PPT-Countering Spam by Technical Means

Author : jewelupper | Published Date : 2020-06-19

Zhang Yanbin SG17Q5 Rapporteur Geneva Switzerland March 2016 M ain Content C hapter 1 Introduction of Spam C hapter 2 The Objective and Mission for Q5 C hapter

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Countering Spam by Technical Means" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Countering Spam by Technical Means: Transcript


Zhang Yanbin SG17Q5 Rapporteur Geneva Switzerland March 2016 M ain Content C hapter 1 Introduction of Spam C hapter 2 The Objective and Mission for Q5 C hapter 3 The Position of Specific Projects in Q5. Filtering. Service. Kurt Thomas. , Chris Grier, Justin Ma,. Vern . Paxson. , Dawn Song. University of California, Berkeley. International Computer Science Institute. Motivation. Social Networks. (. Facebook, Twitter). (Machine Learning). COS 116, Spring . 2012. Adam Finkelstein. Artificial Intelligence. Definition of AI (Merriam-Webster). :. The capability of a machine to imitate intelligent human . behavior. Branch . A social initiative against mobile spam. Problem. Mobile revolution in India led to sharp decline in cost of SMS/Call. It makes sense to advertise on mobile.. Spam SMS and calls.. Gross infringement of customer’s privacy.. Hongyu. . Gao. , . Yan . Chen, Kathy Lee, Diana . Palsetia. . and . Alok. . Choudhary. Lab for Internet and Security Technology (LIST). Department of EECS. Northwestern University. Background. 2. Background. Distortion of search results . by “spam farms” and “hijacked” links. (aka. search engine optimization). page to be. “. promoted. ”. . boosting. pages. (spam farm). Susceptibility to manipulation and lack of trust model . Author : Kirill . Levchenko. , Andreas . Pitsillidis. , . Neha. . Chachra. , Brandon Enright, . M’ark. . F’elegyh’azi. , Chris Grier, Tristan Halvorson, Chris . Kanich. , Christian . Kreibich. Almaty, Kazakhstan. 27 September, 2016. OSCE Framework on Countering VERLT. 2001 Bucharest Plan of Action. 2007 Ministerial Statement in Support to the Implementation of UN Global Counter Terrorism Strategy. Ethan Grefe. December . 13, . 2013. Motivation. Spam email . is constantly cluttering inboxes. Commonly removed using rule based filters. Spam often has . very similar characteristics . This allows . Suranga Seneviratne. . . ✪. , . Aruna. Seneviratne . . ✪. , . Mohamed Ali (Dali) . Kaafar. . . , . Anirban. . Mahanti. . . , . Prasant. . Mohapatra. . ★. UNSW. . NICTA. , Australia. rhetorical context?. SPAM . is a set of tools we’ll use to look at . rhetorical context . and make decisions about how to best communicate our ideas. .. S. ituation:. P. urpose:. A. udience:. M. ode:. Spam is unsolicited . e. mail in the form of:. Commercial advertising. Phishing. Virus-generated . Spam. Scams. E.g. Nigerian Prince who has an inheritance he wishes to share. What is Bulk Email?. Bulk . 100 billion spam email per day. Easy to setup spam networks. Low cost of operation. Millions of dollars worth of time and . equipment to combat spam. Techniques used to combat spam. header tests. address whitelist/blacklist. Atliay. Betül . Delalic. Nijaz. PS Kryptographie und IT Sicherheit SS17. 1. INHALT. Definition . . Arten . Funktionsweise . T. echnische Voraussetzungen. . Auswirkungen . . Kosten . Rechtslage . Amir . Houmansadr. CS660: Advanced Information Assurance. Spring 2015. Content may be borrowed from other resources. . See the last slide for acknowledgements!. Our Knowledge of Spam. What do we know about spam?.

Download Document

Here is the link to download the presentation.
"Countering Spam by Technical Means"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents