Evaluation of Spam Detection and Prevention Frameworks for Email and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Description At My Studiyo you can create interactive quiz content for your website or blog quickly and easily.
The Big Idea for the “Emerging Young Artists” is to do SMART marketing using digital marketing avenues. The idea is to create awareness and increase.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
MAIN MESSAGE key reasons enumerated ->please read speaker notes Research. Report. Reposit. Deposit your scholarly research - it’s as easy as 1, 2, 3 id.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
All Things Search Attracting and understanding website visitors.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Search Engines and Information Retrieval
Information Retrieval in Practice
Computer Security Fundamentals
SEO PACKAGES. Types of Plans Starter Plan Business Plan Enterprises Plan.
CS246 Link-Based Ranking. Problems of TFIDF Vector  Works well on small controlled corpus, but not on the Web  Top result for “American Airlines” query:
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
1 Opinion Spam and Analysis (WSDM,08)Nitin Jindal and Bing Liu Date: 04/06/09 Speaker: Hsu, Yu-Wen Advisor: Dr. Koh, Jia-Ling.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Search Engines and Information Retrieval Chapter 1.
SpotRank : A Robust Voting System for Social News Websites
Security Evaluation of Pattern Classifiers under Attack.
Websitewala.com Welcome to. The purpose of your website is to develop a valuable set of information sources that provides information and news about your.
Login / Upload / Share Deposit your scholarly research - it’s as easy as 1, 2, 3 MAIN MESSAGE key reasons enumerated ->please read speaker notes id / who.
James Williams e: eTutor Project SUMMARY OF KEY FINDINGS for 2 Pilot studies of the.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Use of Electronic and Internet advertising options Standard 3.4.
Moral, Social and Ethical issues associated with the Internet
Overview of this morning What … is computing? Why … is computing an important skill to learn? What … will my child be learning in computing lessons?
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Mr. Verlin Overbrook High School October 9, 2015.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Advertising 1 *The red circles show the position of the keyframes on the timeline. What are banner and pop-up advertisements? 1 Answer Banner and pop-up.
HoneySpam 2.0 Profiling Web Spambot Behaviour Pedram Hayati Kevin Chai Vidyasagar Potdar Alex Talevsky Prof. Tharam Dillon Prof. Elizabeth Chang Digital.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
What is Spam? d min.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Computer Skills and Applications Computer Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Search Engine Marketing Past Current Future & Tactics.
Spamdexing
Cybersecurity Test Review Introduction to Digital Technology.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Search Engine Optimization Presented By:- ARKA Softwares Effective! Affordable! Time Groove
Where Is the Best internet marketing services Miami?
Now Hire Digital Marketing Experts at Developers2Hire.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Gmail is one of the finest service which is free, advertising-supported service developed by google. User can easily access gmail on the web.
A Successful Digital Marketing Strategy in 2017
Welcome Nanoarch Software Solutions Pvt.Ltd
Network security threats
CONTENT CREATION Standard 3.
How to Grow and Enhance Your Business by Means of Digital Marketing Exltech,Pune.
Internet Safety Vocabulary
Use of Electronic and Internet advertising options
in. SEO is the process of optimizing the website in top search engines like Google, Bing, Yahoo, etc. The experts aim to index the website.
HOW DO I KEEP MY COMPUTER SAFE?
Protecting Senior Citizens from Phishing s
Computer Security.
Online Marketing Strategy – Growth online Business.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Phishing, Pharming, and Spam
Presentation transcript:

Evaluation of Spam Detection and Prevention Frameworks for and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and Business Intelligence (DEBI) Institute Curtin University of Technology

Outline INTRODUCTION SPAMMING MOTIVATIONS ANTI-SPAM STRATEGIES SPAM – SPAM METHODS – SPAM SURVEY IMAGE SPAM –IMAGE SPAM METHODS –IMAGE SPAM SURVER CONCLOUSION

INTRODUCTION Rapid adoption of the Internet The ease with which content can be generated and published has also made it easier to create spam. Spam can be simply stated as information which does not add value to the web user E.g. inappropriate, unsolicited, repeated and irrelevant content in messages, search results, blogs, forums, social communities and product reviews. the aim of this paper is to survey the current literature in the field of anti-spam with focus on specific anti-spam techniques used in spam and image spam.

SPAMMING MOTIVATIONS Revenue Generation –publishing advertisements on websites. Google AdSense™ Higher Search Engine Ranking –incorporate search engine optimization techniques to get their website a higher rank in search results Promoting Products and Services –spammers are paid by companies to promote their products or services Stealing Information –setup hidden programs in user’s computers to gain back door entry Phishing –to steal sensitive information (such as credit card numbers, password, etc.)

ANTI-SPAM STRATEGIES Spam Detection Strategy –Try to identify the likelihood of spam in a system either automatically or manually Spam Prevention Strategy –Deal with the problem of spam in different way. In this strategy, system designers create challenges for the spammers and make spamming a difficult task

ANTI-SPAM STRATEGIES Spam Detection StrategySpam Prevention Strategy

SPAM spam refers to sending irrelevant, inappropriate and unsolicited messages to numerous people Low entrance barrier and low cost of sending s, which makes it one of the most popular forms of spam The purpose of spam is advertising, promotion, and spreading backdoors or malicious programs

SPAM METHODS

SPAM SURVEY Majority of methods are detection based. Majority is not suitable for non-English language. Behaviour-based methods can not detect spam on the fly and spammers can manipulate their behavior to game the system easily.

IMAGE SPAM Spammers put their spam content into the images. They embed text such as advertisement text in the images and attach these images to s. Anti-spam filters that analyse content of cannot detect spam text in images

IMAGE SPAM METHODS

IMAGE SPAM SURVEY OSR-based methods are vulnerable to content obscuring tactics and reasonably slow. Meta-based methods can be easily exploit by changing image file attributes. Template-based methods are vulnerable to real world images.

CONCLOUSION Behaviour-based methods need time to create user profile can not detect spam on the fly. Needed methods to detect spam on non- English content. OSR-based methods are slow and vulnerable. Template-based methods are vulnerable to real world images

Thanks! Any Questions?