期刊文献+

基于Hadoop和Mahout的钓鱼邮件检测技术研究 被引量:2

Research of Phishing-Mail Detection Based on Hadoop and Mahout
下载PDF
导出
摘要 随着因特网的日益发展,网络空间的安全形势也愈发严峻。其中,以盗取用户敏感信息或者用户名口令为目的的网络钓鱼活动是网络犯罪行为中危害较大、影响较为严重的一种。针对网络钓鱼频发的现状,文中提出了一种基于Hadoop和mahout的钓鱼邮件检测方法,此方法采用hadoop平台的HDFS作为存储基础,Map Reduce作为并行计算框架.该方法对邮件信息进行特征提取,利用mahout的贝叶斯算法对钓鱼邮件进行检测。使用真实邮件数据集对该方法进行测试,取得了良好的效果。 With the development of the Internet, the network space safety situation is increasingly serious.Phishing with purpose of stealing users' sensitive information and password is one of cyber crime acitivity which harm a lot.In view of the situation of frequent phishing, this paper puts forward a fishing mail detection method based on Hadoop and mahout.This method uses the HDFS of Hadoop platform as the foundation of storage, Map Reduce as the parallel computing framework.It extracts feature for E-mail messages and uses the bayesian algorithm of mahout to test the phishing emails.Using real email data set to test the method which has obtained good effect.
出处 《电脑知识与技术(过刊)》 2016年第4X期27-30,共4页 Computer Knowledge and Technology
关键词 网络钓鱼 HADOOP mahout 贝叶斯分类 phishing hadoop mahout bayesian classification
  • 相关文献

参考文献7

  • 1Giacomelli P.Apache mahout cookbook. . 2013
  • 2Lam C.Hadoop in action. . 2010
  • 3M J Berry,G Linoff.Data Mining Techniques:For Marketing,Sales,and Customer Support. . 1997
  • 4翟军昌,秦玉平,王春立.改进的朴素贝叶斯垃圾邮件过滤算法[J].计算机工程与应用,2009,45(14):145-148. 被引量:11
  • 5White T Hadoop.The definitive guide. . 2012
  • 6Anil R,Dunning T,Friedman E.Mahout in action. . 2011
  • 7Harrington P.Machine learning in action. . 2012

二级参考文献11

  • 1王斌,潘文锋.基于内容的垃圾邮件过滤技术综述[J].中文信息学报,2005,19(5):1-10. 被引量:129
  • 2王涛,裘国永,何聚厚.基于改进Nave Bayes的垃圾邮件过滤模型研究[J].计算机工程与应用,2007,43(13):186-190. 被引量:10
  • 3Sahami M,Dumais S,Heckerman D,et al.A Bayesian approach to filtering Junk e-mail[C]//Learning for Text Categorization:Papers from AAAI Workshop,Madison,Wisconsin,1998:55-62.
  • 4Androutsopoulos I,Koutsias J,Chandrinos K V,et al.An evaluation of Naive Bayesian anti-spare fihering[C]//Proc of the Workshop on Machine Learning in the New Information Age,lhh European Conference on Machine Leaming(ECML'00),Barcelona,Spain,June 3,2000:9-17.
  • 5Vangelis M,Androutsopoulos I,Georgios P.Spam filtering with Naive Bayes-which Naive Bayes?[C]//CEAS 2006 Third Conference on Email and AntiSpam(CEAS 2006),Mountain View,California,USA, July 27-28,2006.
  • 6Schneider K.A comparison of event models for Naive Bayes antispare e-mail fihering[C]//Procedings of the 10th Conference of the European Chapter of the Association for Computational Linguistics (EACL'03) ,2003:307-314.
  • 7Zorkadis V,Karras D A.Efficient information theoretic extraction of higher order features for improving neural network-based spare e-mail categorization[J].Journal of Experimental & Theoretical Artificial Intelligence,2006,18(4):523-534.
  • 8Mitchell T M.机器学习[M].曾华军,张银奎,译.北京:机械工业出版社,2008:40-43.
  • 9Ma Wan-li,Dat T,Dharmendra S,et al.Ou extendable software architecture for spam email filtering[J].IAENG International Journal of Computer Science, 2007,34( 1 ) : 133-139.
  • 10Cook D,Hartnett J,Manderson K,et al.Catehing spare before it arrives:Domain specific dynamic blacklists[C]//the Fourth Australasian Information Security Workshop(Network Security)(AISW-NetSec 2006 ), 2006,54: 193 -202.

共引文献12

同被引文献15

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部