271 research outputs found
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and
viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is
called blog spam or comment spam.It is done by posting comments or flooding
spams to the services such as blogs, forums,news,email archives and guestbooks.
Blog spams generally appears on guestbooks or comment pages where spammers fill
a comment box with spam words. In addition to wasting user's time with unwanted
comments, spam also consumes a lot of bandwidth. In this paper, we propose a
software tool to prevent such blog spams by using Bayesian Algorithm based
technique. It is derived from Bayes' Theorem. It gives an output which has a
probability that any comment is spam, given that it has certain words in it.
With using our past entries and a comment entry, this value is obtained and
compared with a threshold value to find if it exceeds the threshold value or
not. By using this concept, we developed a software tool to block comment spam.
The experimental results show that the Bayesian based tool is working well.
This paper has the major findings and their significance of blog spam filter.Comment: 14 Pages,4 Figures, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.4, October 201
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and
viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is
called blog spam or comment spam.It is done by posting comments or flooding
spams to the services such as blogs, forums,news,email archives and guestbooks.
Blog spams generally appears on guestbooks or comment pages where spammers fill
a comment box with spam words. In addition to wasting user's time with unwanted
comments, spam also consumes a lot of bandwidth. In this paper, we propose a
software tool to prevent such blog spams by using Bayesian Algorithm based
technique. It is derived from Bayes' Theorem. It gives an output which has a
probability that any comment is spam, given that it has certain words in it.
With using our past entries and a comment entry, this value is obtained and
compared with a threshold value to find if it exceeds the threshold value or
not. By using this concept, we developed a software tool to block comment spam.
The experimental results show that the Bayesian based tool is working well.
This paper has the major findings and their significance of blog spam filter.Comment: 14 Pages,4 Figures, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.4, October 201
Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences
In this survey, we first briefly review the current state of cyber attacks,
highlighting significant recent changes in how and why such attacks are
performed. We then investigate the mechanics of malware command and control
(C2) establishment: we provide a comprehensive review of the techniques used by
attackers to set up such a channel and to hide its presence from the attacked
parties and the security tools they use. We then switch to the defensive side
of the problem, and review approaches that have been proposed for the detection
and disruption of C2 channels. We also map such techniques to widely-adopted
security controls, emphasizing gaps or limitations (and success stories) in
current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages.
Listing abstract compressed from version appearing in repor
Technologies-That-Must-Not-Be-Named: Understanding and Implementing Advanced Search Technologies in E-Discovery
Even for those who are aware of the existence of advanced search and review tactics beyond keyword search, many questions remain for attorneys and judges alike. First, what are the new and emerging technologies? While courts and commentators mention the existence of the technologies, there is not much guidance with regard to what the new technologies are and what they accomplish. Second, are the new technologies superior to the manual review process? Understandably, attorneys are hesitant to use an unfamiliar e-discovery product that may not work better than the e-discovery process to which they are already accustomed. Third, if attorneys do use a new search and review process, what standards of accuracy or defensibility is a court likely to impose? When managing the discovery process, attorneys want to be sure that the method of production satisfy the expectations of the court
Technologies-That-Must-Not-Be-Named: Understanding and Implementing Advanced Search Technologies in E-Discovery
The Federal Rules of Civil Procedure were created to promote the “just, speedy, and inexpensive determination of every action and proceeding.” Unfortunately, in the world of e-discovery, case determinations are often anything but speedy and inexpensive. The manual review process is notoriously one of the most expensive parts of litigation. Beyond expense, the time and effort required to carry out large-scale manual review places an immense burden on parties, nearly destroying the possibility of assessing the merits of early settlement before expensive review has already been carried out
- …