Controlling Spam: Immunity-based Approach

作者: Konrad Kawecki , Franciszek Seredyński , Marek Pilski

DOI: 10.1007/3-540-33521-8_4

关键词: Electronic mailRegular expressionComputer virusForum spamTerm (time)Computer scienceArtificial immune systemInternet usersComputer security

摘要: Using electronic mail (e-mail) we can communicate freely and almost at no cost. It creates new possibilities for companies that use e-mail to send advertisements their clients (that is called direct-mailing). The term spam refers mostly kind of advertisements. Massively sent unsolicited e-mails attack many Internet users. Unfortunately, this message not be filtered out by simple rule-based filters. In paper will extend artificial immune system (AIS) proposed in (6) which based on mammalian designed protect users from spam. Generally AIS are also used detect computer viruses or anomalies networks.

参考文章(8)
David M. Chess, John F. Morar, William C. Arnold, Steve R. White, Morton Swimmer, Edward J. Pring, Anatomy of a Commercial-Grade Immune System ,(1999)
Franciszek Seredyński, Pascal Bouvry, Dawid R. Rutkowski, Anomaly Detection System for Network Security: Immunity-based Approach intelligent information systems. pp. 486- 490 ,(2005) , 10.1007/3-540-32392-9_58
Terri Oda, Tony White, Developing an Immunity to Spam Genetic and Evolutionary Computation — GECCO 2003. pp. 231- 242 ,(2003) , 10.1007/3-540-45105-6_28
Steven A. Hofmeyr, Stephanie Forrest, Architecture for an Artificial Immune System Evolutionary Computation. ,vol. 8, pp. 443- 473 ,(2000) , 10.1162/106365600568257
D. Dasgupta, F. Gonzalez, An immunity-based technique to characterize intrusions in computer networks IEEE Transactions on Evolutionary Computation. ,vol. 6, pp. 281- 291 ,(2002) , 10.1109/TEVC.2002.1011541
P.K. Harmer, P.D. Williams, G.H. Gunsch, G.B. Lamont, An artificial immune system architecture for computer security applications IEEE Transactions on Evolutionary Computation. ,vol. 6, pp. 252- 280 ,(2002) , 10.1109/TEVC.2002.1011540
A. Zaritsky, M. Sipper, The preservation of favored building blocks in the struggle for fitness: the puzzle algorithm IEEE Transactions on Evolutionary Computation. ,vol. 8, pp. 443- 455 ,(2004) , 10.1109/TEVC.2004.831260
L.N. de Castro, F.J. Von Zuben, Learning and optimization using the clonal selection principle IEEE Transactions on Evolutionary Computation. ,vol. 6, pp. 239- 251 ,(2002) , 10.1109/TEVC.2002.1011539