Spambot detection - spam mail, Computer Network Security

Spambot Detection:

The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is that human web usage behavior is intrinsically different from spambot behavior. The tools used for this purpose are generally based on challenge-response techniques. This is attributed to the reason that spambots have some different malicious intentions. Spambots visit the website mainly to spread spam content rather than to consume the content. Hence by investigating and mining web usage data it is possible to distinguish spambots from human users. This proposed field of research is a rule based on-the-fly web spambot detection method. he method is based on web usage behavior. Discriminative features called action strings from web usage data are extracted to classify spambot vs. human. An  action as a set of user efforts to achieve certain purposes and action strings as a sequence of actions for a particular user in a transaction are proposed.

Posted Date: 2/28/2013 7:05:27 AM | Location : United States







Related Discussions:- Spambot detection - spam mail, Assignment Help, Ask Question on Spambot detection - spam mail, Get Answer, Expert's Help, Spambot detection - spam mail Discussions

Write discussion on Spambot detection - spam mail
Your posts are moderated
Related Questions
Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Discuss how developers should apply the following countermeasures to improve the security of their code:

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi