Spambot detection - spam mail, Computer Network Security

Spambot Detection:

The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is that human web usage behavior is intrinsically different from spambot behavior. The tools used for this purpose are generally based on challenge-response techniques. This is attributed to the reason that spambots have some different malicious intentions. Spambots visit the website mainly to spread spam content rather than to consume the content. Hence by investigating and mining web usage data it is possible to distinguish spambots from human users. This proposed field of research is a rule based on-the-fly web spambot detection method. he method is based on web usage behavior. Discriminative features called action strings from web usage data are extracted to classify spambot vs. human. An  action as a set of user efforts to achieve certain purposes and action strings as a sequence of actions for a particular user in a transaction are proposed.

Posted Date: 2/28/2013 7:05:27 AM | Location : United States







Related Discussions:- Spambot detection - spam mail, Assignment Help, Ask Question on Spambot detection - spam mail, Get Answer, Expert's Help, Spambot detection - spam mail Discussions

Write discussion on Spambot detection - spam mail
Your posts are moderated
Related Questions
Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

QUESTION a) A switch basically operates by forwarding frames from one part of the network to another, based on MAC address. Describe the three types of switching namely store

QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo


Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure