A New Binary Particle Swarm Optimization for Feature Subset Selection with Support Vector Machine

  • Amir Rajabi Behjat
  • Aida Mustapha
  • Hossein Nezamabadi-Pour
  • Md. Nasir Sulaiman
  • Norwati Mustapha
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 287)


Social Engineering (SE) has emerged as one of the most familiar problem concerning organizational security and computer users. At present, the performance deterioration of phishing and spam detection systems are attributed to high feature dimensionality as well as the computational cost during feature selection. This consequently reduces the classification accuracy or detection rate and increases the False Positive Rate (FPR). This research is set to introduce a novel feature selection method called the New Binary Particle Swarm Optimization (NBPSO) to choose a set of optimal features in spam and phishing emails. The proposed feature selection method was tested in a classification experiments using the Support Vector Machine (SVM) to classify emails according to the various features as input. The results obtained by experimenting on two phishing and spam emails showed a reasonable performance to the phishing detection system.


Particle swarm optimization feature selection phishing spam social engineering SVM 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Miller, T.: Social Engineering: Techniques that can Bypass Intrusion Detection Systems,
  2. 2.
    Gorton, A.S., Champion, T.G.: Combining Evasion Techniques to Avoid Network Intrusion Detection Systems. Skaion (2004)Google Scholar
  3. 3.
    Dodge, R.C., Carver, C., Ferguson, A.J.: Phishing for User Security Awareness. Computers & Security 26(1), 73–80 (2007)CrossRefGoogle Scholar
  4. 4.
    Hoeschele, M., Rogers, M.: Detecting Social Engineering. In: Pollitt, M., Shenoi, S. (eds.) Advances in Digital Forensics. IFIP, vol. 194, pp. 67–77. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Ashish, T.: Social Engineering: An Attack Vector Most Intricate to Tackle. Technical Report, Infosecwriters (2007)Google Scholar
  6. 6.
    Olivo, C.K., Santin, A.O., Oliveira, L.S.: Obtaining the Threat Model for E-mail Ohishing. Applied Soft Computing (2011)Google Scholar
  7. 7.
    Ruan, G., Tan, Y.: A Three-Layer Back-Propagation Neural Network for Spam Detection using Artificial Immune Concentration. Soft Computing-A Fusion of Foundations, Methodologies and Applications 14(2), 139–150 (2010)Google Scholar
  8. 8.
    Engelbrecht, A.P.: Fundamentals of Computational Swarm Intelligence, vol. 1. Wiley, London (2005)Google Scholar
  9. 9.
    El-Alfy, E.S.M., Abdel-Aal, R.E.: Using GMDH-based Networks for Improved Spam Detection and Email Feature Analysis. Applied Soft Computing 11(1), 477–488 (2011)CrossRefGoogle Scholar
  10. 10.
    Ma, L., Ofoghi, B., Watters, P., Brown, S.: Detecting Phishing Emails using Hybrid Features. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 49–497 (2009)Google Scholar
  11. 11.
    Oliveira, A.L.I., Braga, P.L., Lima, R.M.F., Cornelio, M.L.: GA-based Method for Feature Selection and Parameters Optimization for Machine Learning Regression Applied to Software Effort Estimation. Information and Software Technology 52(11), 1155–1166 (2010)CrossRefGoogle Scholar
  12. 12.
    Chandrasekaran, M., Narayanan, K., Upadhyaya, S.: Phishing Email Detection based on Structural Properties. In: NYS Cyber Security Conference, pp. 1–7 (2006)Google Scholar
  13. 13.
    Toolan, F., Carthy, J.: Phishing Detection using Classifier Ensembles. In: eCrime Researchers Summit, pp. 1–9 (2009)Google Scholar
  14. 14.
    Sirisanyalak, B., Sornil, O.: Artificial Immunity-based Feature Extraction for Spam Detection. In: International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 359–364 (2007)Google Scholar
  15. 15.
    Lai, C.H.: Particle Swarm Optimization-aided Feature Selection for Spam Email Classification, p. 165. IEEE, Kumamoto (2007)Google Scholar
  16. 16.
    Ramadan, R.M., Abdel-Kader, R.F.: Face Recognition using Particle Swarm Optimization-based Selected Features. International Journal of Signal Processing, Image Processing and Pattern Recognition 2(1), 51–66 (2009)Google Scholar
  17. 17.
    Guyon, I., Matic, N., Vapnik, V.: Discovering Informative Patterns and Data Cleaning. In: KDD Workshop, pp. 145–156 (1994)Google Scholar
  18. 18.
    Chen, J., Guo, C.: Online Detection and Prevention of Phishing Attacks. In: 1st Int. Conference on Communications and Networking, pp. 1–7 (2006)Google Scholar
  19. 19.
    Mukkamala, S., Sung, A.: Significant Feature Selection using Computational Intelligent Techniques for Intrusion Detection. In: Advanced Methods for Knowledge Discovery from Complex Data, pp. 285–306 (2005)Google Scholar
  20. 20.
    Macia-Perez, F., Mora-Gimeno, F., Marcos-Jorquera, D., Gil-Martinez-Abarca, J.A., Ramos-Morillo, H., Lorenzo-Fonseca, I.: Network Intrusion Detection System Embedded on a Smart Sensor. IEEE Transactions on Industrial Electronics 58(3), 722–732 (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Amir Rajabi Behjat
    • 1
  • Aida Mustapha
    • 1
  • Hossein Nezamabadi-Pour
    • 2
  • Md. Nasir Sulaiman
    • 1
  • Norwati Mustapha
    • 1
  1. 1.Faculty of Computer Science and Information TechnologyUniversity Putra Malaysia, UPMSerdangMalaysia
  2. 2.Department of Electrical EngineeringShahid Bahonar University of KermanKermanIran

Personalised recommendations