Anti-Spam Software for Detecting Information Attacks

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Countermeasure to Duplicate-detecting Anti-spam Techniques

Duplicate message detection is at the heart of several current approaches to ltering out unwanted commercial electronic mail (\spam"). It uses the spammer's most annoying characteristic, that of sending out lots of copies of the same message relatively indiscriminately, against him. Examples of techniques employing this idea are ltering by duplicate detection, collabo-rative ltering, and manual...

متن کامل

Information Assurance: Detection of Web Spam Attacks in Social Media

As online social media applications continue to gain its popularity, concerns about the rapid proliferation of Web spam has grown in recent years. These applications allow spammers to submit links anonymously, diverting unsuspected users to spam Web sites. This paper presents a novel co-classification framework to simultaneously detect Web spam and spammers in social media Web sites based on th...

متن کامل

An approach for detecting offline intrusive attacks on biomedical information

The procedure of sharing the diagnostic medical reports and the scanned images of patients among doctors in a secured fashion with corresponding suggestions for joint treatment creates greatest care for the patients through quicker and crucial decisions. Intrusion Detection is the essential part of Information and Network Security domain in opposition against illegal access or malicious attacks...

متن کامل

Internet Episode Analysis for Detecting Anomalous Attacks on Information Infrastructures

A new Internet datamining framework is developed to protect critical information infrastructures. Frequent episode rules are generated to detect anomalies in TCP, UDP, or ICMP connections. We protect network-based computing infrastructures such as clusters, Grids, and P2P systems. Fundamental rule pruning techniques are introduced to significantly reduce the rule-search space. The new security ...

متن کامل

FreeBSD server anti-spam software using automated TCP connection control

This paper describes a new approach to anti-spam techniques. Instead of having spam filtering software implemented at a mail client or server, we build a mail server agent called MT Proxy to deal with any spam related issue. This server acts a mediate firewall to securely protect our real SMTP mail server. All emails are allowed to come to their recipients, but at either slow or fast speed, dep...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Intelligent Systems and Applications

سال: 2012

ISSN: 2074-904X,2074-9058

DOI: 10.5815/ijisa.2012.10.03