19 research outputs found

    Spammers Detection on Twitter by Automated Multi Level Detection System

    Get PDF
    Twitter is one of the most well known micro-blogging administrations, which is commonly used to share news and updates through short messages confined to 280 characters. In any case, its open nature and huge client base are every now and again misused via robotized spammers, content polluters, and other not well expected clients to carry out different cyber violations, for example, cyber bullying, trolling, rumor dissemination, and stalking. Likewise, various methodologies have been proposed by specialists to address these issues. Nonetheless, the majority of these methodologies depend on client portrayal and totally dismissing shared communications. In this examination, we present a hybrid methodology for recognizing mechanized spammers by amalgamating network based features with other feature classifications, to be specific metadata-, content-, and association based features. The curiosity of the proposed methodology lies in the portrayal of clients dependent on their communications with their supporters given that a client can dodge features that are identified with his/her very own exercises, yet sidestepping those dependent on the devotees is troublesome. Nineteen distinct features, including six recently characterized features and two re-imagined features, are distinguished for learning three classifiers, in particular, irregular woods, choice tree, Bayesian system, and example pre-handling on a genuine dataset that involves generous clients and spammers. The separation intensity of various feature classifications is additionally broke down, and cooperation and network based features are resolved to be the best for spam identification, though metadata-based features are demonstrated to be the least compelling

    An Analysis of Botnet Attack for SMTP Server using Software Define Network (SDN)

    Get PDF
    SDN architecture overwhelms traditional network architectures by software abstraction for a centralize control of the entire networks. It provides manageable network infrastructures that consist millions of computing devices and software. In this work, we present multi-domain SDNs architecture with an integration of Spamhaus server. The proposed method allows SDN Controllers to update the Spamhaus server with latest detected spam signatures. It can help to prevent any spam email from entering others SDN domains. We also discussed a method for analyzing SMTP spam frames using a decision tree algorithm. We use Mininet tool to simulate the multi-domain SDNs with the Spamhaus server. The simulation results show that a packet Retransmission Timeout (RTO) between server and client can help to detect the SMTP spam frames

    Twitter Spam Detection Using Hybrid Method

    Get PDF
    We present a half breed approach for perceiving automated spammers by amalgamating system based features with other component classes, to be explicit metadata-, content-, and affiliation based features. The peculiarity of the proposed approach lies in the portrayal of customers subject to their relationship with their disciples given that a customer can evade incorporates that are related to his/her very own activities, anyway avoiding those reliant on the enthusiasts is problematic. Nineteen special features, including six as of late portrayed features and two renamed features, are perceived for learning three classifiers, specifically, self-assertive boondocks, decision tree, and Bayesian framework, on a veritable dataset that contains charitable customers and spammers. The partition force of different component classes is furthermore analyzed, and association and system based features are made plans to be the best for spam ID, however metadata-based highlights are demonstrated to be the least powerful

    Pertanika Journal of Science & Technology

    Get PDF

    Regulatory Theory: Foundations and applications

    Get PDF
    This volume introduces readers to regulatory theory. Aimed at practitioners, postgraduate students and those interested in regulation as a cross-cutting theme in the social sciences, Regulatory Theory includes chapters on the social-psychological foundations of regulation as well as theories of regulation such as responsive regulation, smart regulation and nodal governance. It explores the key themes of compliance, legal pluralism, meta-regulation, the rule of law, risk, accountability, globalisation and regulatory capitalism. The environment, crime, health, human rights, investment, migration and tax are among the fields of regulation considered in this ground-breaking book. Each chapter introduces the reader to key concepts and ideas and contains suggestions for further reading. The contributors, who either are or have been connected to the Regulatory Institutions Network (RegNet) at The Australian National University, include John Braithwaite, Valerie Braithwaite, Peter Grabosky, Neil Gunningham, Fiona Haines, Terry Halliday, David Levi-Faur, Christine Parker, Colin Scott and Clifford Shearing

    Net Neutrality

    Get PDF
    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Chris Marsden maneuvers through the hype articulated by Netwrok Neutrality advocates and opponents. He offers a clear-headed analysis of the high stakes in this debate about the Internet's future, and fearlessly refutes the misinformation and misconceptions that about' Professor Rob Freiden, Penn State University Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discrimination in that access where the end-user's ISP (or another ISP) blocks that access in part or whole. The suggestion has been that the problem can be resolved by either introducing greater competition, or closely policing conditions for vertically integrated service, such as VOIP. However, that is not the whole story, and ISPs as a whole have incentives to discriminate between content for matters such as network management of spam, to secure and maintain customer experience at current levels, and for economic benefit from new Quality of Service standards. This includes offering a ‘priority lane' on the network for premium content types such as video and voice service. The author considers market developments and policy responses in Europe and the United States, draws conclusions and proposes regulatory recommendations

    Net Neutrality

    Get PDF
    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Chris Marsden maneuvers through the hype articulated by Netwrok Neutrality advocates and opponents. He offers a clear-headed analysis of the high stakes in this debate about the Internet's future, and fearlessly refutes the misinformation and misconceptions that about' Professor Rob Freiden, Penn State University Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discrimination in that access where the end-user's ISP (or another ISP) blocks that access in part or whole. The suggestion has been that the problem can be resolved by either introducing greater competition, or closely policing conditions for vertically integrated service, such as VOIP. However, that is not the whole story, and ISPs as a whole have incentives to discriminate between content for matters such as network management of spam, to secure and maintain customer experience at current levels, and for economic benefit from new Quality of Service standards. This includes offering a ‘priority lane' on the network for premium content types such as video and voice service. The author considers market developments and policy responses in Europe and the United States, draws conclusions and proposes regulatory recommendations

    Cybersecurity of Digital Service Chains

    Get PDF
    This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems

    Cybersecurity of Digital Service Chains

    Get PDF
    This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems

    The Impact of e-Democracy in Political Stability of Nigeria

    Get PDF
    The history of the Nigerian electoral process has been hitherto characterized by violence stemming from disputes in election outcomes. For instance, violence erupted across some states in Northern Nigeria when results indicated that a candidate who was popular in that part of the country was losing the election leading to avoidable loss of lives. Beside, this dispute in election outcome lingers for a long time in litigation at the electoral tribunals which distracts effective governance. However, the increasing penetrating use of ICTs in Nigeria is evident in the electoral processes with consequent shift in the behavior of actors in the democratic processes, thus changing the ways Nigerians react to election outcomes. This paper examines the trend in the use ICT in the Nigerian political system and its impact on the stability of the polity. It assesses the role of ICT in recent electoral processes and compares its impact on the outcome of the process in lieu of previous experiences in the Nigeria. Furthermore, the paper also examines the challenges and risks of implementing e-Democracy in Nigeria and its relationship to the economy in the light of the socio-economic situation of the country. The paper adopted qualitative approach in data gathering and analysis. From the findings, the paper observed that e-democracy is largely dependent on the level of ICT adoption, which is still at its lowest ebb in the country. It recognizes the challenges in the provision of ICT infrastructure and argues that appropriate low-cost infrastructure applicable to the Nigerian condition can be made available to implement e-democracy and thus arouse the interest of the populace in governance, increase the number of voters, and enhance transparency, probity and accountability, and participation in governance as well as help stabilize the nascent democrac
    corecore