PPT-Spam Campaign Cluster Detection Using Redirected URLs and R

Author : debby-jeon | Published Date : 2017-10-28

Authors Abu Awal Md Shoeb Dibya Mukhopadhyay Shahid Al Noor Alan Sprague and Gary Warner Dec 14 2014 Harvard University 1 Introduction Why spam detection is important

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Spam Campaign Cluster Detection Using Re..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Spam Campaign Cluster Detection Using Redirected URLs and R: Transcript


Authors Abu Awal Md Shoeb Dibya Mukhopadhyay Shahid Al Noor Alan Sprague and Gary Warner Dec 14 2014 Harvard University 1 Introduction Why spam detection is important Why it is difficult to detect. Kallol Dey. Rahul. . Mitra. Shubham. . Gautam. What is Spam ?. According to . wikipedia. … . Email spam, also known as junk email or unsolicited bulk email (UBE),is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Clicking on links in spam email may send users to phishing web sites or sites that are hosting malware. . Hongyu . Gao. , . Jun Hu. , . Christo . Wilson. , . Zhichun. . Li. , . Yan . Chen. . and . Ben Y. . Zhao. Northwestern University, US. Northwestern / . Huazhong. Univ. . of . Sci. & Tech, China. UTSA. Moheeb Abu Rajab, Lucas Ballard, Nav Jagpal, Panayiotis Mavrommatis,. Daisuke Nojiri, Niels Provos, Ludwig Schmidt. Present by Li Xu. 2. Detecting Malicious Web Sites. Which pages are safe URLs for end users?. Zhenhai Duan. Department of Computer Science. Florida State University. Outline. Motivation and background. SPOT algorithm on detecting compromised machines. Performance evaluation . Summary. 2. Motivation. Lydia Song, Lauren Steimle, . Xiaoxiao. . Xu. Outline. Introduction to Project . Pre-processing . Dimensionality Reduction. Brief discussion of different algorithms. K-nearest. D. ecision tree. Logistic regression. Kurt Thomas. , Chris Grier, . Vern Paxson, Dawn Song. University of California, Berkeley. International Computer Science Institute. Motivation. Social networks are regular targets for abuse. 26% of URLs on Twitter lead to spam. Hongyu. . Gao. , . Yan . Chen, Kathy Lee, Diana . Palsetia. . and . Alok. . Choudhary. Lab for Internet and Security Technology (LIST). Department of EECS. Northwestern University. Background. 2. Background. Author : Kirill . Levchenko. , Andreas . Pitsillidis. , . Neha. . Chachra. , Brandon Enright, . M’ark. . F’elegyh’azi. , Chris Grier, Tristan Halvorson, Chris . Kanich. , Christian . Kreibich. Ethan Grefe. December . 13, . 2013. Motivation. Spam email . is constantly cluttering inboxes. Commonly removed using rule based filters. Spam often has . very similar characteristics . This allows . Suranga Seneviratne. . . ✪. , . Aruna. Seneviratne . . ✪. , . Mohamed Ali (Dali) . Kaafar. . . , . Anirban. . Mahanti. . . , . Prasant. . Mohapatra. . ★. UNSW. . NICTA. , Australia. Botnet. and the Rise of Social Malware. Kurt Thomas. kthomas@cs.berkeley.edu. David M. . Nicol. dmnciol@illinois.edu. Motivation. Online social networks becoming attractive target for scams. Unprotected population. Alex Beutel. Joint work with Kenton Murray, . Christos . Faloutsos. , Alex . Smola. April 9, 2014 – Seoul, South Korea. Online Recommendation. 2. 5. Users. Movies. 5. 3. 5. 5. 2. Online Rating Models. Detecting and Characterizing Social Spam Campaigns Hongyu Gao , Jun Hu , Christo Wilson , Zhichun Li , Yan Chen and Ben Y. Zhao Northwestern University, US Northwestern / Huazhong Univ. Amir . Houmansadr. CS660: Advanced Information Assurance. Spring 2015. Content may be borrowed from other resources. . See the last slide for acknowledgements!. Our Knowledge of Spam. What do we know about spam?.

Download Document

Here is the link to download the presentation.
"Spam Campaign Cluster Detection Using Redirected URLs and R"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents