2016
DOI: 10.1109/mic.2016.53
|View full text |Cite
|
Sign up to set email alerts
|

Measuring, Characterizing, and Avoiding Spam Traffic Costs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…On a given day, millions of IPs are engaged in scanning behavior. Our improved models can aid cybersecurity analysts in determining which of these IPs are nefarious [118], the distribution of attacks in particular critical sectors [51], identifying spamming behavior [44], how to vaccinate against computer viruses New Phenomena in Large-Scale Internet Traffic 21 [8], obscuring web sources [52], identifying significant flow aggregates in traffic [26], and sources of rumors [95].…”
Section: Discussionmentioning
confidence: 99%
“…On a given day, millions of IPs are engaged in scanning behavior. Our improved models can aid cybersecurity analysts in determining which of these IPs are nefarious [118], the distribution of attacks in particular critical sectors [51], identifying spamming behavior [44], how to vaccinate against computer viruses New Phenomena in Large-Scale Internet Traffic 21 [8], obscuring web sources [52], identifying significant flow aggregates in traffic [26], and sources of rumors [95].…”
Section: Discussionmentioning
confidence: 99%
“…The next grasshopper position is computed based on its current position, all other grasshoppers' positions, and the best grasshopper's position obtained so far, as given in Eq. (7). Note that the first component of this equation considers the location of the current grasshopper with respect to other grasshoppers.…”
Section: A the Grasshopper Optimization Algorithmmentioning
confidence: 99%
“…This method uses a collection model to extract all non-spam and spam emails of each user and implement pre-processing to convert the e-mail using feature selection/extraction, dimensionality reduction, then classify the data into two vector sets. The final step in this method uses ML techniques to train and test the datasets in order to determine whether the incoming emails are spam or non-spam [7]; (3) Heuristic or Rule Based Spam Filtering, uses previously created rules or inferences to evaluate a large number of patterns that are usually regular expressions against the chosen message. Some score of the message is increased if the known patterns are found.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Spam prevents the user from making full and good use of time, storage capacity and network bandwidth. The huge volume of spam mails flowing through the computer networks have destructive effects on the memory space of email servers, communication bandwidth, CPU power and user time [2]. The menace of spam email is on the increase on yearly basis and is responsible for over 77% of the whole global email traffic [3].…”
Section: Introductionmentioning
confidence: 99%