Abstract
The issue of spam has been uprising since decades ago. Impact loss from various aspects has attacked the daily life most of us. Many approaches such as policy and guidelines establishment, rules and regulations enforcement, and even anti-spam tools installation appeared to be not enough to restrain the problem. To make things even worse, the spam’s recipients still easily get enticed and lured with the spam content. Hence, an advanced medium that acts as an implicit decision maker is desperately required to assist users to obstruct their eagerness responding against spam. The simulation of spam risk assessment in this paper is purposely to give some insights of how users can identify the imminent danger of received text spam. It is demonstrated by predicting the potential hazard with three different levels of risk (high, medium and low), according to its possible impact loss. A series of simulation has been conducted to visualize this concept using Danger Theory variants of Artificial Immune Systems (AIS), namely Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). The corpus of messages from UCI Machine Learning Repository has been deployed to illustrate the analysis. The outcome of these simulations verified that dDCA has consistently outperformed DCA in precisely assessing the risk level with severity concentration value for text spam messages. The findings of this work has demonstrated the feasibility of immune theory in risk measurement that eventually assisting users in their decision making.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bujang, Y.R., Hussin, H.: Should we be concerned with spam emails ? A look at its impacts and implications. International Islamic University Malaysia
Theoharidou, M., Mylonas, A., Gritzalis, D.: A Risk Assessment Method for Smartphones (2016)
Zhang, Y., Xiao, Y., Ghaboosi, K., Zhang, J., Deng, H.: A survey of cyber crimes. Secur. Commun. Netw. 5, 422–437 (2011)
de Natris, W.: Best Practice Forum on Regulation and Mitigation of Unsolicited Communications (2014)
Yeboah-Boateng, E.O., Amanor, P.M.: Phishing, SMiShing & Vishing: an assessment of threats against mobile devices. J. Emerg. Trends Comput. Inf. Sci. 5(4), 297–307 (2014)
Zainal, K., Jali, M.Z.: A perception model of spam risk assessment inspired by danger theory of artificial immune systems. In: International Conference on Computer Science and Computational Intelligence (ICCSCI), vol. 59, pp. 152–161 (2015)
Timmis, J., Knight, T., de Castro, L.N., Hart, E.: An Overview of Artificial Immune Systems (2002)
Liu, F., Wang, Q., Gao, X.: Survey of Artificial Immune System, pp. 985–989 (2005)
Dasgupta, D.: Advances in artificial immune systems. IEEE Comput. Intell. Mag. 1(4), 40–49 (2006)
Hart, E., Timmis, J.: Application areas of AIS: the past, the present and the future. Appl. Soft Comput. J. 8(1), 191–201 (2008)
Dasgupta, D., Yu, S., Nino, F.: Recent advances in artificial immune systems: models and applications. Appl. Soft Comput. J. 11(2), 1574–1587 (2011)
Read, M., Andrews, P., Timmis, J.: Artificial Immune Systems (2008)
Matzinger, P.: Tolerance, danger and the extended family. Annu. Rev. Immunol. 12, 991–1045 (1994)
Greensmith, J.: The Dendritic Cell Algorithm. University of Nottingham (2007)
Greensmith, J., Aickelin, U.: The Deterministic Dendritic Cell Algorithm (2008)
Brownlee, J.: Dendritic cell algorithm. In: Clever Algorithms: Nature Inspired Programming Recipes. Creative Commons, pp. 312–318 (2011)
Greensmith, J., Aickelin, U.: Artificial dendritic cells: multi-faceted perspectives. In: Human-Centric Information Processing Through Granular Modelling, vol. 182, pp. 375–395 (2009)
Greensmith, J., Aickelin, U., Cayzer, S.: Detecting Danger : The Dendritic Cell Algorithm (2010)
Aickelin, U., Greensmith, J.: Sensing danger: innate immunology for intrusion detection. Inf. Secur. Tech. Rep. 12(4), 218–227 (2007)
Greensmith, J., Aickelin, U., Twycross, J.: Articulation and clarification of the dendritic cell algorithm dendritic cells (2009)
Gu, F., Greensmith, J., Aickelin, U.: Further exploration of the dendritic cell algorithm: antigen multiplier and time windows. In: 7th International Conference Artificial Immune System, pp. 142–153 (2008)
Musselle, C.J.: Insights into the Antigen Sampling Component of the Dendritic Cell Algorithm (2010)
Zainal, K., Jali, M.Z.: A review of feature extraction optimization in SMS spam messages classification. In: International Conference on Soft Computing in Data Science (SCDS), vol. 545, pp. 158–170 (2016)
Zainal, K., Jali, M.Z.: The design and development of spam risk assessment prototype. in silico of danger theory variants. Int. J. Adv. Comput. Sci. Appl. 8(4), 401–410 (2017)
Zainal, K., Jali, M.Z.: The significant effect of feature selection methods in spam risk assessment using dendritic cell algorithm. In: International Conference on Information and Communication Technology (ICoICT 2017), pp. 277–284 (2017)
Sethi, G., Bhootna, V.: SMS spam filtering application using Android. Int. J. Comput. Sci. Inf. Technol. 5(3), 4624–4626 (2014)
Zhang, H., Wang, W.: Application of Bayesian method to spam SMS filtering. In: IEEE, pp. 1–3 (2009)
Uysal, K., Gunal, S., Ergin, S., Gunal, E.S.: The impact of feature extraction and selection on SMS spam filtering. IEEE 19(5), 67–72 (2013)
Uysal, A.K., Gunal, S., Ergin, S., Gunal, E.S.: A novel framework for SMS spam filtering. IEEE (2012)
Almeida, T.A., Hidalgo, J.M.G.: UCI machine learning repository (2012). http://archive.ics.uci.edu/ml/datasets/SMS+Spam+Collection#. Accessed 27 Mar 2014
Gu, F., Greensmith, J., Aickelin, U.: Theoretical formulation and analysis of the deterministic dendritic cell algorithm. BioSystems 111(2), 127–135 (2013)
Gu, F., Greensmith, J., Aicklein, U.: The dendritic cell algorithm for intrusion detection. In: Biologically Inspired Networking and Sensing: Algorithms and Architectures, Bio-Inspired Communication and Networking, IGI Global, pp. 84–102, January 2011
Acknowledgments
This research is fully funded by the Ministry of Higher Education of Malaysia and Research Management Centre of USIM via grant research with code USIM/FRGS/FST/32/50315.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix 1
Experiment 1. Characteristics of the testing setup for results tabulated in Table 5:
-
Term weighting scheme: Term Frequency (TF).
-
The value for risk scale (S1) and signal weight matrix (WM1) as tabulated in Table 1.
-
For MCAV calculation, mature content referred to both High and Medium tokens.
-
Text pre-processing is applied and antigen multiplication is not applied.
-
See Sect. 5: Results and Analysis, Experiment 1; Table 2 and Fig. 3 for tabulated results and graph.
According to the risk concentration value tabulated in Table 5, it is empirically proven that DCA and dDCA are feasible algorithms that able to produce a risk level classification for text spam messages. The combination of more than one risky term may result in high risk such as containing URL that requested users to respond accordingly with the content of the message. Via this simulation, it is demonstrated that messages that contain information that requested users to respond (call, text, and chat) are in the appropriate high/medium risk category. While for messages that contain no requirement for users to respond (for instance a message with ID 15.txt) produced low-risk concentration level or potentially to be considered as a non-spam message.
Appendix 2
Experiment 4. Characteristics of the testing setup for results tabulated in Table 6:
-
The value for risk scale (S1) as tabulated in Table 1.
-
Text pre-processing is applied.
-
See Sect. 5: Results and Analysis, Experiment 4 and Fig. 6 for tabulated results and graph.
-
Italic and underlined font indicates the falsely-classified for risk level
The value of confidence for the non-immune classifier is derived from the data mining tool, RapidMiner. This confidence value is referring to the probability of the message is tagged as spam. The risk level measured for the non-immune classifier is determined by mapping the confidence value of spam with the pre-set risk scale, S1.
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Zainal, K., Jali, M.Z., Hasan, A.B. (2018). Comparative Analysis of Danger Theory Variants in Measuring Risk Level for Text Spam Messages. In: Alenezi, M., Qureshi, B. (eds) 5th International Symposium on Data Mining Applications. Advances in Intelligent Systems and Computing, vol 753. Springer, Cham. https://doi.org/10.1007/978-3-319-78753-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-78753-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78752-7
Online ISBN: 978-3-319-78753-4
eBook Packages: EngineeringEngineering (R0)