Friess, 2009 - Google Patents
A Tool For Evaluating Spam FiltersFriess, 2009
View PDF- Document ID
- 5984220148026478381
- Author
- Friess N
- Publication year
External Links
Snippet
This thesis describes a new framework for evaluating spam filters: SpamTestSim. SpamTestSim is a simulator that employs a multi-agent system, where agents simulate both legitimate email users and spammers. Agents send email messages to each other, as well …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gutierrez et al. | Learning from the ones that got away: Detecting new forms of phishing attacks | |
Alani | Big data in cybersecurity: a survey of applications and future trends | |
US6769016B2 (en) | Intelligent SPAM detection system using an updateable neural analysis engine | |
US7664819B2 (en) | Incremental anti-spam lookup and update service | |
US20130124644A1 (en) | Reputation services for a social media identity | |
US8316315B2 (en) | Automatically generated highlight view of electronic interactions | |
US9223961B1 (en) | Systems and methods for performing security analyses of applications configured for cloud-based platforms | |
Caruccio et al. | Fake account identification in social networks | |
US20090327168A1 (en) | Playful incentive for labeling content | |
Dinh et al. | Spam campaign detection, analysis, and investigation | |
Chen et al. | A study on real-time low-quality content detection on Twitter from the users’ perspective | |
David et al. | Features combination for the detection of malicious Twitter accounts | |
Pirocca et al. | A toolkit for security awareness training against targeted phishing | |
Sheikhalishahi et al. | Digital waste disposal: an automated framework for analysis of spam emails | |
Khan et al. | Trust and believe-should we? evaluating the trustworthiness of twitter users | |
Teljstedt et al. | A semi-automatic approach for labeling large amounts of automated and non-automated social media user accounts | |
Onaolapo et al. | {SocialHEISTing}: Understanding stolen facebook accounts | |
US20230073905A1 (en) | Methods and Software For Training Users to Discern Electronic Phishing Messages and for Building Phishing Knowledgebases for Automated Electronic-Message Filtering | |
Fdez-Glez et al. | WSF2: a novel framework for filtering web spam | |
Gillani et al. | Economic metric to improve spam detectors | |
Friess | A Tool For Evaluating Spam Filters | |
US9886726B1 (en) | Analyzing social networking groups for detecting social networking spam | |
CN109885760A (en) | Information traceability method and system based on user interest | |
Chen et al. | Survey on Astroturfing Detection and Analysis from an Information Technology Perspective | |
Maleki et al. | Generating phishing emails using graph database |