[go: up one dir, main page]

Friess, 2009 - Google Patents

A Tool For Evaluating Spam Filters

Friess, 2009

View PDF
Document ID
5984220148026478381
Author
Friess N
Publication year

External Links

Snippet

This thesis describes a new framework for evaluating spam filters: SpamTestSim. SpamTestSim is a simulator that employs a multi-agent system, where agents simulate both legitimate email users and spammers. Agents send email messages to each other, as well …
Continue reading at central.bac-lac.gc.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents
    • H04L12/18Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination

Similar Documents

Publication Publication Date Title
Gutierrez et al. Learning from the ones that got away: Detecting new forms of phishing attacks
Alani Big data in cybersecurity: a survey of applications and future trends
US6769016B2 (en) Intelligent SPAM detection system using an updateable neural analysis engine
US7664819B2 (en) Incremental anti-spam lookup and update service
US20130124644A1 (en) Reputation services for a social media identity
US8316315B2 (en) Automatically generated highlight view of electronic interactions
US9223961B1 (en) Systems and methods for performing security analyses of applications configured for cloud-based platforms
Caruccio et al. Fake account identification in social networks
US20090327168A1 (en) Playful incentive for labeling content
Dinh et al. Spam campaign detection, analysis, and investigation
Chen et al. A study on real-time low-quality content detection on Twitter from the users’ perspective
David et al. Features combination for the detection of malicious Twitter accounts
Pirocca et al. A toolkit for security awareness training against targeted phishing
Sheikhalishahi et al. Digital waste disposal: an automated framework for analysis of spam emails
Khan et al. Trust and believe-should we? evaluating the trustworthiness of twitter users
Teljstedt et al. A semi-automatic approach for labeling large amounts of automated and non-automated social media user accounts
Onaolapo et al. {SocialHEISTing}: Understanding stolen facebook accounts
US20230073905A1 (en) Methods and Software For Training Users to Discern Electronic Phishing Messages and for Building Phishing Knowledgebases for Automated Electronic-Message Filtering
Fdez-Glez et al. WSF2: a novel framework for filtering web spam
Gillani et al. Economic metric to improve spam detectors
Friess A Tool For Evaluating Spam Filters
US9886726B1 (en) Analyzing social networking groups for detecting social networking spam
CN109885760A (en) Information traceability method and system based on user interest
Chen et al. Survey on Astroturfing Detection and Analysis from an Information Technology Perspective
Maleki et al. Generating phishing emails using graph database