메뉴 건너뛰기




Volumn , Issue , 2008, Pages 339-348

Predicting web spam with HTTP session information

Author keywords

Classification; HTTP session information; Web spam

Indexed keywords

CLASSIFICATION; CLASSIFICATION RESULTS; CONTENT-BASED; CONTENTS OF WEB PAGE; EVALUATION RESULTS; FALSE POSITIVE RATES; IP ADDRESSS; LINK STRUCTURE; MALWARES; PREDICTIVE TECHNIQUES; SPAM CLASSIFICATION; SPAM DETECTION; STORAGE RESOURCES; WEB APPLICATION; WEB CRAWLERS; WEB GRAPHS; WEB MINING; WEB SPAM; WEB USERS;

EID: 70349233061     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1458082.1458129     Document Type: Conference Paper
Times cited : (27)

References (30)
  • 1
    • 84949626334 scopus 로고    scopus 로고
    • Spamscatter: Characterizing internet scam hosting infrastructure
    • D. S. Anderson et al. Spamscatter: Characterizing internet scam hosting infrastructure. In Proc. of Usenix Security '07, 2007.
    • (2007) Proc. of Usenix Security '07
    • Anderson, D.S.1
  • 2
    • 40949156882 scopus 로고    scopus 로고
    • Link-based characterization and detection of web spam
    • L. Becchetti et al. Link-based characterization and detection of web spam. In Proc. of AIRWeb '06, 2006.
    • (2006) Proc. of AIRWeb '06
    • Becchetti, L.1
  • 3
    • 34250660925 scopus 로고    scopus 로고
    • Spamrank - fully automatic link spam detection
    • A. A. Benczur et al. Spamrank - fully automatic link spam detection. In Proc. of AIRWeb '05, 2005.
    • (2005) Proc. of AIRWeb '05
    • Benczur, A.A.1
  • 4
    • 34547964237 scopus 로고    scopus 로고
    • A reference collection for web spam
    • C. Castillo et al. A reference collection for web spam. SIGIR Forum, 40(2), 2006.
    • (2006) SIGIR Forum , vol.40 , Issue.2
    • Castillo, C.1
  • 5
    • 36448992581 scopus 로고    scopus 로고
    • Know your neighbors: Web spam detection using the web topology
    • C. Castillo et al. Know your neighbors: Web spam detection using the web topology. In Proc. of SIGIR '07, 2007.
    • (2007) Proc. of SIGIR '07
    • Castillo, C.1
  • 6
    • 70349242810 scopus 로고    scopus 로고
    • Countering web spam with credibility-based link analysis
    • J. Caverlee and L. Liu. Countering web spam with credibility-based link analysis. In Proc. of PODC '07, 2007.
    • (2007) Proc. of PODC '07
    • Caverlee, J.1    Liu, L.2
  • 7
    • 34548791195 scopus 로고    scopus 로고
    • Spam-resilient web rankings via influence throttling
    • J. Caverlee, S. Webb, and L. Liu. Spam-resilient web rankings via influence throttling. In Proc. of IPDPS '07, 2007.
    • (2007) Proc. of IPDPS '07
    • Caverlee, J.1    Webb, S.2    Liu, L.3
  • 8
    • 8644220983 scopus 로고    scopus 로고
    • Recognizing nepotistic links on the web
    • B. D. Davison. Recognizing nepotistic links on the web. In Proc. of AIWS '00, 2000.
    • (2000) Proc. of AIWS '00
    • Davison, B.D.1
  • 9
    • 34250684576 scopus 로고    scopus 로고
    • Thwarting the nigritude ultramarine: Learning to identify link spam
    • I. Drost and T. Scheffer. Thwarting the nigritude ultramarine: Learning to identify link spam. In Proc. of ECML '05, 2005.
    • (2005) Proc. of ECML '05
    • Drost, I.1    Scheffer, T.2
  • 10
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • T. Fawcett. An introduction to ROC analysis. Pattern Recognition Letters, 27(8), 2006.
    • (2006) Pattern Recognition Letters , vol.27 , Issue.8
    • Fawcett, T.1
  • 11
    • 27344433890 scopus 로고    scopus 로고
    • Spam, damn spam, and statistics: Using statistical analysis to locate spam web
    • D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics: Using statistical analysis to locate spam web pages. In Proc. of WebDB '04, 2004.
    • (2004) Proc. of WebDB '04
    • Fetterly, D.1    Manasse, M.2    Najork, M.3
  • 13
    • 2942731012 scopus 로고    scopus 로고
    • An extensive empirical study of feature selection metrics for text classification
    • G. Forman. An extensive empirical study of feature selection metrics for text classification. The Journal of Machine Learning Research, 3, 2003.
    • (2003) The Journal of Machine Learning Research , vol.3
    • Forman, G.1
  • 14
    • 27344439205 scopus 로고    scopus 로고
    • Spam: It's not just for inboxes anymore
    • Z. Gyöngyi and H. Garcia-Molina. Spam: It's not just for inboxes anymore. Computer, 38(10), 2005.
    • (2005) Computer , vol.38 , Issue.10
    • Gyöngyi, Z.1    Garcia-Molina, H.2
  • 17
    • 0003257192 scopus 로고    scopus 로고
    • Webbase : A repository of web
    • J. Hirai. Webbase : A repository of web pages. In Proc. of WWW '00, 2000.
    • (2000) Proc. of WWW '00
    • Hirai, J.1
  • 18
    • 85164392958 scopus 로고
    • A study of cross-validation and bootstrap for accuracy estimation and model selection
    • R. Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. In Proc. of IJCAI '95, 1995.
    • (1995) Proc. of IJCAI '95
    • Kohavi, R.1
  • 20
    • 40249106140 scopus 로고    scopus 로고
    • A crawler-based study of spyware in the web
    • A. Moshchuk et al. A crawler-based study of spyware in the web. In Proc. of NDSS '06, 2006.
    • (2006) Proc. of NDSS '06
    • Moshchuk, A.1
  • 21
    • 85076893377 scopus 로고    scopus 로고
    • Spyproxy: Execution-based detection of malicious web content
    • A. Moshchuk et al. Spyproxy: Execution-based detection of malicious web content. In Proc. of Usenix Security '07, 2007.
    • (2007) Proc. of Usenix Security '07
    • Moshchuk, A.1
  • 22
    • 35549011670 scopus 로고    scopus 로고
    • Detecting spam web pages through content analysis
    • A. Ntoulas et al. Detecting spam web pages through content analysis. In Proc. of WWW '06, 2006.
    • (2006) Proc. of WWW '06
    • Ntoulas, A.1
  • 23
    • 70349236622 scopus 로고    scopus 로고
    • The ghost in the browser: Analysis of web-based malware
    • N. Provos et al. The ghost in the browser: Analysis of web-based malware. In Proc. of HotBots '07, 2007.
    • (2007) Proc. of HotBots '07
    • Provos, N.1
  • 24
    • 0016572913 scopus 로고
    • A vector space model for automatic indexing
    • G. Salton, A. Wong, and C. S. Yang. A vector space model for automatic indexing. Comm. of the ACM, 18(11), 1975.
    • (1975) Comm. of the ACM , vol.18 , Issue.11
    • Salton, G.1    Wong, A.2    Yang, C.S.3
  • 25
    • 33750356750 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • Y. M. Wang et al. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proc. of NDSS '06, 2006.
    • (2006) Proc. of NDSS '06
    • Wang, Y.M.1
  • 26
    • 84904820148 scopus 로고    scopus 로고
    • Introducing the webb spam corpus: Using email spam to identify web spam automatically
    • S. Webb, J. Caverlee, and C. Pu. Introducing the webb spam corpus: Using email spam to identify web spam automatically. In Proc. of CEAS '06, 2006.
    • (2006) Proc. of CEAS '06
    • Webb, S.1    Caverlee, J.2    Pu, C.3
  • 27
    • 84904821876 scopus 로고    scopus 로고
    • Characterizing web spam using content and http session analysis
    • S. Webb, J. Caverlee, and C. Pu. Characterizing web spam using content and http session analysis. In Proc. of CEAS '07, 2007.
    • (2007) Proc. of CEAS '07
    • Webb, S.1    Caverlee, J.2    Pu, C.3
  • 30
    • 0003141935 scopus 로고    scopus 로고
    • A comparative study of feature selection in text categorization
    • Y. Yang and J. O. Pederson. A comparative study of feature selection in text categorization. In Proc. of ICML '97, 1997.
    • (1997) Proc. of ICML '97
    • Yang, Y.1    Pederson, J.O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.