Enhanced Bio-Inspired Algorithms for Detecting and Filtering Spam

Enhanced Bio-Inspired Algorithms for Detecting and Filtering Spam

Hadj Ahmed Bouarara
Copyright: © 2018 |Pages: 37
DOI: 10.4018/978-1-5225-4944-4.ch011
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet era promotes electronic commerce and facilitates access to many services. In today's digital society, the explosion in communication has revolutionized the field of electronic communication. Unfortunately, this technology has become incontestably the original source of malicious activities, especially the plague called undesirables email (SPAM) that has grown tremendously in the last few years. This chapter unveils fresh bio-inspired techniques (artificial social cockroaches [ASC], artificial haemostasis system [AHS], and artificial heart lungs system [AHLS]) and their application for SPAM detection. For the experimentation, the authors used the benchmark SMS Spam corpus V.0.1 and the validation measures (recall, precision, f-measure, entropy, accuracy, and error). They optimize the sensitive parameters of each algorithm (text representation technique, distance measure, weightings, and threshold). The results are positive compared to the result of artificial social bees and machine-learning algorithms (decision tree C4.5 and K-means).
Chapter Preview
Top

1. Introduction

In recent years, engineers and decision makers are confronted daily to NP-difficult problems where the classical techniques are unable to find effective solutions. They affect generally all sectors (the design of mechanical systems, image processing, information retrieval, clustering ... ... etc.).

The current scientific world was considerably built up with the inaugural appearance of novel concepts and paradigms. Our nature aged more than 5 billion years represents the largest reserve of solutions and ideas for many kinds of problems. The human being started to explore them recently (initiated from the most minor thing as bacteria to the complex systems collection of human body).

Nowadays, for each encountered problem we must observe the nature; it may already have the same problem where it had found solutions, long years ago. In the digital community, the world celebrates the birth of new interesting paradigms known under the name of bio-inspired techniques. They have demonstrated theirs strength face to different challenges. The foremost part of our work is the modelling of three fresh bio-inspired algorithms:

  • 1.

    Artificial social cockroaches (ASC) inspired from the lifestyle of cockroaches and their movement as a decentralised system without the conductor. They use the interaction between them and with their environment in order to be grouped under the most secure and attractive shelter for hiding.

  • 2.

    Artificial haemostasis system AHS inspired from the mechanism of stopping the loss of blood (external haemorrhagic).

  • 3.

    Artificial heart-lungs system AHLS mimicked from the functioning of blood oxygenation. Recently, the e-mail service has become enormously used, and the principal vector of communication in our digital society despite the emergence of social webs and the web 2.0 tools. Moreover, it permits to users with a mailbox (BAL) and address mail to exchange messages (picture, files, and text documents) from anywhere in the world via internet. Regrettably, among all the messages received by an individual in his mail box, we recognize two cases:

    • a.

      Regular (HAM): The email (Ham message) sent by friends or by websites subscribed in.

    • b.

      Irregular (SPAM): The unsolicited emails (junk e-mail) sent in bulk by malicious people (spammers).

According to the most recent report of the Radicati Group (2013), who supplies quantitative and qualitative researches with details on the e-mail, the security, and the social networks, has exhibited that 70-80% of email traffic is composed of spam. It is a rigorous problem in the electronic life, which presents the main challenge for Mail server administrators, and responsible of information organizations.

For that matter, several spam detection systems have seen the light based on learning machine algorithms and probabilistic techniques including Bayesian classification, artificial neural networks and text compression. It represents a supervised classification task, which has witnessed a burning interest from companies and particles. Merely, the spammer techniques were dramatically evolved where the conventional systems are inefficacious face to several limits:

Complete Chapter List

Search this Book:
Reset