首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
    
The fast growth of mobile networks has greatly enriched our life by disseminating information and providing communications at any time and anywhere. However, at the same time, when people gather and exchange useful information, they also receive unwanted data and contents, such as spam and unsolicited commercial advertisements. SMS (Short Message Service) spam is one typical example of unwanted contents, which has caused a serious problem to mobile users by intruding their devices, occupying device memories and irritating the users. More critically, some of these fraudulent messages deceive users and cause them incalculable loss. SMS spam control has become a crucial issue that impacts the further success of mobile networks. A number of researches have been conducted to control unwanted contents or traffic, some are based on trust and reputation mechanisms. But the literature still lacks an effective solution for SMS spam control. In this paper, we present the design and implementation of an SMS spam control system named TruSMS based on trust management. It can control SMS spam from its source to destinations according to trust evaluation by analyzing spam detection behaviors and SMS traffic data. We evaluate TruSMS performance under a variety of intrusions and attacks with a prototype system implementation. The result shows that TruSMS is effective with regard to accuracy, efficiency and robustness, which imply its trustworthiness.  相似文献   

2.
基于贝叶斯理论的垃圾邮件过滤技术   总被引:12,自引:0,他引:12  
垃圾邮件已成为损耗生产力的问题,反垃圾邮件技术不断出现,基于贝叶斯理论的垃圾邮件过滤技术有其独特的优势,研究针对中文的贝叶斯垃圾邮件过滤技术具有理论和现实的意义。  相似文献   

3.
一种快速的基于URL的垃圾邮件过滤系统   总被引:2,自引:0,他引:2  
垃圾邮件是当前Internet上关注一个焦点问题,随着垃圾邮件的伪装技术的不断更新,以前主要的几种垃圾邮件过滤技术面临着新的挑战。针对目前垃圾邮件大都含有要宣传网站的URL地址的特点,我们构建了一个基于URL的垃圾邮件过滤系统,通过查询邮件中是否含有URL黑名单中的URL地址,来识别垃圾邮件。在URL地址查询过程中,采用Hplf散列函数来加速查询。通过试验测试,该系统能有效地减少垃圾邮件的数量。  相似文献   

4.
中文垃圾邮件过滤综合方法   总被引:1,自引:0,他引:1  
随着电子邮件在人们生活中的广泛应用,垃圾邮件的危害也日益引起人们的重视。目前,已经有一些过滤系统在英文环境中取得了较好的过滤效果,但在中文环境中,过滤效果不够理想。针对中文垃圾邮件,提出一种将基于IP的白名单过滤、基于规则的SpamAssassin过滤、基于统计的贝叶斯过滤结合在一起的垃圾邮件综合过滤方法,并在Linux下的实验中取得良好的过滤效果。  相似文献   

5.
6.
前置式邮件过滤系统的设计与实现   总被引:2,自引:0,他引:2  
针对互联网垃圾邮件泛滥的现状,该文设计了一种新的前置式邮件过滤系统。该系统独立于原邮件服务器,动态统计各SMTP客户端的发信频率,同时使用基于有限自动机的DFSA算法,快速过滤各种常见汉字编码的电子邮件。对于拦截信件,系统开放必要的邮件转发恢复操作,从而把误拦正常信件的可能性降至最低。该文最后给出系统实现并且进行性能验证。  相似文献   

7.
汪霞  郑宁  徐明  陈默 《计算机应用与软件》2010,27(1):105-107,130
针对特征词变异的中文垃圾邮件问题,提出了一种基于变形特征词匹配还原的新贝叶斯邮件过滤算法。改进的模型能自动发现邮件中的变异特征词,并根据对应的变异类型还原算法将其还原,避免了变异特征词的匹配逃脱。算法提高了对于含有拼音替换、同音字替换、符号插入等变形特征词样本的分类准确率。实验表明,改进的过滤算法比普通贝叶斯算法有更好的性能。  相似文献   

8.
随着人们对电子邮件的依赖性越来也高,垃圾邮件的过滤已经成为了目前亟须重视和解决的问题。自从图像垃圾邮件出现后,已经有一些学者对其过滤方法进行了研究,并且也取得了一定的成果,本文主要以特征提取来过滤图像垃圾邮件进行阐述。  相似文献   

9.
In their arms race against developers of spam filters, spammers have recently introduced the image spam trick to make the analysis of emails’ body text ineffective. It consists in embedding the spam message into an attached image, which is often randomly modified to evade signature-based detection, and obfuscated to prevent text recognition by OCR tools. Detecting image spam turns out to be an interesting instance of the problem of content-based filtering of multimedia data in adversarial environments, which is gaining increasing relevance in several applications and media. In this paper we give a comprehensive survey and categorisation of computer vision and pattern recognition techniques proposed so far against image spam, and make an experimental analysis and comparison of some of them on real, publicly available data sets.  相似文献   

10.
基于CART算法的垃圾邮件过滤模型设计与实现   总被引:1,自引:0,他引:1  
介绍分类与回归树(CART)算法在垃圾邮件过滤中的应用。首先对样本邮件进行文本预处理,并对正常邮件和垃圾邮件训练集进行训练,用CART算法建立单分类器模型,随后又采用Boosting思想组合CART算法建立多分类器模型。对比实验表明,基于CART算法的多分类器模型效果更好。  相似文献   

11.
王亮 《物联网技术》2012,(9):69-71,75
随着我国航空运输业的蓬勃发展及飞行流量的急剧增加,空中交通流量管理问题日益突出。对空中交通流量管理系统效果进行评估,需要从科学、客观、实用的角度来建立空中交通流量管理系统效果评估指标。文中根据目前国内外采用的空中交通流量评估指标,分别从含义、统计方法、计算方法、解决方案及意义等不同角度,对空中交通流量评估指标进行了分析和研究。  相似文献   

12.
为了能够有效提取邮件样本集的特征及提高垃圾邮件过滤系统的性能,介绍基于N—Gram的切分算法及语言模型,在其基础上,提出了一种改进的N—Gram切分算法,给出了一种结合N—Gram语言模型的贝叶斯过滤模型。实验结果表明,提出的方法有效地提高了垃圾邮件过滤的性能。  相似文献   

13.
针对文本流分类中的概念漂移问题,以垃圾邮件过滤为应用背景,提出一种能适应概念漂移的垃圾邮件基于案例推理CBR(Case-based Reasoning)过滤算法。算法采用CBR过滤垃圾邮件,研究CBR过程中的案例库管理技术,提出基于惩罚降噪和等价除冗的案例库修正算法,以适应概念漂移问题。在真实数据集上的实验验证了提出的案例修正算法获得的垃圾邮件过滤效率的提高,可以更好地解决垃圾邮件中的概念漂移问题。  相似文献   

14.
一种基于AIS和Bayes网络的垃圾邮件过滤算法   总被引:3,自引:0,他引:3  
将人工免疫系统和贝叶斯网络相结合应用于垃圾邮件的过滤,设计了一个基于AIS和Bayes网络的垃圾邮件过滤算法,分析并解决了该算法实现过程中的关键问题,给出了亲和力的计算方法和抗原/抗体的结构定义。在PU1bare 语料的基础上与Carreras提出的AdaBoost方法进行对比实验,最后给出了实验结果。  相似文献   

15.
徐培  廉彬  邵堃  陈俊  安宁 《计算机科学》2015,42(12):157-161
信任关系模型无论是在现实生活中还是在开放网络中都是最复杂的社会关系模型之一,是一个很难度量的抽象的心理认知,因为它涉及假设、期望、行为和环境等多种因素。借鉴以往的研究经验,综合考虑多种信任关系要素,提出了一种新的面向决策的信任融合模型。该模型基于直接信任度、间接信任度和信誉值的演化,依据信任融合获得决策信任度,为主体评判下一次的交互提供依据。为了证明信任融合模型的有效性,假设客体在ω类活动中以期望为PωX的概率从事该项活动。实验证明,信任融合模型得到的决策信任度和客体可信度的差异明显小于直接信任度、间接信任度或信誉值。  相似文献   

16.
Yingfei  Changho  Zhi-Li 《Computer Networks》2006,50(18):3622-3641
One of key security issues on the current Internet is unwanted traffic, the forerunner of unauthorized accesses, scans, and attacks. It is vitally important but extremely challenging to fight such unwanted traffic. We need a series of defensive mechanisms to identify unwanted packets, filter them out, and further defeat their associated attacks. In this paper, we propose a lightweight, scalable packet authentication mechanism, named Lightweight Internet Permit System (LIPS), as a first line of defense to effectively filter out the most common forms of unwanted traffic, spoofed and unsolicited packets, such that in-depth security schemes can take care of the remaining issues more efficiently. LIPS is a simple extension of IP, in which each packet carries an access permit issued by its destination host or gateway, and the destination verifies the access permit to determine to accept or drop the packet. LIPS provides preliminary traffic-origin accountability that supports two salient features to confine unwanted traffic: (1) filter out the most common forms of unwanted packets and defeat associated attacks; (2) help us identify compromised hosts/domains such that we are able to build active defense schemes to deal with various attacks through real-time inter-domain collaboration. In this paper, we first present the design and prototype implementation of LIPS on Linux 2.4 kernel, and then use analysis, simulations, and experiments to demonstrate the efficacy of LIPS in protecting critical resources with light overheads.  相似文献   

17.
基于差分贡献的垃圾邮件过滤特征选择方法   总被引:7,自引:0,他引:7  
垃圾邮件过滤本质上是一个二类文本分类问题,特征选择是其一个重要的组成部分。针对垃圾邮件过滤问题的特殊性,基于“差分贡献”的思想对文档频数和互信息量这两种传统的特征选择方法进行了改进,设计了新的垃圾邮件过滤特征选择方法。实验结果表明,基于差分贡献的特征选择方法使得垃圾邮件过滤的精度得到了有效的提高。  相似文献   

18.
朴素Bayes邮件过滤算法由于简单、易于理解,已被人们广泛接受,并应用到一些商用邮件系统当中.但面对目前垃圾邮件问题依然严重的现状,人们逐渐开始认识到采用简单的朴素Bayes邮件过滤算法已不能满足现有邮件过滤的性能要求.Bayes网络一直以来作为知识发现的一个重要分支,是人们研究的热点;邮件过滤问题也可以映射到一个Bayes决策网络模型中.通过构建针对邮件过滤的Bayes决策网络模型,并经过概率学习对关键节点作Bayes参数估计,可以实现邮件的概率分类发现.邮件样本试验结果表明新算法与朴素Bayes邮件过滤算法相比具有更快的收敛速度和更高的稳定性.  相似文献   

19.
一个软件服务协同中的信任管理框架设计   总被引:3,自引:3,他引:0  
Internet-based Web application systems are gradually built as software service coordination systems. In an open, dynamic and collaborative application environment, traditional methods assumed with closeness, centralization and independence are not able to cope with these security problems efficiently. Trust management is a new method for dealing with security issues of open, distributed network application system. However, the traditional policy-based trust management systems have some shortcomings, i.e. complex in policy making, unable to deal with negative se-curity credentials, etc. So, we design a trust management framework in combination with subjective trust model for software service coordination and security decision in Internet environment. This trust management framework has characteristics of operability, reasonability, and flexibility in policy setting.  相似文献   

20.
王勇  侯洁  白杨  夏云  秦志光 《计算机科学》2013,40(2):103-107
用户对P2P网络安全性的需求刺激了信任模型的发展。在分析现有信任模型的基础上,提出了基于反馈相关性的动态信任模型—CoDyTrust。其在时间帧的基础上,采用虚假信任过滤机制和信任聚合机制,并在信任值计算中引入信任相关系数、信任遗忘因子、滥用信任值和推荐信任度等,通过反馈控制机制动态调节这些模型因子,在准确评价节点对不同资源信任的同时,实现网络中恶意行为检测。比较分析结果表明,CoDyTrust能够更好地反映网络中节点行为,准确检测恶意节点,有效抵御振荡、撒谎和合谋等攻击。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号