{"id":1564,"date":"2023-03-12T21:23:10","date_gmt":"2023-03-12T21:23:10","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1564"},"modified":"2023-03-12T21:23:10","modified_gmt":"2023-03-12T21:23:10","slug":"dezvoltari-recente-in-detectarea-si-combaterea-spamului-social","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/spam\/dezvoltari-recente-in-detectarea-si-combaterea-spamului-social\/","title":{"rendered":"Evolu\u021bii recente \u00een tehnicile de detectare \u0219i combatere a spam-ului social"},"content":{"rendered":"<p>Spam-ul se refer\u0103 la mesaje nedorite sau nesolicitate trimise sau primite electronic prin e-mail, mesagerie instantanee, bloguri, grupuri de discu\u021bii, re\u021bele sociale, c\u0103ut\u0103ri web \u0219i telefoane mobile, cu amenzi publicitare, Phishing, Malware etc. Dup\u0103 cum reiese clar din defini\u021bie, Spam-ul este destinat r\u0103ut\u0103\u021bii \u0219i, \u00een general, reprezint\u0103 o surs\u0103 viabil\u0103, dar frauduloas\u0103 de venit pentru unele persoane sau organiza\u021bii. Atacatorul cibernetic implicat \u00een trimiterea unor astfel de mesaje spam este, \u00een general, denumit \u201cspammer\u201d. De\u0219i ini\u021bial \u021bintit \u0219i limitat la e-mail, spam-ul a invadat toate platformele electronice din toate mediile.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-kinds-of-spam-exist-today\"><strong>Ce tipuri de spam exist\u0103 ast\u0103zi?<\/strong><\/h2>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Spam prin e-mail<\/strong>: cunoscut \u0219i sub numele de junk mail, trimite mesaje nedorite, care con\u021bin frecvent con\u021binut comercial, \u00een cantit\u0103\u021bi mari c\u0103tre un set nediscriminatoriu de destinatari.<\/li>\n\n\n\n<li><strong>Spam-ul \u00een mesageria instantanee folose\u0219te mesageri instantanee (IM):<\/strong> De\u0219i este mai subtil dec\u00e2t omologul s\u0103u prin e-mail, tinde s\u0103 enerveze utilizatorii de mesageri instantanee precum Skype\u00a9, Yahoo!\u00ae \u0219i Messenger cu mesaje nesolicitate de la agen\u021bi de publicitate etc.<\/li>\n\n\n\n<li><strong>Spam-ul pe grupuri de discu\u021bii \u0219i forumuri<\/strong>: post\u0103rile multiple \u0219i repetitive \u00een grupurile de discu\u021bii Usenet \u0219i forumurile de internet irelevante.<\/li>\n\n\n\n<li><strong>Spam pe telefoane mobile<\/strong>: Aceast\u0103 form\u0103 de spam folose\u0219te servicii de mesaje scurte (SMS) ca mod de operare. Uneori, clien\u021bii sunt taxa\u021bi pentru servicii premium fiind p\u0103c\u0103li\u021bi s\u0103 se aboneze la un abonament fals \u0219i escrocherii.<\/li>\n\n\n\n<li><strong>Spamdexing<\/strong>: se refer\u0103 la spam-ul motoarelor de c\u0103utare sau la practica de manipulare a algoritmului de clasare \u0219i relevan\u021b\u0103 al motoarelor de c\u0103utare pentru a promova un anumit site web sau pagin\u0103 web.<\/li>\n\n\n\n<li><strong>Splogs \u0219i Wikis<\/strong>: Spam-ul pe bloguri, cunoscut \u0219i sub numele de Splog, se refer\u0103 la comentarii care nu au leg\u0103tur\u0103 cu subiectul discu\u021biei. Aceste comentarii sunt de obicei \u00eencorporate cu link-uri URL c\u0103tre unele site-uri comerciale. Unele Splogs sunt scrise ca anun\u021buri detaliate pentru site-urile pe care le promoveaz\u0103; altele nu au con\u021binut original, prezent\u00e2nd nonsensuri sau con\u021binut furat de pe site-uri web legitime. Tipuri similare de atacuri sunt, de asemenea, observate pe Wikis \u0219i alte c\u0103r\u021bi de oaspe\u021bi care accept\u0103 comentarii de la utilizatorii generali.<\/li>\n\n\n\n<li><strong>Spam pe site-uri video<\/strong>: Site-urile de socializare precum YouTube sunt, de asemenea, infestate cu spam care implic\u0103 de obicei comentarii \u0219i link-uri c\u0103tre un site pornografic sau de \u00eent\u00e2lniri sau unele videoclipuri f\u0103r\u0103 leg\u0103tur\u0103. Uneori, aceste comentarii sunt generate automat prin Bots.<\/li>\n\n\n\n<li><strong>Spam \u00een mesageria jocurilor online<\/strong>: sunt inunda\u021bii de mesaje, cereri de a se al\u0103tura unui anumit grup, \u00eenc\u0103lc\u0103ri ale termenilor \u0219i condi\u021biilor de copyright etc.<\/li>\n\n\n\n<li><strong>Spi sau Spam prin telefonie pe Internet<\/strong>: Acesta folose\u0219te telefonia vocal\u0103 prin Internet (VoIP) pentru a trimite Spam. De obicei, un mesaj pre\u00eenregistrat este redat atunci c\u00e2nd destinatarul prime\u0219te din gre\u0219eal\u0103 un apel spam. Aceast\u0103 platform\u0103 este o \u021bint\u0103 vulnerabil\u0103 pentru spammeri, deoarece VoIP este ieftin \u0219i u\u0219or de anonimizat.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-spam-and-spamming-techniques\"><strong>Tipuri de spam \u0219i tehnici de spamming<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"types-of-spam\"><strong>Tipuri de spam<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Link-uri mali\u021bioase<\/strong>: Link-uri care d\u0103uneaz\u0103, induc \u00een eroare sau afecteaz\u0103 \u00een alt mod computerul unui utilizator.<\/li>\n\n\n\n<li><strong>Profile false<\/strong>: Spammerii pot crea profile false care altfel ar p\u0103rea legitime pentru a evita detectarea \u0219i a atrage non-spammerii s\u0103-i accepte ca prieteni.<\/li>\n\n\n\n<li><strong>Trimiteri \u00een mas\u0103<\/strong>: sunt cunoscute sub numele de bombe spam; sunt un set de comentarii publicate de mai multe ori cu acela\u0219i text, ceea ce permite etichetelor asociate comentariilor s\u0103 devin\u0103 populare rapid pe re\u021belele sociale.<\/li>\n\n\n\n<li><strong>Recenzii false<\/strong>: Aceste recenzii sus\u021bin c\u0103 un produs este original \u0219i bun, chiar dac\u0103 recenzorul s-ar putea s\u0103 nu-l fi folosit.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"spamming-techniques\"><strong>Tehnici de spamming<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Clickjacking<\/strong>: Cunoscut \u0219i sub numele de <a href=\"https:\/\/owasp.org\/www-community\/attacks\/Clickjacking#:~:text=Clickjacking%2C%20also%20known%20as%20a,on%20the%20top%20level%20page.\" target=\"_blank\" rel=\"noreferrer noopener\">UI-redressing<\/a>, spammerii p\u0103c\u0103lesc utilizatorii s\u0103 fac\u0103 clic pe \u021binte invizibile (de exemplu, butoane) care apar\u021bin unei pagini diferite. Aceast\u0103 form\u0103 de spam poate fi v\u0103zut\u0103 \u00een principal pe bloguri \u0219i forumuri.<\/li>\n\n\n\n<li><strong>Extensii de browser mali\u021bioase prin desc\u0103rc\u0103ri drive-by<\/strong>: Acest tip de atac are loc prin desc\u0103rcarea de malware de pe Internet f\u0103r\u0103 \u0219tirea utilizatorului. Acest tip de spam vine de obicei sub form\u0103 de link-uri mali\u021bioase \u0219i poate fi g\u0103sit pe bloguri, marcaje de site-uri web, recenzii etc.<\/li>\n\n\n\n<li><strong>Scurt\u0103toare de URL-uri<\/strong>: \u00cen acest atac de spam, URL-ul scurtat ascunde URL-ul real \u0219i redirec\u021bioneaz\u0103 c\u0103tre destina\u021biile sale configurate f\u0103r\u0103 consim\u021b\u0103m\u00e2ntul utilizatorului. Acest tip de spam este mai frecvent \u00een re\u021belele sociale, microbloguri, recenzii etc.<\/li>\n\n\n\n<li><strong>Injec\u021bie de scripturi de inginerie social\u0103<\/strong>: \u00cen acest atac, utilizatorii finali sunt p\u0103c\u0103li\u021bi s\u0103 execute cod JavaScript mali\u021bios ales de spammer \u00een contextul site-ului victimei, atac\u00e2nd astfel \u00eencrederea utilizatorilor. Din nou, acest atac este adesea asociat cu link-uri obscure c\u0103tre programe sau site-uri web mali\u021bioase. Poate ap\u0103rea sub form\u0103 de formulare pe unele site-uri de recenzii, cum ar fi e-mailuri.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"spam-detection-techniques\"><strong>Tehnici de detectare a spam-ului<\/strong><\/h2>\n\n\n<p>Exist\u0103 trei strategii principale pentru a face fa\u021b\u0103 spam-ului:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tehnici bazate pe detectare: Acestea \u00eencearc\u0103 s\u0103 identifice \u0219i s\u0103 elimine spam-ul din sistem. <\/li>\n\n\n\n<li>Strategii bazate pe degradare: Acestea \u00eencearc\u0103 s\u0103 reduc\u0103 clasamentul spam-ului \u00eentr-o list\u0103 de mesaje. <\/li>\n\n\n\n<li>Strategii bazate pe prevenire: Acestea urm\u0103resc s\u0103 \u00eempiedice capacitatea spammerilor de a contribui la sistem prin modificarea interfe\u021belor sau limitarea ac\u021biunilor utilizatorilor.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"latest-developments-in-antispam-techniques\"><strong>Cele mai recente evolu\u021bii \u00een tehnicile antispam<\/strong><\/h3>\n\n<h4 class=\"wp-block-heading\" id=\"email-spam\"><strong>Spam prin e-mail<\/strong><\/h4>\n\n\n<p>Filtrarea colaborativ\u0103 este utilizat\u0103 printr-o re\u021bea social\u0103 numit\u0103 SocialFilter, care este un sistem de filtrare colaborativ\u0103 a spam-ului care folose\u0219te \u00eencrederea social\u0103 integrat\u0103 \u00een <a href=\"https:\/\/academic.oup.com\/jcmc\/article-abstract\/3\/1\/JCMC313\/4584354\" target=\"_blank\" rel=\"noreferrer noopener\">re\u021bele sociale online<\/a> (OSN) pentru a evalua <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/1416950.1416953\" target=\"_blank\" rel=\"noreferrer noopener\">fiabilitatea raportorilor de spam<\/a>. Este o abordare bazat\u0103 pe graf care se bazeaz\u0103 pe graful OSN. SocialFilter \u00ee\u0219i propune s\u0103 adauge caracteristicile mai multor detectoare de spam, democratiz\u00e2nd astfel atenuarea spam-ului. Fiecare nod SocialFilter, care este gestionat de un administrator uman, trimite rapoarte de spammeri c\u0103tre un depozit centralizat.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"blog-spam\"><strong>Spam pe bloguri<\/strong><\/h4>\n\n\n<p>Blogurile sunt o platform\u0103 unde oamenii \u00ee\u0219i exprim\u0103 emo\u021biile, \u00eemp\u0103rt\u0103\u0219esc informa\u021bii \u0219i comunic\u0103 \u00eentre ei. Odat\u0103 cu popularitatea lor \u00een cre\u0219tere, blogurile sunt acum folosite pentru a genera trafic de c\u0103utare pe bloguri sau \u00een scopuri promo\u021bionale. Aceste tipuri de bloguri sunt numite Splogs. Cu toate acestea, majoritatea tehnicilor existente de detectare a Splog-urilor sunt bazate pe con\u021binut, ceea ce este mai pu\u021bin eficient av\u00e2nd \u00een vedere natura dinamic\u0103 a blogurilor.<\/p>\n\n\n\n<p>\u00cen prezent, trei tehnici antispam sunt utilizate pentru a combate Splog-urile:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Tehnici bazate pe detectare care folosesc o abordare determinist\u0103 func\u021bioneaz\u0103 cu un set de date de interog\u0103ri Technorati cu o acurate\u021be de detectare mai mare de 60%.<\/li>\n\n\n\n<li>Tehnici bazate pe clasificare care opereaz\u0103 prin comentariile re\u021belelor sociale cu o acurate\u021be de detectare mai mare de 60%.<\/li>\n\n\n\n<li>Tehnici bazate pe detectare care folosesc grafuri sociale grupate folosind publica\u021bii pe site-uri comerciale de bloguri. Aceast\u0103 tehnic\u0103 este considerat\u0103 cea mai eficient\u0103 \u00een detectarea spammerilor.<\/li>\n<\/ol>\n\n\n<h4 class=\"wp-block-heading\" id=\"microblog-spam\"><strong>Spam pe microbloguri<\/strong><\/h4>\n\n\n<p>Spam-ul pe microbloguri se refer\u0103 la spam-ul pe platformele de microblogging, cum ar fi Twitter, unde exist\u0103 o limitare a dimensiunii tweet-ului. Pentru a detecta spam-ul pe microbloguri, exist\u0103 mai multe tehnici disponibile, inclusiv:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Abord\u0103ri bazate pe determinism care studiaz\u0103 cazurile pentru a identifica spam-ul.<\/li>\n\n\n\n<li>Abord\u0103ri bazate pe clasificare care se concentreaz\u0103 pe cadrul Social Honeypot.<\/li>\n\n\n\n<li>Tehnici de degradare care se concentreaz\u0103 pe Collusion Rank \u0219i PageRank.<\/li>\n<\/ol>\n\n\n\n<p>Exist\u0103, de asemenea, tehnici antispam care combin\u0103 studii de caz \u0219i clasificare, cum ar fi <a href=\"https:\/\/hal.science\/hal-03200358\/document\" target=\"_blank\" rel=\"noreferrer noopener\">Mr. SPA bazat pe grafuri sociale<\/a>, precum \u0219i tehnici bazate pe clustering-ul campaniilor de spam \u0219i etichetarea acestora folosind clasificatorul RF, formularea Lasso integrat\u0103 cu un termen de regularizare a grafului, clasificarea Random Forest folosind caracteristici ajustate \u0219i clasificatorul bazat pe ELM cu caracteristici definite.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"bookmarking-spam\"><strong>Spam prin bookmarking<\/strong><\/h4>\n\n\n<p>Bookmarking-ul social a evoluat de la bookmarking-ul tradi\u021bional la o platform\u0103 unde utilizatorii pot ad\u0103uga, edita sau modifica un site web sau o pagin\u0103 web pentru acces ulterior. Aceste site-uri permit utilizatorilor s\u0103 marcheze diferite pagini web \u0219i s\u0103-\u0219i \u00eemp\u0103rt\u0103\u0219easc\u0103 opiniile despre articole, imagini \u0219i videoclipuri. Cu toate acestea, mul\u021bi proprietari de site-uri web folosesc site-urile de bookmarking social pentru a naviga articole interesante \u0219i a include link-uri. Acest lucru expune site-urile web la spammeri prin backlink-uri, deoarece spammerii creeaz\u0103 bookmark-uri spam atractive care sunt alese de utilizatori neaviza\u021bi.<\/p>\n\n\n\n<p>Pentru a combate spam-ul prin bookmarking, exist\u0103 diverse tehnici antispam disponibile, inclusiv:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Tehnici de clustering \u0219i clasificare bazate pe clustering-ul Self-Organizing Maps (SOM) \u0219i descoperirea asocierilor.<\/li>\n\n\n\n<li>Extrac\u021bia \u0219i agregarea caracteristicilor probabilistice.<\/li>\n\n\n\n<li>GraphLab Create \u0219i Probabilistic Soft Logic pentru extrac\u021bia caracteristicilor<\/li>\n\n\n\n<li>Clasificatorul Gradient-Boosted Decision Tree pentru clasificare.<\/li>\n<\/ol>\n\n\n<h4 class=\"wp-block-heading\" id=\"social-network-spam\"><strong>Spam pe re\u021bele sociale<\/strong><\/h4>\n\n\n<p>Tehnicile antispam actuale au identificat c\u0103 generatorii de spam pe re\u021bele sociale sunt robo\u021bi. Ace\u0219ti robo\u021bi sunt cunoscu\u021bi sub numele de Displayer, Bragger, Poster \u0219i Whisperer. Tehnicile antispam pentru re\u021bele sociale includ:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Raportul FF: Raportul dintre cererile de prietenie \u0219i num\u0103rul existent de prieteni. <\/li>\n\n\n\n<li>Raportul URL: Raportul dintre URL-urile dintr-un mesaj \u0219i num\u0103rul de cuvinte. <\/li>\n\n\n\n<li>Alegerea prietenilor: Similaritatea dintre listele de prieteni ale spammerului \u0219i ale victimei. <\/li>\n\n\n\n<li>Mesaje trimise: Num\u0103rul de mesaje pe care un utilizator le trimite \u00eentr-un interval de timp dat. <\/li>\n\n\n\n<li>Num\u0103rul de prieteni: Num\u0103rul de prieteni pe care \u00eei are un utilizator.<\/li>\n<\/ul>\n\n\n\n<p>Cu alte cuvinte, acestea sunt tehnici bazate pe clasificare bazate pe spam-bot \u0219i profil de spam \u0219i clasificare \u00een timp real. Tehnicile de clustering se concentreaz\u0103 pe clustering-ul Markov pe grafuri sociale \u0219i pe <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1110016814000970#:~:text=The%20Self%2DOrganizing%20Map%20(SOM)%20is%20an%20unsupervised%20learning,a%20low%2Ddimensional%20topology%20map.\" target=\"_blank\" rel=\"noreferrer noopener\">algoritmul de \u00eenv\u0103\u021bare SOM<\/a>, \u00een timp ce tehnicile de detectare \u0219i eliminare se bazeaz\u0103 pe clustering incremental urmat de clasificare. Tehnicile de clasificare \u0219i monitorizare se concentreaz\u0103 pe Social Spam Guard bazat pe re\u021bele sociale, iar tehnicile de detectare nesupravegheat\u0103 se concentreaz\u0103 pe <a href=\"https:\/\/www.openphilanthropy.org\/research\/hits-based-giving\/\" target=\"_blank\" rel=\"noreferrer noopener\">cadrul bazat pe HITS<\/a>.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"review-spam\"><strong>Spam \u00een recenzii<\/strong><\/h4>\n\n\n<p>Spam-ul \u00een recenzii este un tip de spam care apare ca recenzii pe diverse site-uri de comer\u021b electronic. Recenziile pozitive pot stimula afacerea unei companii, dar recenziile negative o pot afecta. Unii spammeri posteaz\u0103 inten\u021bionat <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/How-much-can-a-bad-review-hurt-your-business\" target=\"_blank\" rel=\"noreferrer noopener\">recenzii pentru a deteriora reputa\u021bia unui produs sau a unei companii<\/a>, iar robo\u021bii pot genera \u0219i aceste recenzii. \u00cen 2013, a fost conceput un model pentru a genera recenzii sintetice. A fost propus\u0103 o metod\u0103 de ap\u0103rare inovatoare pentru a detecta diferen\u021ba \u00een fluxurile semantice dintre recenziile false \u0219i cele adev\u0103rate, care sunt dificil de detectat folosind metodele existente.<\/p>\n\n\n\n<p>\u00cen prezent, exist\u0103 mai multe tehnici antispam pentru detectarea spam-ului \u00een recenzii, inclusiv:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tehnici bazate pe clasificare axate pe SVM cu kernel liniar \u0219i metode bazate pe n-gram. <\/li>\n\n\n\n<li>Tehnici bazate pe reguli. <\/li>\n\n\n\n<li>Tehnici bazate pe caracteristici sensibile la timp. <\/li>\n\n\n\n<li>Tehnici combinate bazate pe cadre pentru clasificare \u0219i clustering. <\/li>\n\n\n\n<li>Tehnici bazate pe clasificare axate pe generarea \u0219i analiza recenziilor sintetice. <\/li>\n\n\n\n<li>Tehnici bazate pe re\u021bele Loopy Belief Propagation (LBP).<\/li>\n<\/ul>\n\n\n<h4 class=\"wp-block-heading\" id=\"location-search-spam\"><strong>Spam \u00een c\u0103utarea loca\u021biilor<\/strong><\/h4>\n\n\n<p>Potrivit cercet\u0103rilor \u00een domeniul securit\u0103\u021bii cibernetice, spammerii pot infiltra \u0219i perturba un sistem de c\u0103utare valid prin asocierea de etichete irelevante cu documente sau chiar prin infuzarea aleatorie a documentelor cu termeni lega\u021bi de o anumit\u0103 loca\u021bie. A fost dezvoltat\u0103 o metodologie pentru detectarea spam-ului pe un site de bookmarking social bazat pe loca\u021bie, Foursquare, pentru a aborda aceast\u0103 problem\u0103. Foursquare permite utilizatorilor s\u0103 lase sfaturi despre diverse locuri \u0219i atrac\u021bii, pe care al\u021bi utilizatori le pot accesa. Cu toate acestea, spammerii posteaz\u0103 con\u021binut irelevant, cum ar fi sfaturi de afaceri, care induc \u00een eroare utilizatorii interesa\u021bi s\u0103 afle despre un anumit loc.<\/p>\n\n\n\n<p>Acest document analizeaz\u0103 spammerii de sugestii, av\u00e2nd ca scop dezvoltarea de instrumente automate pentru detectarea utilizatorilor care posteaz\u0103 sugestii spam. Tehnicile antispam pentru c\u0103utarea loca\u021biilor se bazeaz\u0103 pe clasificare \u0219i clustering axate pe clasificarea Random Forest \u0219i Decision Tree, <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320312002117\" target=\"_blank\" rel=\"noreferrer noopener\">clustering EM<\/a> pentru categorisire \u0219i clasificarea Random Forest.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"comment-spam\"><strong>Spam \u00een comentarii<\/strong><\/h4>\n\n\n<p>Spam-ul \u00een comentarii este prevalent pe platformele de social media, \u00een special pe YouTube \u0219i site-urile de \u0219tiri. O abordare de data mining a fost propus\u0103 pentru a filtra comentariile spam pe forumurile YouTube pentru a combate acest atac cibernetic. Spre deosebire de analiza con\u021binutului pentru detectarea spam-ului, aceast\u0103 abordare exploateaz\u0103 comportamentul comentariilor pentru a identifica spammerii. Metodologia profit\u0103 de <a href=\"https:\/\/deepai.org\/publication\/mining-user-comment-activity-for-detecting-forum-spammers-in-youtube\" target=\"_blank\" rel=\"noreferrer noopener\">func\u021bia hasSpamHint a YouTube<\/a> care \u00eenso\u021be\u0219te comentariile utilizatorilor. Iat\u0103 pa\u0219ii implica\u021bi:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Recupera\u021bi comentariile marcate ca hasSpamHint pentru un anumit videoclip.<\/li>\n\n\n\n<li>Extrage\u021bi ID-urile utilizatorilor din spatele comentariilor suspectate de spam pentru a aduna informa\u021bii despre activitatea de comentarii a utilizatorilor.<\/li>\n\n\n\n<li>Deriva\u021bi atribute precum textul comentariului, marca temporal\u0103, VideoID-ul videoclipului comentat \u0219i valoarea variabilei binare hasSpamHint din jurnalul de utilizare \u00een forumurile de discu\u021bii.<\/li>\n\n\n\n<li>Calcula\u021bi valorile variabilelor care indic\u0103 inten\u021bia de spam a utilizatorului.<\/li>\n\n\n\n<li>Atribui\u021bi un scor utilizatorului pentru a-l identifica ca spammer sau nu.<\/li>\n\n\n\n<li>Aplica\u021bi o regul\u0103 specific\u0103 derivat\u0103 din inspec\u021bia manual\u0103 a datelor pentru a marca orice utilizator care \u00eendepline\u0219te condi\u021biile regulii (cu cel pu\u021bin cinci comentarii) ca spammer.<\/li>\n<\/ol>\n\n\n\n<p>Aceast\u0103 tehnic\u0103 antispam se nume\u0219te bazat\u0103 pe reguli \u0219i <a href=\"https:\/\/arxiv.org\/pdf\/2004.13820\" target=\"_blank\" rel=\"noreferrer noopener\">Similaritate de subiect indus\u0103 de NLP<\/a> \u00een post\u0103ri \u0219i comentarii urmate de clasificare.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"crossmedia-spam\"><strong>Spam cross-media<\/strong><\/h4>\n\n\n<p>Spam-ul cross-media este o metodologie unic\u0103 anti-spam care detecteaz\u0103 spam-ul pe diferite platforme. Implic\u0103 identificarea rapid\u0103 a spam-ului \u00een toate re\u021belele sociale \u0219i cre\u0219terea acurate\u021bei detect\u0103rii spam-ului cu participarea unui set mare de date. De\u0219i o singur\u0103 strategie eficient\u0103 nu poate fi aplicat\u0103 tuturor formelor \u0219i platformelor de spam, aceast\u0103 tehnic\u0103 este un cadru inovator cross-platform pentru detectarea spam-ului social.<\/p>\n\n\n\n<p>Aceast\u0103 tehnic\u0103 este \u00eemp\u0103r\u021bit\u0103 \u00een trei componente principale:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Maparea \u0219i asamblarea folosesc conversia unui obiect specific al re\u021belei sociale \u00eentr-un model standard definit de cadru pentru obiect.<\/li>\n\n\n\n<li>Pre-filtrarea se bazeaz\u0103 pe liste negre, hashing \u0219i compararea similitudinilor pentru a compara obiectele primite cu obiectele spam cunoscute.<\/li>\n\n\n\n<li>Clasificarea se bazeaz\u0103 pe tehnici de \u00eenv\u0103\u021bare automat\u0103 supravegheat\u0103 pentru a clasifica obiectele primite \u0219i asociate.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">\u00cen concluzie<\/h2>\n\n\n<p>Spam-ul este o problem\u0103 r\u0103sp\u00e2ndit\u0103 pe Internet, iar tehnicile antispam au fost dezvoltate \u0219i implementate pe diverse platforme cu grade variate de succes. Aceste tehnici se \u00eencadreaz\u0103 \u00een general \u00een algoritmi deterministici, probabilistici sau bazate pe grafuri, dar fiecare categorie are varia\u021bii semnificative. Abord\u0103rile probabilistice sunt cele mai frecvent utilizate \u00een tehnicile moderne, deoarece caracteristicile re\u021belelor sociale difer\u0103 semnificativ de cele ale documentelor standard sau paginilor web. Cu toate acestea, lupta \u00eempotriva spam-ului este un joc f\u0103r\u0103 sf\u00e2r\u0219it, deoarece spammerii dezvolt\u0103 noi metode pentru a evita detectarea. <\/p>\n\n\n\n<p>Prin urmare, vigilen\u021ba constant\u0103 \u0219i dezvoltarea de noi \u0219i mai bune tehnici de combatere a spam-ului sunt esen\u021biale pentru a combate spam-ul eficient.<\/p>","protected":false},"excerpt":{"rendered":"<p>Spam se refer\u0103 la mesaje nedorite sau nesolicitate trimise sau primite pe cale electronic\u0103 prin e-mail, mesagerie instantanee, bloguri, grupuri de \u0219tiri, social media, c\u0103utare web \u0219i telefoane mobile, cu amenzi publicitare, Phishing, Malware, etc.... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/spam\/dezvoltari-recente-in-detectarea-si-combaterea-spamului-social\/\">Continue reading <span class=\"screen-reader-text\">Evolu\u021bii recente \u00een tehnicile de detectare \u0219i combatere a spam-ului social<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1584,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-1564","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spam","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Latest Techniques for Detecting and Preventing Social Spam<\/title>\n<meta name=\"description\" content=\"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/spam\/dezvoltari-recente-in-detectarea-si-combaterea-spamului-social\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Latest Techniques for Detecting and Preventing Social Spam\" \/>\n<meta property=\"og:description\" content=\"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/spam\/dezvoltari-recente-in-detectarea-si-combaterea-spamului-social\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-12T21:23:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Recent Developments in Social Spam Detection and Combating Techniques\",\"datePublished\":\"2023-03-12T21:23:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\"},\"wordCount\":2040,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"articleSection\":[\"spam\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\",\"url\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\",\"name\":\"Latest Techniques for Detecting and Preventing Social Spam\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"datePublished\":\"2023-03-12T21:23:10+00:00\",\"description\":\"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"Recent Developments in Social Spam\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recent Developments in Social Spam Detection and Combating Techniques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cele mai recente tehnici pentru detectarea \u0219i prevenirea spam-ului social","description":"Descoperi\u021bi algoritmi avansa\u021bi \u0219i tehnici de filtrare colaborativ\u0103 utilizate pentru a combate spam-ul social pe diverse platforme online.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/spam\/dezvoltari-recente-in-detectarea-si-combaterea-spamului-social\/","og_locale":"ro_RO","og_type":"article","og_title":"Latest Techniques for Detecting and Preventing Social Spam","og_description":"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.","og_url":"https:\/\/securitybriefing.net\/ro\/spam\/dezvoltari-recente-in-detectarea-si-combaterea-spamului-social\/","og_site_name":"Security Briefing","article_published_time":"2023-03-12T21:23:10+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"10 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Recent Developments in Social Spam Detection and Combating Techniques","datePublished":"2023-03-12T21:23:10+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/"},"wordCount":2040,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","articleSection":["spam"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/","url":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/","name":"Cele mai recente tehnici pentru detectarea \u0219i prevenirea spam-ului social","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","datePublished":"2023-03-12T21:23:10+00:00","description":"Descoperi\u021bi algoritmi avansa\u021bi \u0219i tehnici de filtrare colaborativ\u0103 utilizate pentru a combate spam-ul social pe diverse platforme online.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","width":600,"height":369,"caption":"Recent Developments in Social Spam"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Recent Developments in Social Spam Detection and Combating Techniques"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1564"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1564\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1584"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}