CFP last date
20 January 2025
Reseach Article

An Efficient AIS based Feature Extraction Techniques for Spam Detection

by Mafaz Mohsin Khalil Al-Anezi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 157 - Number 1
Year of Publication: 2017
Authors: Mafaz Mohsin Khalil Al-Anezi
10.5120/ijca2017912610

Mafaz Mohsin Khalil Al-Anezi . An Efficient AIS based Feature Extraction Techniques for Spam Detection. International Journal of Computer Applications. 157, 1 ( Jan 2017), 35-42. DOI=10.5120/ijca2017912610

@article{ 10.5120/ijca2017912610,
author = { Mafaz Mohsin Khalil Al-Anezi },
title = { An Efficient AIS based Feature Extraction Techniques for Spam Detection },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2017 },
volume = { 157 },
number = { 1 },
month = { Jan },
year = { 2017 },
issn = { 0975-8887 },
pages = { 35-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume157/number1/26798-2016912610/ },
doi = { 10.5120/ijca2017912610 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:47.964819+05:30
%A Mafaz Mohsin Khalil Al-Anezi
%T An Efficient AIS based Feature Extraction Techniques for Spam Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 157
%N 1
%P 35-42
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Simultaneously with the development of networks, and with the increasing volume of unsolicited bulk e-mail especially advertising, indiscriminately has generated a need for reliable anti-spam filters. The problem for the traditional method of spam filtering cannot effectively identify the unknown and variation characteristics, therefore recently the researchers look at the artificial immune system exists diversity, immune memory, adaptive and self learning ability. The spam detection model describes an e-mail filtering is accomplished by extracting the characteristics of spam and ham (legitimate e-mail messages that is generally desired and isn't considered spam) that is been acquired from trained data set by feature extraction techniques. These techniques allowed to select subset of relevant, non redundant and most contributing features to have an added benefit in accuracy and reduced time complexity. The extracted features of spam and ham are then make a two types of antigen detectors, to enter then in series of cloning and mutation immune operations to built an immune memory of spam and ham. The experimental result confirms that the proposed model has a very high detection rate reach at 1 and a very low false alarm rate reach at 0 when using low numbers of feature extraction.

References
  1. Geerthik S., 2013. “Survey on Internet Spam: Classification and Analysis”, Pages 384-391 in Int.J.Computer Technology & Applications,Vol 4 (3), May-June.
  2. Sao P., Singh A., 2015.”Survey on Email Spam Classification using Different Classification Method”, Pages 680-684 in JETIR, Volume 2, Issue 3.
  3. Sharayu S A., Irabashetti P., 2014, "Efficient Spam Filtering Based on Artificial Immune System (AIS)", International Journal of Ignited Minds (IJIMIINDS), Volume: 01 Issue: 12 | Dec.
  4. Ozarkar P.& PatwardhanM., 2013. “Efficient Spam Classification by Appropriate Feature Selection”, Pages 48-57 in Global Journal of Computer Science and TechnologySoftware & Data EngineeringVolume 13 Issue 5 Version 1.0.
  5. Idris I. and Selamat A., 2015, " A Swarm Negative Selection Algorithm for Email Spam Detection", Journal of Computer Engineering &Information Technology, March 17.
  6. Kathiravan A. V. and Vasumathi B., 2015, " Artificial Immune System Based Classification Approach for Detecting Phishing Mails", Pages 4308 – 4315, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 5, May.
  7. Mahmoud T. M., El Nashar A. I., Abd-El-Hafeez T. and Khairy M., 2014, "An Efficient Three-phase Email Spam FilteringTechnique", Pages 1184-1201, British Journal of Mathematics & Computer Science.
  8. “UCI repository of Machine learning Databases”, Department of Information and Computer Science,University of California, Irvine, CA,http://www.ics.uci.edu/~mlearn/MLRepository.html,Hettich, S., Blake, C. L., and Merz, C. J.,1998.
  9. LanT., Erdogmus D., BlackL., and SantenJ., 2014. “A Comparison of Different Dimensionality Reduction andFeature Selection Methods for Single Trial ERP Detection”, Conf Proc IEEE Eng Med Biol Soc.
  10. Singh S., Silakari S. and Patel R., 2011, "An efficient feature reduction technique for intrusion detection system", International Conference on Machine Learning and Computing, IPCSIT vol.3.
  11. Khan A. and Farooq H., 2011, "Principal Component Analysis-Linear Discriminant Analysis Feature Extractor for Pattern Recognition", pages 267-270, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 2, November.
  12. Martinez A. M. and Kak A. C., 2001, " PCA versus LDA", Pages 228-233, IEEE Transactions On Pattern Analysis And Machine Intelligence, VOL. 23, NO. 2, February.
  13. Al-Anezi M. M. and Al-Dabagh N. B., "Multilayer Artificial Immune Systems for Intrusion and Malware Detection", LAP 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Email Spam Ham (legitimate messages) Clonal selection Information Gain LDA PCA