基于可信行为的垃圾邮件过滤

Cong Wang, Jianyi Liu
{"title":"基于可信行为的垃圾邮件过滤","authors":"Cong Wang, Jianyi Liu","doi":"10.1109/WISM.2010.177","DOIUrl":null,"url":null,"abstract":"Various approaches are presented to solve the spreading spam problem. However, most of these approaches can not flexibly and dynamically adapt to spam. This paper proposes a novel approach to counter spam based on trusted behavior recognition during transfer sessions. A behavior recognition of email transfer patterns which enables normal servers to detect malicious connections before email body delivered, contributes much to save network bandwidth wasted by spam emails. An integrated Anti-Spam framework is designed combining the trusted behavior recognition with Bayesian Analysis. The effectiveness of both the trusted Behavior recognition and the integrated filter are evaluated.","PeriodicalId":119569,"journal":{"name":"2010 International Conference on Web Information Systems and Mining","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Trusted Behavior Based Spam Filtering\",\"authors\":\"Cong Wang, Jianyi Liu\",\"doi\":\"10.1109/WISM.2010.177\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Various approaches are presented to solve the spreading spam problem. However, most of these approaches can not flexibly and dynamically adapt to spam. This paper proposes a novel approach to counter spam based on trusted behavior recognition during transfer sessions. A behavior recognition of email transfer patterns which enables normal servers to detect malicious connections before email body delivered, contributes much to save network bandwidth wasted by spam emails. An integrated Anti-Spam framework is designed combining the trusted behavior recognition with Bayesian Analysis. The effectiveness of both the trusted Behavior recognition and the integrated filter are evaluated.\",\"PeriodicalId\":119569,\"journal\":{\"name\":\"2010 International Conference on Web Information Systems and Mining\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Web Information Systems and Mining\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WISM.2010.177\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Web Information Systems and Mining","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WISM.2010.177","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

针对垃圾邮件的传播问题,提出了多种解决方法。然而,这些方法大多不能灵活、动态地适应垃圾邮件。提出了一种基于可信行为识别的反垃圾邮件的新方法。通过对邮件传输模式的行为识别,使正常服务器能够在发送邮件正文之前检测到恶意连接,有助于节省垃圾邮件所浪费的网络带宽。将可信行为识别与贝叶斯分析相结合,设计了一个集成的反垃圾邮件框架。评估了可信行为识别和集成滤波器的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Trusted Behavior Based Spam Filtering
Various approaches are presented to solve the spreading spam problem. However, most of these approaches can not flexibly and dynamically adapt to spam. This paper proposes a novel approach to counter spam based on trusted behavior recognition during transfer sessions. A behavior recognition of email transfer patterns which enables normal servers to detect malicious connections before email body delivered, contributes much to save network bandwidth wasted by spam emails. An integrated Anti-Spam framework is designed combining the trusted behavior recognition with Bayesian Analysis. The effectiveness of both the trusted Behavior recognition and the integrated filter are evaluated.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Numerical Simulation of Micronized Re-burning (MCR) Organic Acid Salt Used as an Accelerator The Research of the Grouping Algorithm for Chinese Learners Based on Transitive Closure Research on Multi-colony Diploid Genetic Algorithm for Production Logistics Scheduling Optimization Application of Second Order Diagonal Recurrent Neural Network in Nonlinear System Identification Synchronization Research of Uncoupled Hyper-chaotic Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1