SlideShare una empresa de Scribd logo
1 de 30
Claudiu MUSAT, Ionut GRIGORESCU, Carmen MITRICA, Alexandru TRIFAN Spam Clustering  using  Wave Oriented K Means
You’ll be hearing quite a lot about… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
You’ll be hearing quite a lot about… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
You’ll be hearing quite a lot about… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
And we’ll connect the dots
But the essence is… ,[object Object],[object Object]
And finally some result charts
[object Object],[object Object],[object Object],Spam signatures
Spam signatures (2) ,[object Object],[object Object],[object Object]
Spam features ,[object Object],[object Object],[object Object],[object Object]
Email Layout ,[object Object],[object Object],[object Object],[object Object],[object Object]
Other Spam Features - headers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Spam Features – body ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Combining features (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],fasces lictoriae  (bundles of the lictors)
Combining features (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why cluster spam? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
So why agglomerative? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
K-means and K-medoids ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An Example ,[object Object],[object Object]
Our old model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WOKM – Wave oriented K-Means ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WOKM – How does it work ? ,[object Object],[object Object],[object Object],[object Object]
The spam corpus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The training phase ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What’s worth remembering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results ,[object Object]
Results(2) ,[object Object],[object Object]
Results(3) ,[object Object]
And finally the promised charts
And finally the promised charts (2)

Más contenido relacionado

Similar a Spam Clustering

Practical Knowledge Representation
Practical Knowledge RepresentationPractical Knowledge Representation
Practical Knowledge Representation
butest
 
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionDo Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
Bitdefender
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
butest
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
butest
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
butest
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
butest
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
butest
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
butest
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
butest
 

Similar a Spam Clustering (20)

Practical Knowledge Representation
Practical Knowledge RepresentationPractical Knowledge Representation
Practical Knowledge Representation
 
Chatbot ppt
Chatbot pptChatbot ppt
Chatbot ppt
 
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
 
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionDo Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
 
Implementing the Genetic Algorithm in XSLT: PoC
Implementing the Genetic Algorithm in XSLT: PoCImplementing the Genetic Algorithm in XSLT: PoC
Implementing the Genetic Algorithm in XSLT: PoC
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Good++
Good++Good++
Good++
 
Email
EmailEmail
Email
 
Micro services
Micro servicesMicro services
Micro services
 
Cartographer, or Building A Next Generation Management Framework
Cartographer, or Building A Next Generation Management FrameworkCartographer, or Building A Next Generation Management Framework
Cartographer, or Building A Next Generation Management Framework
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
 
lec21.ppt
lec21.pptlec21.ppt
lec21.ppt
 

Más de Bitdefender

E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012
Bitdefender
 
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Bitdefender
 
Cyberthreats 2009
Cyberthreats 2009Cyberthreats 2009
Cyberthreats 2009
Bitdefender
 
Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefenderSuita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefender
Bitdefender
 
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
Bitdefender
 
Noile Campuri De Lupta Ale Amenintarilor Informatice
Noile Campuri De Lupta Ale Amenintarilor InformaticeNoile Campuri De Lupta Ale Amenintarilor Informatice
Noile Campuri De Lupta Ale Amenintarilor Informatice
Bitdefender
 
Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0
Bitdefender
 
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatateAtacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
Bitdefender
 
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
Bitdefender
 

Más de Bitdefender (10)

E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012
 
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
 
Cyberthreats 2009
Cyberthreats 2009Cyberthreats 2009
Cyberthreats 2009
 
Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefenderSuita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefender
 
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
 
Noile Campuri De Lupta Ale Amenintarilor Informatice
Noile Campuri De Lupta Ale Amenintarilor InformaticeNoile Campuri De Lupta Ale Amenintarilor Informatice
Noile Campuri De Lupta Ale Amenintarilor Informatice
 
Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0
 
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatateAtacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
 
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
 
Phishing101
Phishing101Phishing101
Phishing101
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Spam Clustering