2012
DOI: 10.5815/ijisa.2012.10.03
|View full text |Cite
|
Sign up to set email alerts
|

Anti-Spam Software for Detecting Information Attacks

Abstract: Abstract-In this paper the develop ment of anti-spam software detecting information attacks is offered. For this purpose it is considered spam filtrat ion system with the multilayered, mu ltivalent architecture, coordinating all ISP's in the country. All users and ISPs of this system involved in spam filtration p rocess. After spam filtering process, saved spam templates are analyzed and classified. This parameterizing of spam temp lates give possibility to define the thematic dependence from geographical. For… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 22 publications
(11 reference statements)
0
2
0
Order By: Relevance
“…For cases where words and meanings do not map one on one, like in Chinese micro blogs, the trigrams of characters are taken as a point in reconstructing aggregate meanings. Such modern technique of information retrieval is referred to as Pointillism [22] and is particularly effective in detecting deviation from regular lexicon typically found in the social media.…”
Section: Filtering By Topics and Abstractmentioning
confidence: 99%
See 1 more Smart Citation
“…For cases where words and meanings do not map one on one, like in Chinese micro blogs, the trigrams of characters are taken as a point in reconstructing aggregate meanings. Such modern technique of information retrieval is referred to as Pointillism [22] and is particularly effective in detecting deviation from regular lexicon typically found in the social media.…”
Section: Filtering By Topics and Abstractmentioning
confidence: 99%
“…Ethical filtering has traditionally been manual blacklisting of IPs at the DNS, ISP and HTTP level in conservative countries in Asia and The Middle East like Pakistan (Nabi, 2013), Azerbaijan (Nazirova, 2012) and Syria (Chaabane et al, 2014). Although they don't cover all sites in question, other methods of filtering have problems of their own.…”
Section: Introductionmentioning
confidence: 99%