspired by adaptive algorithm, this paper introduces a modified machine learning technique of the human immune system called negative selection algorithm (NSA). A local selection differential evolution (DE) generates detectors at the random detector generation phase of NSA; code named NSA-DE. Local outlier factor (LOF) is implemented as fitness function to maximize the distance of generated spam detectors from the non-spam space. The problem of overlapping detectors is also solved by calculating the minimum and maximum distance of two overlapped detectors in the spam space. From the experiments, the results show that the detection accuracy of NSA-DE is 83.06% while the standard negative selection algorithm is 68.86% at 7000 generated detectors. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:97 / 110
页数:14
相关论文
共 49 条
[1]  
Abi-Haidar A, 2008, LECT NOTES COMPUT SC, V5132, P36, DOI 10.1007/978-3-540-85072-4_4
[2]  
[Anonymous], 2010, INT J COMPUT APPL
[3]  
Balthrop J, 2002, IEEE C EVOL COMPUTAT, P1045, DOI 10.1109/CEC.2002.1004387
[4]   Comparing binary and real-valued coding in hybrid immune algorithm for feature selection and classification of ECG signals [J].
Bereta, Michal ;
Burczynski, Tadeusz .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2007, 20 (05) :571-585
[5]  
Bezerra GB, 2006, LECT NOTES COMPUT SC, V4163, P446
[6]   A survey and experimental evaluation of image spam filtering techniques [J].
Biggio, Battista ;
Fumera, Giorgio ;
Pillai, Ignazio ;
Roli, Fabio .
PATTERN RECOGNITION LETTERS, 2011, 32 (10) :1436-1446
[7]   Tightening the net: A review of current and next generation spam filtering tools [J].
Carpinter, James ;
Hunt, Ray .
COMPUTERS & SECURITY, 2006, 25 (08) :566-578
[8]  
Cormack G. V., 2007, TREC PUBLIC SPAM COR
[9]   Efficient and effective spam filtering and re-ranking for large web datasets [J].
Cormack, Gordon V. ;
Smucker, Mark D. ;
Clarke, Charles L. A. .
INFORMATION RETRIEVAL, 2011, 14 (05) :441-465
[10]   Recent Advances in Artificial Immune Systems: Models and Applications [J].
Dasgupta, Dipankar ;
Yu, Senhua ;
Nino, Fernando .
APPLIED SOFT COMPUTING, 2011, 11 (02) :1574-1587