Abstract
Immune systems protect animals from pathogens, so why not apply a similar model to protect computers? Several researchers have investigated the use of an artificial immune system to protect computers from viruses and others have looked at using such a system to detect unauthorized computer intrusions. This paper describes the use of an artificial immune system for another kind of protection: protection from unsolicited email, or spam.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hellweg, E.: What price spam? Business 2.0 (1999)
White, S.R., Swimmer, M., Pring, E.J., Arnold, W.C., Chess, D.M., Morar, J.F.: Anatomy of a commercial-grade immune system. Technical report, IBM Thomas J. Watson Research Center (2002)
Nunn, I.: Immunocomputing: The natural immune system and its computational metaphors. (2002) http://www.scs.carleton.ca/arpwhite/courses/95590Y/notes/Immunocomputing.ppt.
Hofmeyr, S.A.: An overview of the immune system (1997) http://www.cs.unm.edu/~immsec/html-imm/immune-system.html.
Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C.D., Stamatopoulos, P.: Stacking classifiers for anti-spam filtering of E-mail. In: Proceedings of EMNLP-01, 6th Conference on Empirical Methods in Natural Language Processing, Pittsburgh, US, Association for Computational Linguistics, Morristown, US (2001)
Jesdanun, A.: AOL wins $7 million spam lawsuit. Salon.com (2002) http://www.salon.com/tech/wire/2002/12/17/aol_spam/.
Email, C.A.U.: Pending legislation (2002) http://www.cauce.org/legislation.
Wendland, M.: Internet spammer can’t take what he dishes out. Detroit Free Press (2002)
SpamAssassin: Spamassassin website (2002) http://spamassassin.org/.
Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A bayesian approach to filtering junk E-mail. In: Learning for Text Categorization: Papers from the 1998 Workshop, Madison, Wisconsin, AAAI Technical Report WS-98-05 (1998)
Graham, P.: A plan for spam (2002) http://www.paulgraham.com/spam.html.
Vixie, P.: MAPS RBL rationale (2000) http://mail-abuse.org/rbl/rationale.html.
Poli, R.: Introduction to evolutionary computation: Automatically defined functions in genetic programming (1996) http://www.cs.bham.ac.uk/~rmp/slide_book/node7.html.
Taylor, G.: A collection of spam (2002) http://www2.picante.com:81/~WENAgtaylor/download/spam.tar.gz.
Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Paliouras, G., Spyropoulos, C.D.: An evaluation of naive bayesian anti-spam filtering. In Potamias, G., Moustakis, V., van Someren, M., eds.: Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning (ECML 2000), Barcelona, Spain (2000) 9–17
O’Byrne, K.: Private communication (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Oda, T., White, T. (2003). Developing an Immunity to Spam. In: Cantú-Paz, E., et al. Genetic and Evolutionary Computation — GECCO 2003. GECCO 2003. Lecture Notes in Computer Science, vol 2723. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45105-6_28
Download citation
DOI: https://doi.org/10.1007/3-540-45105-6_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40602-0
Online ISBN: 978-3-540-45105-1
eBook Packages: Springer Book Archive