Advertisement

Developing an Immunity to Spam

  • Terri Oda
  • Tony White
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2723)

Abstract

Immune systems protect animals from pathogens, so why not apply a similar model to protect computers? Several researchers have investigated the use of an artificial immune system to protect computers from viruses and others have looked at using such a system to detect unauthorized computer intrusions. This paper describes the use of an artificial immune system for another kind of protection: protection from unsolicited email, or spam.

Keywords

Immune System Regular Expression Common Cold Expiry Date Gene Library 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hellweg, E.: What price spam? Business 2.0 (1999)Google Scholar
  2. 2.
    White, S.R., Swimmer, M., Pring, E.J., Arnold, W.C., Chess, D.M., Morar, J.F.: Anatomy of a commercial-grade immune system. Technical report, IBM Thomas J. Watson Research Center (2002)Google Scholar
  3. 3.
    Nunn, I.: Immunocomputing: The natural immune system and its computational metaphors. (2002) http://www.scs.carleton.ca/arpwhite/courses/95590Y/notes/Immunocomputing.ppt.
  4. 4.
    Hofmeyr, S.A.: An overview of the immune system (1997) http://www.cs.unm.edu/~immsec/html-imm/immune-system.html.
  5. 5.
    Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C.D., Stamatopoulos, P.: Stacking classifiers for anti-spam filtering of E-mail. In: Proceedings of EMNLP-01, 6th Conference on Empirical Methods in Natural Language Processing, Pittsburgh, US, Association for Computational Linguistics, Morristown, US (2001)Google Scholar
  6. 6.
    Jesdanun, A.: AOL wins $7 million spam lawsuit. Salon.com (2002) http://www.salon.com/tech/wire/2002/12/17/aol_spam/.
  7. 7.
    Email, C.A.U.: Pending legislation (2002) http://www.cauce.org/legislation.
  8. 8.
    Wendland, M.: Internet spammer can’t take what he dishes out. Detroit Free Press (2002)Google Scholar
  9. 9.
    SpamAssassin: Spamassassin website (2002) http://spamassassin.org/.
  10. 10.
    Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A bayesian approach to filtering junk E-mail. In: Learning for Text Categorization: Papers from the 1998 Workshop, Madison, Wisconsin, AAAI Technical Report WS-98-05 (1998)Google Scholar
  11. 11.
    Graham, P.: A plan for spam (2002) http://www.paulgraham.com/spam.html.
  12. 12.
    Vixie, P.: MAPS RBL rationale (2000) http://mail-abuse.org/rbl/rationale.html.
  13. 13.
    Poli, R.: Introduction to evolutionary computation: Automatically defined functions in genetic programming (1996) http://www.cs.bham.ac.uk/~rmp/slide_book/node7.html.
  14. 14.
    Taylor, G.: A collection of spam (2002) http://www2.picante.com:81/~WENAgtaylor/download/spam.tar.gz.
  15. 15.
    Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Paliouras, G., Spyropoulos, C.D.: An evaluation of naive bayesian anti-spam filtering. In Potamias, G., Moustakis, V., van Someren, M., eds.: Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning (ECML 2000), Barcelona, Spain (2000) 9–17Google Scholar
  16. 16.
    O’Byrne, K.: Private communication (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Terri Oda
    • 1
  • Tony White
    • 1
  1. 1.Carleton UniversityCanada

Personalised recommendations