Spambot detection - spam mail, Computer Network Security

Spambot Detection:

The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is that human web usage behavior is intrinsically different from spambot behavior. The tools used for this purpose are generally based on challenge-response techniques. This is attributed to the reason that spambots have some different malicious intentions. Spambots visit the website mainly to spread spam content rather than to consume the content. Hence by investigating and mining web usage data it is possible to distinguish spambots from human users. This proposed field of research is a rule based on-the-fly web spambot detection method. he method is based on web usage behavior. Discriminative features called action strings from web usage data are extracted to classify spambot vs. human. An  action as a set of user efforts to achieve certain purposes and action strings as a sequence of actions for a particular user in a transaction are proposed.

Posted Date: 2/28/2013 7:05:27 AM | Location : United States

Related Discussions:- Spambot detection - spam mail, Assignment Help, Ask Question on Spambot detection - spam mail, Get Answer, Expert's Help, Spambot detection - spam mail Discussions

Write discussion on Spambot detection - spam mail
Your posts are moderated
Related Questions
ERROR REPORTING MECHANISM (ICMP) INTRODUCTION:  IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Me

Secure Socket Layer (SSL) accepts a combination of asymmetric and symmetric (public-key) encryption to accomplish integrity, confidentiality, authentication and non-repudiation for

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n