{"id":1564,"date":"2023-03-12T21:23:10","date_gmt":"2023-03-12T21:23:10","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1564"},"modified":"2023-03-12T21:23:10","modified_gmt":"2023-03-12T21:23:10","slug":"a-szocialis-spam-felismeresenek-es-lekuzdesenek-legujabb-fejlemenyei","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/levelszemet\/a-szocialis-spam-felismeresenek-es-lekuzdesenek-legujabb-fejlemenyei\/","title":{"rendered":"A szoci\u00e1lis spam \u00e9szlel\u00e9s\u00e9nek \u00e9s lek\u00fczd\u00e9s\u00e9nek leg\u00fajabb fejlem\u00e9nyei"},"content":{"rendered":"<p>Spam refers to unwanted or unsolicited messages sent or received electronically via email, instant messaging, blogs, newsgroups, social media, web search, and mobile phones, with advertising fines, Phishing, Malware, etc. As is clear from the definition, Spam is intended for malice and generally represents a viable but fraudulent source of income for some individuals or organizations. The cyber attacker involved in sending such spam messages is generally referred to as a \u201cspammer.\u201d Although initially targeted and limited to email, spam has invaded all electronic platforms in all media.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-kinds-of-spam-exist-today\"><strong>Milyen t\u00edpus\u00fa spam l\u00e9tezik ma?<\/strong><\/h2>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>E-mail spam<\/strong>: m\u00e1s n\u00e9ven k\u00e9retlen lev\u00e9l, nem k\u00edv\u00e1nt \u00fczeneteket k\u00fcld, gyakran kereskedelmi tartalommal, nagy mennyis\u00e9gben, v\u00e1logat\u00e1s n\u00e9lk\u00fcli c\u00edmzetteknek.<\/li>\n\n\n\n<li><strong>Spam az azonnali \u00fczenetk\u00fcld\u00e9sben az azonnali \u00fczenetk\u00fcld\u0151ket (IM) haszn\u00e1lja:<\/strong> B\u00e1r finomabb, mint az e-mail megfelel\u0151je, hajlamos bosszantani az azonnali \u00fczenetk\u00fcld\u0151k, mint a Skype\u00a9, Yahoo!\u00ae \u00e9s Messenger felhaszn\u00e1l\u00f3it k\u00e9retlen \u00fczenetekkel hirdet\u0151kt\u0151l stb.<\/li>\n\n\n\n<li><strong>Spam a h\u00edrcsoportokban \u00e9s f\u00f3rumokon<\/strong>: a t\u00f6bbsz\u00f6r\u00f6s \u00e9s ism\u00e9tl\u0151d\u0151 bejegyz\u00e9sek a Usenet h\u00edrcsoportokban \u00e9s irrelev\u00e1ns internetes f\u00f3rumokon.<\/li>\n\n\n\n<li><strong>Mobiltelefon spam<\/strong>: Ez a spam forma r\u00f6vid \u00fczenet szolg\u00e1ltat\u00e1sokat (SMS) haszn\u00e1l, mint m\u0171k\u00f6d\u00e9si m\u00f3dj\u00e1t. N\u00e9ha az \u00fcgyfeleket pr\u00e9mium szolg\u00e1ltat\u00e1sok\u00e9rt sz\u00e1ml\u00e1zz\u00e1k ki, miut\u00e1n becsapj\u00e1k \u0151ket valamilyen hamis el\u0151fizet\u00e9ssel \u00e9s csal\u00e1ssal.<\/li>\n\n\n\n<li><strong>Spamdexel\u00e9s<\/strong>: a keres\u0151motor spamre vagy a keres\u0151motor rangsorol\u00e1si \u00e9s relevancia algoritmus\u00e1nak manipul\u00e1l\u00e1s\u00e1ra utal, hogy egy adott weboldalt vagy weboldalt n\u00e9pszer\u0171s\u00edtsen.<\/li>\n\n\n\n<li><strong>Splogok \u00e9s Wikik<\/strong>: A blogokon l\u00e9v\u0151 spam, m\u00e1s n\u00e9ven Splog, olyan megjegyz\u00e9sekre utal, amelyek nem kapcsol\u00f3dnak a vita t\u00e9m\u00e1j\u00e1hoz. Ezek a megjegyz\u00e9sek \u00e1ltal\u00e1ban URL-linkeket tartalmaznak kereskedelmi oldalakra. N\u00e9h\u00e1ny Splog r\u00e9szletes bejelent\u00e9seket \u00edr az \u00e1ltaluk n\u00e9pszer\u0171s\u00edtett weboldalak sz\u00e1m\u00e1ra; m\u00e1soknak nincs eredeti tartalmuk, \u00e9rtelmetlen vagy legitim weboldalakr\u00f3l lopott tartalmat tartalmaznak. Hasonl\u00f3 t\u00edpus\u00fa t\u00e1mad\u00e1sok l\u00e1that\u00f3k a Wikiken \u00e9s m\u00e1s vend\u00e9gk\u00f6nyvekben is, amelyek \u00e1ltal\u00e1nos felhaszn\u00e1l\u00f3kt\u00f3l fogadnak el megjegyz\u00e9seket.<\/li>\n\n\n\n<li><strong>Spam a vide\u00f3 oldalakon<\/strong>: A k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zati weboldalak, mint a YouTube, szint\u00e9n tele vannak spamokkal, amelyek \u00e1ltal\u00e1ban megjegyz\u00e9seket \u00e9s linkeket tartalmaznak pornogr\u00e1f vagy t\u00e1rskeres\u0151 oldalakra vagy nem kapcsol\u00f3d\u00f3 vide\u00f3kra. N\u00e9ha ezek a megjegyz\u00e9sek automatikusan gener\u00e1l\u00f3dnak botok \u00e1ltal.<\/li>\n\n\n\n<li><strong>Spam az online j\u00e1t\u00e9kok \u00fczenetk\u00fcld\u00e9s\u00e9ben<\/strong>: ezek \u00fczenet\u00e1radatok, megh\u00edv\u00e1sok egy adott csoporthoz val\u00f3 csatlakoz\u00e1sra, szerz\u0151i jogi felt\u00e9telek megs\u00e9rt\u00e9se stb.<\/li>\n\n\n\n<li><strong>Spi vagy Spam az internetes telefon\u00e1l\u00e1s felett<\/strong>: Ez az internetes telefon\u00e1l\u00e1s (VoIP) haszn\u00e1lat\u00e1val k\u00fcld spamet. \u00c1ltal\u00e1ban egy el\u0151re r\u00f6gz\u00edtett \u00fczenet j\u00e1tsz\u00f3dik le, amikor a c\u00edmzett t\u00e9vesen fogad egy spam h\u00edv\u00e1st. Ez a platform sebezhet\u0151 c\u00e9lpont a spammerek sz\u00e1m\u00e1ra, mivel a VoIP olcs\u00f3 \u00e9s k\u00f6nnyen anonimiz\u00e1lhat\u00f3.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-spam-and-spamming-techniques\"><strong>A spam t\u00edpusai \u00e9s spamel\u00e9si technik\u00e1k<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"types-of-spam\"><strong>A spam t\u00edpusai<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rosszindulat\u00fa linkek<\/strong>: Links that harm, mislead, or otherwise harm a user\u2019s computer.<\/li>\n\n\n\n<li><strong>Hamis profilok<\/strong>: A spammerek hamis profilokat hozhatnak l\u00e9tre, amelyek egy\u00e9bk\u00e9nt legitimnek t\u0171nnek, hogy elker\u00fclj\u00e9k a felismer\u00e9st \u00e9s becsapj\u00e1k a nem spammereket, hogy bar\u00e1tkozzanak vel\u00fck.<\/li>\n\n\n\n<li><strong>T\u00f6meges levelez\u00e9s<\/strong>: ezek spam bomb\u00e1k n\u00e9ven ismertek; ezek egy sor megjegyz\u00e9s, amelyeket t\u00f6bbsz\u00f6r ugyanazzal a sz\u00f6veggel tesznek k\u00f6zz\u00e9, ami lehet\u0151v\u00e9 teszi, hogy a megjegyz\u00e9sekhez t\u00e1rs\u00edtott c\u00edmk\u00e9k gyorsan trendiv\u00e9 v\u00e1ljanak a k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zatokon.<\/li>\n\n\n\n<li><strong>Csal\u00f3 \u00e9rt\u00e9kel\u00e9sek<\/strong>: Ezek az \u00e9rt\u00e9kel\u00e9sek azt \u00e1ll\u00edtj\u00e1k, hogy egy term\u00e9k eredeti \u00e9s j\u00f3, b\u00e1r az \u00e9rt\u00e9kel\u0151 lehet, hogy nem is haszn\u00e1lta azt.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"spamming-techniques\"><strong>Spamel\u00e9si technik\u00e1k<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Kattint\u00e1selt\u00e9r\u00edt\u00e9s<\/strong>: m\u00e1s n\u00e9ven <a href=\"https:\/\/owasp.org\/www-community\/attacks\/Clickjacking#:~:text=Clickjacking%2C%20also%20known%20as%20a,on%20the%20top%20level%20page.\" target=\"_blank\" rel=\"noreferrer noopener\">Felhaszn\u00e1l\u00f3i fel\u00fclet \u00e1truh\u00e1z\u00e1sa<\/a>, a spammerek becsapj\u00e1k a felhaszn\u00e1l\u00f3kat, hogy l\u00e1thatatlan c\u00e9lpontokra (pl. gombokra) kattintsanak, amelyek egy m\u00e1sik oldalhoz tartoznak. Ez a spam forma f\u0151k\u00e9nt blogokon \u00e9s f\u00f3rumokon l\u00e1that\u00f3.<\/li>\n\n\n\n<li><strong>Rosszindulat\u00fa b\u00f6ng\u00e9sz\u0151b\u0151v\u00edtm\u00e9nyek drive-by let\u00f6lt\u00e9seken kereszt\u00fcl<\/strong>: This form of attack occurs by downloading malware from the Internet without the user\u2019s notice. This type of spam usually comes as malicious links and can be found on blogs, website bookmarks, reviews, etc.<\/li>\n\n\n\n<li><strong>URL r\u00f6vid\u00edt\u0151k<\/strong>: In this spam attack, the shortened URL obfuscates the actual URL and redirects to its configured destinations without the user\u2019s consent. This type of spam is more frequent in social networks, microblogs, reviews, etc.<\/li>\n\n\n\n<li><strong>T\u00e1rsadalmi m\u00e9rn\u00f6ki szkript injekci\u00f3<\/strong>: In this attack, end-users are tricked into executing malicious JavaScript code of the spammer\u2019s choice in the context of the victim\u2019s site, thereby attacking users\u2019 trust. Again, this attack is often associated with obscure links to malicious programs or websites. It may appear as forms on some review websites, such as emails.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"spam-detection-techniques\"><strong>Spam felismer\u00e9si technik\u00e1k<\/strong><\/h2>\n\n\n<p>H\u00e1rom f\u0151 strat\u00e9gia l\u00e9tezik a spam kezel\u00e9s\u00e9re:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Felismer\u00e9s alap\u00fa technik\u00e1k: Ezek megpr\u00f3b\u00e1lj\u00e1k azonos\u00edtani \u00e9s elt\u00e1vol\u00edtani a spamet a rendszerb\u0151l. <\/li>\n\n\n\n<li>Degrad\u00e1ci\u00f3 alap\u00fa strat\u00e9gi\u00e1k: Ezek megpr\u00f3b\u00e1lj\u00e1k cs\u00f6kkenteni a spam rangsor\u00e1t egy \u00fczenetlist\u00e1ban. <\/li>\n\n\n\n<li>Megel\u0151z\u00e9s alap\u00fa strat\u00e9gi\u00e1k: Ezek c\u00e9lja, hogy akad\u00e1lyozz\u00e1k a spammerek k\u00e9pess\u00e9g\u00e9t a rendszerhez val\u00f3 hozz\u00e1j\u00e1rul\u00e1sra az interf\u00e9szek megv\u00e1ltoztat\u00e1s\u00e1val vagy a felhaszn\u00e1l\u00f3i tev\u00e9kenys\u00e9gek korl\u00e1toz\u00e1s\u00e1val.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"latest-developments-in-antispam-techniques\"><strong>Leg\u00fajabb fejlem\u00e9nyek a spam elleni technik\u00e1kban<\/strong><\/h3>\n\n<h4 class=\"wp-block-heading\" id=\"email-spam\"><strong>E-mail spam<\/strong><\/h4>\n\n\n<p>K\u00f6z\u00f6ss\u00e9gi sz\u0171r\u00e9st haszn\u00e1lnak egy SocialFilter nev\u0171 k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zaton kereszt\u00fcl, amely egy k\u00f6z\u00f6ss\u00e9gi spam sz\u0171r\u0151rendszer, amely a t\u00e1rsadalmi bizalmat integr\u00e1lja <a href=\"https:\/\/academic.oup.com\/jcmc\/article-abstract\/3\/1\/JCMC313\/4584354\" target=\"_blank\" rel=\"noreferrer noopener\">online k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zatokba<\/a> (OSN) a <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/1416950.1416953\" target=\"_blank\" rel=\"noreferrer noopener\">spam jelent\u0151k megb\u00edzhat\u00f3s\u00e1g\u00e1nak<\/a>. \u00e9rt\u00e9kel\u00e9s\u00e9re. Ez egy gr\u00e1f alap\u00fa megk\u00f6zel\u00edt\u00e9s, amely az OSN gr\u00e1fon alapul. A SocialFilter c\u00e9lja, hogy t\u00f6bb spam detektor funkci\u00f3it hozz\u00e1adja, ez\u00e1ltal demokratiz\u00e1lva a spam m\u00e9rs\u00e9kl\u00e9s\u00e9t. Minden SocialFilter csom\u00f3pontot, amelyet egy emberi adminisztr\u00e1tor kezel, spammer jelent\u00e9seket k\u00fcld egy k\u00f6zponti adatt\u00e1rba.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"blog-spam\"><strong>Blog spam<\/strong><\/h4>\n\n\n<p>A blogok egy platform, ahol az emberek kifejezik \u00e9rzelmeiket, megosztj\u00e1k az inform\u00e1ci\u00f3kat \u00e9s kommunik\u00e1lnak egym\u00e1ssal. N\u00f6vekv\u0151 n\u00e9pszer\u0171s\u00e9g\u00fckkel a blogokat most m\u00e1r blog keres\u0151motor forgalm\u00e1nak n\u00f6vel\u00e9s\u00e9re vagy prom\u00f3ci\u00f3s c\u00e9lokra haszn\u00e1lj\u00e1k. Ezeket a blogokat Splogoknak h\u00edvj\u00e1k. Azonban a legt\u00f6bb megl\u00e9v\u0151 Splog felismer\u00e9si technika tartalom alap\u00fa, ami kev\u00e9sb\u00e9 hat\u00e9kony a blogok dinamikus term\u00e9szete miatt.<\/p>\n\n\n\n<p>Jelenleg h\u00e1rom spam elleni technik\u00e1t haszn\u00e1lnak a Splogok elleni k\u00fczdelemre:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Felismer\u00e9s alap\u00fa technik\u00e1k, amelyek determinisztikus megk\u00f6zel\u00edt\u00e9st alkalmaznak Technorati Queries adatokkal, 60%-n\u00e1l nagyobb felismer\u00e9si pontoss\u00e1ggal.<\/li>\n\n\n\n<li>Oszt\u00e1lyoz\u00e1s alap\u00fa technik\u00e1k, amelyek a k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zatok megjegyz\u00e9sein kereszt\u00fcl m\u0171k\u00f6dnek, 60%-n\u00e1l nagyobb felismer\u00e9si pontoss\u00e1ggal.<\/li>\n\n\n\n<li>Felismer\u00e9s alap\u00fa technik\u00e1k, amelyek csoportos\u00edtott t\u00e1rsadalmi gr\u00e1fokat haszn\u00e1lnak kereskedelmi blogoldalakon val\u00f3 publik\u00e1ci\u00f3k alapj\u00e1n. Ezt a technik\u00e1t tekintik a leghat\u00e9konyabbnak a spammerek felismer\u00e9s\u00e9ben.<\/li>\n<\/ol>\n\n\n<h4 class=\"wp-block-heading\" id=\"microblog-spam\"><strong>Mikroblog spam<\/strong><\/h4>\n\n\n<p>A mikroblog spam a mikroblog platformokon val\u00f3 spamel\u00e9sre utal, mint p\u00e9ld\u00e1ul a Twitter, ahol korl\u00e1tozott a tweet m\u00e9rete. A mikroblog spam felismer\u00e9s\u00e9re t\u00f6bb technika is el\u00e9rhet\u0151, bele\u00e9rtve:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Determinisztikus alap\u00fa megk\u00f6zel\u00edt\u00e9sek, amelyek eseteket tanulm\u00e1nyoznak a spam azonos\u00edt\u00e1s\u00e1ra.<\/li>\n\n\n\n<li>Oszt\u00e1lyoz\u00e1s alap\u00fa megk\u00f6zel\u00edt\u00e9sek, amelyek a Social Honeypot Framework-re \u00f6sszpontos\u00edtanak.<\/li>\n\n\n\n<li>Degrad\u00e1ci\u00f3s technik\u00e1k, amelyek a Collusion Rank \u00e9s a PageRank-ra \u00f6sszpontos\u00edtanak.<\/li>\n<\/ol>\n\n\n\n<p>Vannak olyan spam elleni technik\u00e1k is, amelyek kombin\u00e1lj\u00e1k az esettanulm\u00e1nyokat \u00e9s az oszt\u00e1lyoz\u00e1st, mint p\u00e9ld\u00e1ul a <a href=\"https:\/\/hal.science\/hal-03200358\/document\" target=\"_blank\" rel=\"noreferrer noopener\">t\u00e1rsadalmi gr\u00e1f alap\u00fa Mr. SPA<\/a>, valamint technik\u00e1k, amelyek a spam kamp\u00e1nyok klaszterez\u00e9s\u00e9re \u00e9s RF Classifier, Lasso formul\u00e1ci\u00f3 grafikus regulariz\u00e1ci\u00f3s taggal val\u00f3 c\u00edmk\u00e9z\u00e9s\u00e9re, Random Forest oszt\u00e1lyoz\u00e1s m\u00f3dos\u00edtott jellemz\u0151kkel \u00e9s ELM alap\u00fa oszt\u00e1lyoz\u00f3 meghat\u00e1rozott jellemz\u0151kkel.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"bookmarking-spam\"><strong>K\u00f6nyvjelz\u0151 spam<\/strong><\/h4>\n\n\n<p>A k\u00f6z\u00f6ss\u00e9gi k\u00f6nyvjelz\u0151z\u00e9s a hagyom\u00e1nyos k\u00f6nyvjelz\u0151z\u00e9st\u0151l egy olyan platformm\u00e1 fejl\u0151d\u00f6tt, ahol a felhaszn\u00e1l\u00f3k hozz\u00e1adhatnak, szerkeszthetnek vagy m\u00f3dos\u00edthatnak egy weboldalt vagy weboldalt a j\u00f6v\u0151beni hozz\u00e1f\u00e9r\u00e9s \u00e9rdek\u00e9ben. Ezek az oldalak lehet\u0151v\u00e9 teszik a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra, hogy k\u00fcl\u00f6nb\u00f6z\u0151 weboldalakat k\u00f6nyvjelz\u0151zzenek \u00e9s megossz\u00e1k v\u00e9lem\u00e9ny\u00fcket cikkekr\u0151l, k\u00e9pekr\u0151l \u00e9s vide\u00f3kr\u00f3l. Azonban sok weboldal tulajdonos haszn\u00e1l k\u00f6z\u00f6ss\u00e9gi k\u00f6nyvjelz\u0151 oldalakat \u00e9rdekes cikkek b\u00f6ng\u00e9sz\u00e9s\u00e9re \u00e9s linkek beilleszt\u00e9s\u00e9re. Ez\u00e1ltal a weboldalak ki vannak t\u00e9ve a spammereknek a visszamutat\u00f3 linkeken kereszt\u00fcl, mivel a spammerek vonz\u00f3 spam k\u00f6nyvjelz\u0151ket hoznak l\u00e9tre, amelyeket gyan\u00fatlan felhaszn\u00e1l\u00f3k v\u00e1lasztanak ki.<\/p>\n\n\n\n<p>A k\u00f6nyvjelz\u0151 spam elleni k\u00fczdelem \u00e9rdek\u00e9ben k\u00fcl\u00f6nb\u00f6z\u0151 spam elleni technik\u00e1k \u00e1llnak rendelkez\u00e9sre, bele\u00e9rtve:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Klaszterez\u00e9si \u00e9s oszt\u00e1lyoz\u00e1si technik\u00e1k az \u00f6nszervez\u0151d\u0151 t\u00e9rk\u00e9pek (SOM) klaszterez\u00e9s \u00e9s asszoci\u00e1ci\u00f3 felfedez\u00e9s alapj\u00e1n.<\/li>\n\n\n\n<li>Val\u00f3sz\u00edn\u0171s\u00e9gi jellemz\u0151k kinyer\u00e9se \u00e9s \u00f6sszes\u00edt\u00e9se.<\/li>\n\n\n\n<li>GraphLab Create \u00e9s val\u00f3sz\u00edn\u0171s\u00e9gi l\u00e1gy logika a jellemz\u0151k kinyer\u00e9s\u00e9re<\/li>\n\n\n\n<li>Gradiens n\u00f6velt d\u00f6nt\u00e9si fa oszt\u00e1lyoz\u00f3 az oszt\u00e1lyoz\u00e1shoz.<\/li>\n<\/ol>\n\n\n<h4 class=\"wp-block-heading\" id=\"social-network-spam\"><strong>K\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zati spam<\/strong><\/h4>\n\n\n<p>A jelenlegi spam elleni technik\u00e1k azonos\u00edtott\u00e1k, hogy a k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zati spam gener\u00e1torai robotok. Ezeket a robotokat Displayer, Bragger, Poster \u00e9s Whisperer n\u00e9ven ismerik. A k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zatok spam elleni technik\u00e1i k\u00f6z\u00e9 tartozik:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FF ar\u00e1ny: A bar\u00e1tk\u00e9r\u00e9sek ar\u00e1nya a megl\u00e9v\u0151 bar\u00e1tok sz\u00e1m\u00e1hoz k\u00e9pest. <\/li>\n\n\n\n<li>URL ar\u00e1ny: Az URL-ek ar\u00e1nya egy \u00fczenetben a szavak sz\u00e1m\u00e1hoz k\u00e9pest. <\/li>\n\n\n\n<li>Friend choice: The similarity between the spammer and the victim\u2019s friend lists. <\/li>\n\n\n\n<li>K\u00fcld\u00f6tt \u00fczenetek: Az \u00fczenetek sz\u00e1ma, amelyeket egy felhaszn\u00e1l\u00f3 egy adott id\u0151keretben k\u00fcld. <\/li>\n\n\n\n<li>Bar\u00e1tok sz\u00e1ma: A bar\u00e1tok sz\u00e1ma, amelyeket egy felhaszn\u00e1l\u00f3 rendelkezik.<\/li>\n<\/ul>\n\n\n\n<p>M\u00e1s szavakkal, ezek oszt\u00e1lyoz\u00e1s alap\u00fa technik\u00e1k a spam-bot \u00e9s spam profil \u00e9s fut\u00e1sidej\u0171 oszt\u00e1lyoz\u00e1s alapj\u00e1n. Klaszterez\u00e9si technik\u00e1k a Markov klaszterez\u00e9sre \u00f6sszpontos\u00edtanak a t\u00e1rsadalmi gr\u00e1fokon \u00e9s a <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1110016814000970#:~:text=The%20Self%2DOrganizing%20Map%20(SOM)%20is%20an%20unsupervised%20learning,a%20low%2Ddimensional%20topology%20map.\" target=\"_blank\" rel=\"noreferrer noopener\">SOM tanul\u00e1si algoritmus<\/a>, m\u00edg a felismer\u00e9si \u00e9s elt\u00e1vol\u00edt\u00e1si technik\u00e1k inkrement\u00e1lis klaszterez\u00e9sen alapulnak, amelyet oszt\u00e1lyoz\u00e1s k\u00f6vet. Az oszt\u00e1lyoz\u00e1si \u00e9s monitoroz\u00e1si technik\u00e1k a k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zat alap\u00fa Social Spam Guard-ra \u00f6sszpontos\u00edtanak, \u00e9s a fel\u00fcgyelet n\u00e9lk\u00fcli felismer\u00e9si technik\u00e1k a <a href=\"https:\/\/www.openphilanthropy.org\/research\/hits-based-giving\/\" target=\"_blank\" rel=\"noreferrer noopener\">HITS alap\u00fa keretrendszerre<\/a>.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"review-spam\"><strong>V\u00e9lem\u00e9ny spam<\/strong><\/h4>\n\n\n<p>Review Spam is a type of spam that appears as reviews on various e-commerce websites. Positive reviews can boost a company\u2019s business, but negative reviews can harm it. Some spammers intentionally <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/How-much-can-a-bad-review-hurt-your-business\" target=\"_blank\" rel=\"noreferrer noopener\">v\u00e9lem\u00e9nyeket tesz k\u00f6zz\u00e9, hogy k\u00e1ros\u00edtsa egy term\u00e9k vagy c\u00e9g h\u00edrnev\u00e9t<\/a>, \u00e9s robotok is gener\u00e1lhatj\u00e1k ezeket a v\u00e9lem\u00e9nyeket. 2013-ban egy modellt terveztek szintetikus v\u00e9lem\u00e9nyek gener\u00e1l\u00e1s\u00e1ra. Egy \u00faj v\u00e9dekez\u00e9si m\u00f3dszert javasoltak, hogy felismerj\u00e9k a k\u00fcl\u00f6nbs\u00e9get a hamis \u00e9s igaz v\u00e9lem\u00e9nyek szemantikai \u00e1raml\u00e1sa k\u00f6z\u00f6tt, amelyeket neh\u00e9z felismerni a megl\u00e9v\u0151 m\u00f3dszerekkel.<\/p>\n\n\n\n<p>Jelenleg t\u00f6bb spam elleni technika l\u00e9tezik a v\u00e9lem\u00e9ny spam felismer\u00e9s\u00e9re, bele\u00e9rtve:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oszt\u00e1lyoz\u00e1s alap\u00fa technik\u00e1k, amelyek line\u00e1ris kernel SVM-re \u00e9s n-gram alap\u00fa m\u00f3dszerekre \u00f6sszpontos\u00edtanak. <\/li>\n\n\n\n<li>Szab\u00e1ly alap\u00fa technik\u00e1k. <\/li>\n\n\n\n<li>Id\u0151\u00e9rz\u00e9keny jellemz\u0151 alap\u00fa technik\u00e1k. <\/li>\n\n\n\n<li>Kombin\u00e1lt technik\u00e1k keretrendszerek alapj\u00e1n az oszt\u00e1lyoz\u00e1sra \u00e9s klaszterez\u00e9sre. <\/li>\n\n\n\n<li>Oszt\u00e1lyoz\u00e1s alap\u00fa technik\u00e1k, amelyek szintetikus v\u00e9lem\u00e9nyek gener\u00e1l\u00e1s\u00e1ra \u00e9s elemz\u00e9s\u00e9re \u00f6sszpontos\u00edtanak. <\/li>\n\n\n\n<li>Loopy Belief Propagation (LBP) h\u00e1l\u00f3zat alap\u00fa technik\u00e1k.<\/li>\n<\/ul>\n\n\n<h4 class=\"wp-block-heading\" id=\"location-search-spam\"><strong>Helykeres\u00e9si spam<\/strong><\/h4>\n\n\n<p>A kiberbiztons\u00e1gi kutat\u00e1sok szerint a spammerek k\u00e9pesek behatolni \u00e9s megzavarni egy \u00e9rv\u00e9nyes keres\u0151rendszert az\u00e1ltal, hogy nem kapcsol\u00f3d\u00f3 c\u00edmk\u00e9ket t\u00e1rs\u00edtanak dokumentumokhoz, vagy ak\u00e1r v\u00e9letlenszer\u0171en inf\u00fazi\u00f3val dokumentumokat helyhez kapcsol\u00f3d\u00f3 kifejez\u00e9sekkel. Egy m\u00f3dszertan a spam felismer\u00e9s\u00e9re egy helyalap\u00fa k\u00f6z\u00f6ss\u00e9gi k\u00f6nyvjelz\u0151 weboldalon, a Foursquare-en, kifejleszt\u00e9sre ker\u00fclt ennek a k\u00e9rd\u00e9snek a kezel\u00e9s\u00e9re. A Foursquare lehet\u0151v\u00e9 teszi a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra, hogy tippeket hagyjanak k\u00fcl\u00f6nb\u00f6z\u0151 helyekr\u0151l \u00e9s l\u00e1tnival\u00f3kr\u00f3l, amelyeket m\u00e1s felhaszn\u00e1l\u00f3k el\u00e9rhetnek. Azonban a spammerek irrelev\u00e1ns tartalmat, p\u00e9ld\u00e1ul \u00fczleti tippeket tesznek k\u00f6zz\u00e9, amelyek f\u00e9lrevezetik a felhaszn\u00e1l\u00f3kat, akik egy adott helyr\u0151l szeretn\u00e9nek megtudni.<\/p>\n\n\n\n<p>Ez a dokumentum elemzi a javaslat spammereket, c\u00e9lja, hogy automatiz\u00e1lt eszk\u00f6z\u00f6ket fejlesszen ki a spam javaslatokat k\u00f6zz\u00e9tev\u0151 felhaszn\u00e1l\u00f3k felismer\u00e9s\u00e9re. A helykeres\u00e9si spam elleni technik\u00e1k oszt\u00e1lyoz\u00e1sra \u00e9s klaszterez\u00e9sre alapulnak, amelyek a Random Forest \u00e9s D\u00f6nt\u00e9si Fa alap\u00fa oszt\u00e1lyoz\u00e1sra, <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320312002117\" target=\"_blank\" rel=\"noreferrer noopener\">EM klaszterez\u00e9sre<\/a> a kategoriz\u00e1l\u00e1sra \u00e9s Random Forest oszt\u00e1lyoz\u00e1sra \u00f6sszpontos\u00edtanak.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"comment-spam\"><strong>Megjegyz\u00e9s spam<\/strong><\/h4>\n\n\n<p>A megjegyz\u00e9s spam elterjedt a k\u00f6z\u00f6ss\u00e9gi m\u00e9dia platformokon, k\u00fcl\u00f6n\u00f6sen a YouTube-on \u00e9s a h\u00edroldalakon. Egy adatb\u00e1ny\u00e1szati megk\u00f6zel\u00edt\u00e9st javasoltak a spam megjegyz\u00e9sek sz\u0171r\u00e9s\u00e9re a YouTube f\u00f3rumokon, hogy megk\u00fczdjenek ezzel a kibert\u00e1mad\u00e1ssal. A spam felismer\u00e9s\u00e9re szolg\u00e1l\u00f3 tartalomelemz\u00e9ssel ellent\u00e9tben ez a megk\u00f6zel\u00edt\u00e9s a megjegyz\u00e9s viselked\u00e9s\u00e9t haszn\u00e1lja a spammerek azonos\u00edt\u00e1s\u00e1ra. A m\u00f3dszertan kihaszn\u00e1lja a <a href=\"https:\/\/deepai.org\/publication\/mining-user-comment-activity-for-detecting-forum-spammers-in-youtube\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube\u2019s hasSpamHint feature<\/a> amely a felhaszn\u00e1l\u00f3i megjegyz\u00e9seket k\u00eds\u00e9ri. \u00cdme a l\u00e9p\u00e9sek:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>K\u00e9rje le a hasSpamHint jelz\u00e9ssel ell\u00e1tott megjegyz\u00e9seket egy adott vide\u00f3hoz.<\/li>\n\n\n\n<li>Vegye ki a gyan\u00fas spam megjegyz\u00e9sek m\u00f6g\u00f6tti felhaszn\u00e1l\u00f3i azonos\u00edt\u00f3kat, hogy inform\u00e1ci\u00f3t gy\u0171jts\u00f6n a felhaszn\u00e1l\u00f3i megjegyz\u00e9s tev\u00e9kenys\u00e9gr\u0151l.<\/li>\n\n\n\n<li>Sz\u00e1rmaztasson attrib\u00fatumokat, mint p\u00e9ld\u00e1ul a megjegyz\u00e9s sz\u00f6veg\u00e9t, id\u0151b\u00e9lyeg\u00e9t, a megjegyzett vide\u00f3 VideoID-j\u00e9t \u00e9s a hasSpamHint bin\u00e1ris v\u00e1ltoz\u00f3 \u00e9rt\u00e9k\u00e9t a haszn\u00e1lati napl\u00f3b\u00f3l a vitaf\u00f3rumokon.<\/li>\n\n\n\n<li>Sz\u00e1m\u00edtsa ki a v\u00e1ltoz\u00f3k \u00e9rt\u00e9keit, amelyek a felhaszn\u00e1l\u00f3 spam sz\u00e1nd\u00e9k\u00e1t jelzik.<\/li>\n\n\n\n<li>Adjon pontsz\u00e1mot a felhaszn\u00e1l\u00f3nak, hogy azonos\u00edtsa \u0151ket spammerk\u00e9nt vagy sem.<\/li>\n\n\n\n<li>Apply a specific rule derived from manual data inspection to mark any user who meets the rule\u2019s conditions (with at least five comments) as a spammer.<\/li>\n<\/ol>\n\n\n\n<p>Ezt a spam elleni technik\u00e1t Szab\u00e1ly alap\u00fa \u00e9s <a href=\"https:\/\/arxiv.org\/pdf\/2004.13820\" target=\"_blank\" rel=\"noreferrer noopener\">NLP \u00e1ltal induk\u00e1lt T\u00e9ma Hasonl\u00f3s\u00e1g<\/a> a bejegyz\u00e9sekben \u00e9s megjegyz\u00e9sekben, amelyet oszt\u00e1lyoz\u00e1s k\u00f6vet.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"crossmedia-spam\"><strong>Keresztm\u00e9dia spam<\/strong><\/h4>\n\n\n<p>A keresztm\u00e9dia spam egy egyedi spam elleni m\u00f3dszertan, amely felismeri a spamet k\u00fcl\u00f6nb\u00f6z\u0151 platformokon. Mag\u00e1ban foglalja a spam gyors azonos\u00edt\u00e1s\u00e1t minden k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zaton \u00e9s a spam felismer\u00e9si pontoss\u00e1g\u00e1nak n\u00f6vel\u00e9s\u00e9t egy nagy adathalmaz r\u00e9szv\u00e9tel\u00e9vel. B\u00e1r egyetlen hat\u00e9kony strat\u00e9gia nem alkalmazhat\u00f3 a spam minden form\u00e1j\u00e1ra \u00e9s platformj\u00e1ra, ez a technika egy innovat\u00edv keresztplatform keretrendszer a k\u00f6z\u00f6ss\u00e9gi spam felismer\u00e9s\u00e9re.<\/p>\n\n\n\n<p>Ez a technika h\u00e1rom f\u0151 komponensre oszlik:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>T\u00e9rk\u00e9pez\u00e9s \u00e9s \u00f6sszeszerel\u00e9s a specifikus k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zati objektum keretrendszer \u00e1ltal meghat\u00e1rozott standard modell\u00e9 alak\u00edt\u00e1s\u00e1val.<\/li>\n\n\n\n<li>El\u0151sz\u0171r\u00e9s feketelist\u00e1k, hash-el\u00e9s \u00e9s hasonl\u00f3s\u00e1g \u00f6sszehasonl\u00edt\u00e1s alapj\u00e1n, hogy \u00f6sszehasonl\u00edtsa a bej\u00f6v\u0151 objektumokat ismert spam objektumokkal.<\/li>\n\n\n\n<li>Oszt\u00e1lyoz\u00e1s fel\u00fcgyelt g\u00e9pi tanul\u00e1si technik\u00e1k alapj\u00e1n a bej\u00f6v\u0151 \u00e9s t\u00e1rs\u00edtott objektumok oszt\u00e1lyoz\u00e1s\u00e1ra.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">K\u00f6vetkeztet\u00e9s<\/h2>\n\n\n<p>A spam sz\u00e9lesk\u00f6r\u0171 probl\u00e9ma az interneten, \u00e9s spam elleni technik\u00e1kat fejlesztettek ki \u00e9s val\u00f3s\u00edtottak meg k\u00fcl\u00f6nb\u00f6z\u0151 platformokon, v\u00e1ltoz\u00f3 sikerrel. Ezek a technik\u00e1k \u00e1ltal\u00e1ban determinisztikus, val\u00f3sz\u00edn\u0171s\u00e9gi vagy gr\u00e1f alap\u00fa algoritmusokba sorolhat\u00f3k, de minden kateg\u00f3ri\u00e1nak jelent\u0151s vari\u00e1ci\u00f3ja van. A val\u00f3sz\u00edn\u0171s\u00e9gi megk\u00f6zel\u00edt\u00e9sek a leggyakrabban haszn\u00e1ltak a modern technik\u00e1kban, mivel a k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zatok jellemz\u0151i jelent\u0151sen elt\u00e9rnek a standard dokumentumok vagy weboldalak jellemz\u0151it\u0151l. Azonban a spam elleni k\u00fczdelem soha v\u00e9get nem \u00e9r\u0151 j\u00e1t\u00e9k, mivel a spammerek \u00faj m\u00f3dszereket fejlesztenek ki a felismer\u00e9s elker\u00fcl\u00e9s\u00e9re. <\/p>\n\n\n\n<p>Ez\u00e9rt a folyamatos \u00e9bers\u00e9g \u00e9s \u00faj \u00e9s jobb spam elleni technik\u00e1k kifejleszt\u00e9se elengedhetetlen a spam hat\u00e9kony lek\u00fczd\u00e9s\u00e9hez.<\/p>","protected":false},"excerpt":{"rendered":"<p>A spam olyan nem k\u00edv\u00e1nt vagy k\u00e9retlen \u00fczenetekre utal, amelyeket elektronikus \u00faton k\u00fcldenek vagy fogadnak e-mailen, azonnali \u00fczenetk\u00fcld\u00e9sen, blogokon, h\u00edrcsoportokon, k\u00f6z\u00f6ss\u00e9gi m\u00e9di\u00e1n, webes keres\u00e9sen \u00e9s mobiltelefonokon kereszt\u00fcl, rekl\u00e1m b\u00edrs\u00e1gokkal, adathal\u00e1szattal, rosszindulat\u00fa szoftverekkel stb.\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/levelszemet\/a-szocialis-spam-felismeresenek-es-lekuzdesenek-legujabb-fejlemenyei\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A szoci\u00e1lis spam \u00e9szlel\u00e9s\u00e9nek \u00e9s lek\u00fczd\u00e9s\u00e9nek leg\u00fajabb fejlem\u00e9nyei<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1584,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-1564","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spam","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Latest Techniques for Detecting and Preventing Social Spam<\/title>\n<meta name=\"description\" content=\"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/levelszemet\/a-szocialis-spam-felismeresenek-es-lekuzdesenek-legujabb-fejlemenyei\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Latest Techniques for Detecting and Preventing Social Spam\" \/>\n<meta property=\"og:description\" content=\"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/levelszemet\/a-szocialis-spam-felismeresenek-es-lekuzdesenek-legujabb-fejlemenyei\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-12T21:23:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Recent Developments in Social Spam Detection and Combating Techniques\",\"datePublished\":\"2023-03-12T21:23:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\"},\"wordCount\":2040,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"articleSection\":[\"spam\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\",\"url\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\",\"name\":\"Latest Techniques for Detecting and Preventing Social Spam\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"datePublished\":\"2023-03-12T21:23:10+00:00\",\"description\":\"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"Recent Developments in Social Spam\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recent Developments in Social Spam Detection and Combating Techniques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Leg\u00fajabb technik\u00e1k a k\u00f6z\u00f6ss\u00e9gi spam \u00e9szlel\u00e9s\u00e9re \u00e9s megel\u0151z\u00e9s\u00e9re","description":"Ismerje meg a fejlett algoritmusokat \u00e9s a kollaborat\u00edv sz\u0171r\u00e9si technik\u00e1kat, amelyeket a k\u00f6z\u00f6ss\u00e9gi spam elleni k\u00fczdelemben haszn\u00e1lnak k\u00fcl\u00f6nb\u00f6z\u0151 online platformokon.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/levelszemet\/a-szocialis-spam-felismeresenek-es-lekuzdesenek-legujabb-fejlemenyei\/","og_locale":"hu_HU","og_type":"article","og_title":"Latest Techniques for Detecting and Preventing Social Spam","og_description":"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.","og_url":"https:\/\/securitybriefing.net\/hu\/levelszemet\/a-szocialis-spam-felismeresenek-es-lekuzdesenek-legujabb-fejlemenyei\/","og_site_name":"Security Briefing","article_published_time":"2023-03-12T21:23:10+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"10 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Recent Developments in Social Spam Detection and Combating Techniques","datePublished":"2023-03-12T21:23:10+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/"},"wordCount":2040,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","articleSection":["spam"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/","url":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/","name":"Leg\u00fajabb technik\u00e1k a k\u00f6z\u00f6ss\u00e9gi spam \u00e9szlel\u00e9s\u00e9re \u00e9s megel\u0151z\u00e9s\u00e9re","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","datePublished":"2023-03-12T21:23:10+00:00","description":"Ismerje meg a fejlett algoritmusokat \u00e9s a kollaborat\u00edv sz\u0171r\u00e9si technik\u00e1kat, amelyeket a k\u00f6z\u00f6ss\u00e9gi spam elleni k\u00fczdelemben haszn\u00e1lnak k\u00fcl\u00f6nb\u00f6z\u0151 online platformokon.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","width":600,"height":369,"caption":"Recent Developments in Social Spam"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Recent Developments in Social Spam Detection and Combating Techniques"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1564"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1564\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1584"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}