Spambot detection - spam mail, Computer Network Security

Spambot Detection:

The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is that human web usage behavior is intrinsically different from spambot behavior. The tools used for this purpose are generally based on challenge-response techniques. This is attributed to the reason that spambots have some different malicious intentions. Spambots visit the website mainly to spread spam content rather than to consume the content. Hence by investigating and mining web usage data it is possible to distinguish spambots from human users. This proposed field of research is a rule based on-the-fly web spambot detection method. he method is based on web usage behavior. Discriminative features called action strings from web usage data are extracted to classify spambot vs. human. An  action as a set of user efforts to achieve certain purposes and action strings as a sequence of actions for a particular user in a transaction are proposed.

Posted Date: 2/28/2013 7:05:27 AM | Location : United States







Related Discussions:- Spambot detection - spam mail, Assignment Help, Ask Question on Spambot detection - spam mail, Get Answer, Expert's Help, Spambot detection - spam mail Discussions

Write discussion on Spambot detection - spam mail
Your posts are moderated
Related Questions
In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certificate

NEED FOR SECURITY Primary mission of information security to ensure that the systems and contents stay the same If no threats, could focus on improving the systems, resulting in

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a