PPT-Detecting and Characterizing Social Spam Campaigns

Author : yoshiko-marsland | Published Date : 2015-10-14

Hongyu Gao Jun Hu Christo Wilson Zhichun Li Yan Chen and Ben Y Zhao Northwestern University US Northwestern Huazhong Univ of Sci amp Tech China

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Detecting and Characterizing Social Spam..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Detecting and Characterizing Social Spam Campaigns: Transcript


Hongyu Gao Jun Hu Christo Wilson Zhichun Li Yan Chen and Ben Y Zhao Northwestern University US Northwestern Huazhong Univ of Sci amp Tech China. Doing this manually is error prone and does not scale to the sizes of todays app stores In this paper we design a system called DECAF to auto matically discover various placement frauds scalably and effectively DECAF uses automated app navigation to Filtering. Service. Kurt Thomas. , Chris Grier, Justin Ma,. Vern . Paxson. , Dawn Song. University of California, Berkeley. International Computer Science Institute. Motivation. Social Networks. (. Facebook, Twitter). Zhenhai Duan. Department of Computer Science. Florida State University. Outline. Motivation and background. SPOT algorithm on detecting compromised machines. Performance evaluation . Summary. 2. Motivation. Baishakhi Ray. *. , Miryung Kim. *. , Suzette Person. +. , Neha Rungta. !. *. The University of Texas at Austin. +. NASA . Langley Research Center . ! . NASA . Ames Research Center . Motivation. Port code from . Kurt Thomas. , Chris Grier, . Vern Paxson, Dawn Song. University of California, Berkeley. International Computer Science Institute. Motivation. Social networks are regular targets for abuse. 26% of URLs on Twitter lead to spam. Wang. , Christo Wilson, Xiaohan . Zhao, Yibo . Zhu, Manish Mohanlal, Haitao . Zheng . and Ben Y. . Zhao. Computer Science Department, UC. . Santa . Barbara. Serf . and Turf: . Crowdturfing. . for Fun and Profit. Hongyu. . Gao. , . Yan . Chen, Kathy Lee, Diana . Palsetia. . and . Alok. . Choudhary. Lab for Internet and Security Technology (LIST). Department of EECS. Northwestern University. Background. 2. Background. Distortion of search results . by “spam farms” and “hijacked” links. (aka. search engine optimization). page to be. “. promoted. ”. . boosting. pages. (spam farm). Susceptibility to manipulation and lack of trust model . Zhao, Yibo . Zhu, Manish Mohanlal, Haitao . Zheng . and Ben Y. . Zhao. Computer Science Department, UC. . Santa . Barbara. Serf . and Turf: . Crowdturfing. . for Fun and Profit. . Review posted on Yelp. Spatio. -temporal Network-level Automatic Reputation Engine. Shuang. . Hao. , . Nadeem. Ahmed Syed, Nick . Feamster. , Alexander G. Gray, Sven . Krasser. Klevis Luli. SNARE Overview. Sender reputation . By . Gianluca. . Stringhini. , . Christopher . Kruegel. and Giovanni . Vigna. Presented By Awrad Mohammed Ali. 1. Introduction.. The Popular Social Networks.. Data Collection.. Data Analysis.. Spam Bots Analysis.. Detecting and Characterizing Social Spam Campaigns Hongyu Gao , Jun Hu , Christo Wilson , Zhichun Li , Yan Chen and Ben Y. Zhao Northwestern University, US Northwestern / Huazhong Univ. Spam is unsolicited . e. mail in the form of:. Commercial advertising. Phishing. Virus-generated . Spam. Scams. E.g. Nigerian Prince who has an inheritance he wishes to share. What is Bulk Email?. Bulk . Atliay. Betül . Delalic. Nijaz. PS Kryptographie und IT Sicherheit SS17. 1. INHALT. Definition . . Arten . Funktionsweise . T. echnische Voraussetzungen. . Auswirkungen . . Kosten . Rechtslage .

Download Document

Here is the link to download the presentation.
"Detecting and Characterizing Social Spam Campaigns"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents