{"id":1564,"date":"2023-03-12T21:23:10","date_gmt":"2023-03-12T21:23:10","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1564"},"modified":"2023-03-12T21:23:10","modified_gmt":"2023-03-12T21:23:10","slug":"senaste-utvecklingen-inom-social-spam-detektion-och-bekampningstekniker","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/skrappost\/senaste-utvecklingen-inom-social-spam-detektion-och-bekampningstekniker\/","title":{"rendered":"Den senaste utvecklingen inom teknik f\u00f6r att uppt\u00e4cka och bek\u00e4mpa social skr\u00e4ppost"},"content":{"rendered":"<p>Spam refers to unwanted or unsolicited messages sent or received electronically via email, instant messaging, blogs, newsgroups, social media, web search, and mobile phones, with advertising fines, Phishing, Malware, etc. As is clear from the definition, Spam is intended for malice and generally represents a viable but fraudulent source of income for some individuals or organizations. The cyber attacker involved in sending such spam messages is generally referred to as a \u201cspammer.\u201d Although initially targeted and limited to email, spam has invaded all electronic platforms in all media.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-kinds-of-spam-exist-today\"><strong>Vilka typer av skr\u00e4ppost finns idag?<\/strong><\/h2>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>E-post skr\u00e4ppost<\/strong>: \u00e4ven k\u00e4nd som skr\u00e4pmail, skickar o\u00f6nskade meddelanden, ofta inneh\u00e5llande kommersiellt inneh\u00e5ll, i stora m\u00e4ngder till en urskillningsl\u00f6s grupp mottagare.<\/li>\n\n\n\n<li><strong>Skr\u00e4ppost i snabbmeddelanden anv\u00e4nder snabbmeddelandetj\u00e4nster (IM):<\/strong> \u00c4ven om det \u00e4r subtilare \u00e4n sin e-postmotsvarighet, tenderar det att irritera anv\u00e4ndare av snabbmeddelandetj\u00e4nster som Skype\u00a9, Yahoo!\u00ae och Messenger med o\u00f6nskade meddelanden fr\u00e5n annons\u00f6rer, etc.<\/li>\n\n\n\n<li><strong>Skr\u00e4ppost p\u00e5 nyhetsgrupper och forum<\/strong>: de flera och repetitiva inl\u00e4ggen i Usenet-nyhetsgrupper och irrelevanta internetforum.<\/li>\n\n\n\n<li><strong>Skr\u00e4ppost p\u00e5 mobiltelefoner<\/strong>: Denna form av skr\u00e4ppost anv\u00e4nder kortmeddelandetj\u00e4nster (SMS) som sin modus operandi. Ibland debiteras kunder f\u00f6r premiumtj\u00e4nster genom att luras in i n\u00e5gon falsk prenumeration och bedr\u00e4geri.<\/li>\n\n\n\n<li><strong>Spamdexning<\/strong>: avser s\u00f6kmotorskr\u00e4ppost eller praxis att manipulera s\u00f6kmotorns rankning och relevansalgoritm f\u00f6r att fr\u00e4mja en viss webbplats eller webbsida.<\/li>\n\n\n\n<li><strong>Splogs och Wikis<\/strong>: Skr\u00e4ppost p\u00e5 bloggar, \u00e4ven k\u00e4nd som Splog, avser kommentarer som inte \u00e4r relaterade till diskussionens \u00e4mne. Dessa kommentarer \u00e4r vanligtvis inb\u00e4ddade med URL-l\u00e4nkar till n\u00e5gra kommersiella sajter. Vissa Splogs \u00e4r skrivna som detaljerade annonser f\u00f6r de webbplatser de fr\u00e4mjar; andra har inget originalinneh\u00e5ll och inneh\u00e5ller nonsens eller inneh\u00e5ll stulen fr\u00e5n legitima webbplatser. Liknande typer av attacker ses ocks\u00e5 p\u00e5 Wikis och andra g\u00e4stb\u00f6cker som accepterar kommentarer fr\u00e5n allm\u00e4nna anv\u00e4ndare.<\/li>\n\n\n\n<li><strong>Skr\u00e4ppost p\u00e5 videosajter<\/strong>: Sociala n\u00e4tverkssajter som YouTube \u00e4r ocks\u00e5 fulla av skr\u00e4ppost som vanligtvis involverar kommentarer och l\u00e4nkar till n\u00e5gon pornografisk eller dejtingsajt eller n\u00e5gra orelaterade videor. Ibland genereras dessa kommentarer automatiskt genom Bots.<\/li>\n\n\n\n<li><strong>Skr\u00e4ppost i meddelanden i onlinespel<\/strong>: de \u00e4r fl\u00f6den av meddelanden, f\u00f6rfr\u00e5gningar att g\u00e5 med i en viss grupp, \u00f6vertr\u00e4delser av upphovsr\u00e4ttsvillkor och -villkor, etc.<\/li>\n\n\n\n<li><strong>Spi eller Skr\u00e4ppost \u00f6ver internettelefoni<\/strong>: Detta anv\u00e4nder r\u00f6st \u00f6ver internettelefoni (VoIP) f\u00f6r att skicka skr\u00e4ppost. Vanligtvis spelas ett f\u00f6rinspelat meddelande upp n\u00e4r mottagaren av misstag tar emot ett skr\u00e4ppostsamtal. Denna plattform \u00e4r ett s\u00e5rbart m\u00e5l f\u00f6r skr\u00e4ppostare eftersom VoIP \u00e4r billigt och l\u00e4tt att anonymisera.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-spam-and-spamming-techniques\"><strong>Typer av skr\u00e4ppost och skr\u00e4pposttekniker<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"types-of-spam\"><strong>Typer av skr\u00e4ppost<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Skadliga l\u00e4nkar<\/strong>: Links that harm, mislead, or otherwise harm a user\u2019s computer.<\/li>\n\n\n\n<li><strong>Falska profiler<\/strong>: Skr\u00e4ppostare kan skapa falska profiler som annars skulle verka legitima f\u00f6r att undvika uppt\u00e4ckt och locka icke-skr\u00e4ppostare att bli v\u00e4nner med dem.<\/li>\n\n\n\n<li><strong>Massutskick<\/strong>: de \u00e4r k\u00e4nda som skr\u00e4ppostbomber; de \u00e4r en upps\u00e4ttning kommentarer som publiceras flera g\u00e5nger med exakt samma text, vilket g\u00f6r att taggarna som \u00e4r associerade med kommentarerna snabbt trendar p\u00e5 sociala n\u00e4tverk.<\/li>\n\n\n\n<li><strong>Bedr\u00e4gerirecensioner<\/strong>: Dessa recensioner h\u00e4vdar att en produkt \u00e4r original och bra, \u00e4ven om recensenten kanske inte har anv\u00e4nt den.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"spamming-techniques\"><strong>Skr\u00e4pposttekniker<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Klickkapning<\/strong>: \u00c4ven k\u00e4nd som <a href=\"https:\/\/owasp.org\/www-community\/attacks\/Clickjacking#:~:text=Clickjacking%2C%20also%20known%20as%20a,on%20the%20top%20level%20page.\" target=\"_blank\" rel=\"noreferrer noopener\">UI-omkl\u00e4dning<\/a>, lurar skr\u00e4ppostare anv\u00e4ndare att klicka p\u00e5 osynliga m\u00e5l (t.ex. knappar) som tillh\u00f6r en annan sida. Denna form av skr\u00e4ppost kan ses fr\u00e4mst p\u00e5 bloggar och forum.<\/li>\n\n\n\n<li><strong>Skadliga webbl\u00e4sartill\u00e4gg via drive-by nedladdningar<\/strong>: This form of attack occurs by downloading malware from the Internet without the user\u2019s notice. This type of spam usually comes as malicious links and can be found on blogs, website bookmarks, reviews, etc.<\/li>\n\n\n\n<li><strong>URL-f\u00f6rkortare<\/strong>: In this spam attack, the shortened URL obfuscates the actual URL and redirects to its configured destinations without the user\u2019s consent. This type of spam is more frequent in social networks, microblogs, reviews, etc.<\/li>\n\n\n\n<li><strong>Social ingenj\u00f6rsskriptinjektion<\/strong>: In this attack, end-users are tricked into executing malicious JavaScript code of the spammer\u2019s choice in the context of the victim\u2019s site, thereby attacking users\u2019 trust. Again, this attack is often associated with obscure links to malicious programs or websites. It may appear as forms on some review websites, such as emails.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"spam-detection-techniques\"><strong>Skr\u00e4ppostdetekteringstekniker<\/strong><\/h2>\n\n\n<p>Det finns tre huvudstrategier f\u00f6r att hantera skr\u00e4ppost:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detektionsbaserade tekniker: Dessa f\u00f6rs\u00f6ker identifiera och ta bort skr\u00e4ppost fr\u00e5n systemet. <\/li>\n\n\n\n<li>Nedgraderingsbaserade strategier: Dessa f\u00f6rs\u00f6ker s\u00e4nka skr\u00e4ppostrangordningen i en lista \u00f6ver meddelanden. <\/li>\n\n\n\n<li>F\u00f6rebyggande strategier: Dessa syftar till att hindra skr\u00e4ppostare fr\u00e5n att bidra till systemet genom att \u00e4ndra gr\u00e4nssnitt eller begr\u00e4nsa anv\u00e4ndar\u00e5tg\u00e4rder.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"latest-developments-in-antispam-techniques\"><strong>Senaste utvecklingen inom antispamtekniker<\/strong><\/h3>\n\n<h4 class=\"wp-block-heading\" id=\"email-spam\"><strong>E-post Skr\u00e4ppost<\/strong><\/h4>\n\n\n<p>Samarbetsfiltrering anv\u00e4nds genom ett socialt n\u00e4tverk som kallas SocialFilter, vilket \u00e4r ett samarbetsbaserat skr\u00e4ppostfiltreringssystem som anv\u00e4nder socialt f\u00f6rtroende integrerat i <a href=\"https:\/\/academic.oup.com\/jcmc\/article-abstract\/3\/1\/JCMC313\/4584354\" target=\"_blank\" rel=\"noreferrer noopener\">online sociala n\u00e4tverk<\/a> (OSN) f\u00f6r att utv\u00e4rdera <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/1416950.1416953\" target=\"_blank\" rel=\"noreferrer noopener\">tillf\u00f6rlitligheten hos skr\u00e4ppostrapport\u00f6rer<\/a>. Det \u00e4r en grafbaserad metod som baseras p\u00e5 OSN-grafen. SocialFilter syftar till att l\u00e4gga till funktionerna hos flera skr\u00e4ppostdetektorer och d\u00e4rigenom demokratisera skr\u00e4ppostbek\u00e4mpning. Varje SocialFilter-nod, som hanteras av en m\u00e4nsklig administrat\u00f6r, skickar skr\u00e4ppostrapporter till ett centraliserat arkiv.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"blog-spam\"><strong>Blogg Skr\u00e4ppost<\/strong><\/h4>\n\n\n<p>Bloggar \u00e4r en plattform d\u00e4r m\u00e4nniskor uttrycker sina k\u00e4nslor, delar information och kommunicerar med varandra. Med deras v\u00e4xande popularitet anv\u00e4nds bloggar nu f\u00f6r att driva bloggs\u00f6kmotortrafik eller f\u00f6r marknadsf\u00f6rings\u00e4ndam\u00e5l. Dessa typer av bloggar kallas Splogs. Men de flesta befintliga Splog-detekteringstekniker \u00e4r inneh\u00e5llsbaserade, vilket \u00e4r mindre effektivt med tanke p\u00e5 bloggars dynamiska natur.<\/p>\n\n\n\n<p>F\u00f6r n\u00e4rvarande anv\u00e4nds tre antispamtekniker f\u00f6r att bek\u00e4mpa Splogs:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Detektionsbaserade tekniker som anv\u00e4nder en deterministisk metod arbetar med en upps\u00e4ttning Technorati Queries-data med detektionsnoggrannhet st\u00f6rre \u00e4n 60%.<\/li>\n\n\n\n<li>Klassificeringsbaserade tekniker som verkar genom kommentarer fr\u00e5n sociala n\u00e4tverk med detektionsnoggrannhet st\u00f6rre \u00e4n 60%.<\/li>\n\n\n\n<li>Detektionsbaserade tekniker som anv\u00e4nder grupperade sociala grafer med hj\u00e4lp av publikationer p\u00e5 kommersiella bloggsajter. Denna teknik anses vara den mest effektiva f\u00f6r att uppt\u00e4cka skr\u00e4ppostare.<\/li>\n<\/ol>\n\n\n<h4 class=\"wp-block-heading\" id=\"microblog-spam\"><strong>Mikroblogg Skr\u00e4ppost<\/strong><\/h4>\n\n\n<p>Mikroblogg skr\u00e4ppost avser skr\u00e4ppost p\u00e5 mikrobloggningsplattformar, s\u00e5som Twitter, d\u00e4r det finns en begr\u00e4nsning p\u00e5 storleken av tweeten. F\u00f6r att uppt\u00e4cka mikroblogg skr\u00e4ppost finns det flera tekniker tillg\u00e4ngliga, inklusive:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Deterministiska metoder som studerar fall f\u00f6r att identifiera skr\u00e4ppost.<\/li>\n\n\n\n<li>Klassificeringsbaserade metoder som fokuserar p\u00e5 Social Honeypot Framework.<\/li>\n\n\n\n<li>Nedgraderingstekniker som fokuserar p\u00e5 Collusion Rank och PageRank.<\/li>\n<\/ol>\n\n\n\n<p>Det finns ocks\u00e5 antispamtekniker som kombinerar fallstudier och klassificering, s\u00e5som <a href=\"https:\/\/hal.science\/hal-03200358\/document\" target=\"_blank\" rel=\"noreferrer noopener\">social-graf baserad Mr. SPA<\/a>, samt tekniker baserade p\u00e5 klustring av skr\u00e4ppostkampanjer och m\u00e4rkning av dem med RF Classifier, Lasso-formulering integrerad med en grafregulariseringsterm, Random Forest Classification med justerade funktioner och ELM-baserad klassificerare med definierade funktioner.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"bookmarking-spam\"><strong>Bokm\u00e4rkeskr\u00e4ppost<\/strong><\/h4>\n\n\n<p>Sociala bokm\u00e4rken har utvecklats fr\u00e5n traditionella bokm\u00e4rken till en plattform d\u00e4r anv\u00e4ndare kan l\u00e4gga till, redigera eller \u00e4ndra en webbplats eller webbsida f\u00f6r framtida \u00e5tkomst. Dessa sajter till\u00e5ter anv\u00e4ndare att bokm\u00e4rka olika webbsidor och dela sina \u00e5sikter om artiklar, bilder och videor. Men m\u00e5nga webbplats\u00e4gare anv\u00e4nder sociala bokm\u00e4rkessajter f\u00f6r att bl\u00e4ddra i intressanta artiklar och inkludera l\u00e4nkar. Detta uts\u00e4tter webbplatser f\u00f6r skr\u00e4ppostare genom bak\u00e5tl\u00e4nkar, eftersom skr\u00e4ppostare skapar attraktiva skr\u00e4ppostbokm\u00e4rken som v\u00e4ljs av intet ont anande anv\u00e4ndare.<\/p>\n\n\n\n<p>F\u00f6r att bek\u00e4mpa bokm\u00e4rkeskr\u00e4ppost finns det olika antispamtekniker tillg\u00e4ngliga, inklusive:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Klustrings- och klassificeringstekniker baserade p\u00e5 sj\u00e4lvorganiserande kartor (SOM) klustring och associationsuppt\u00e4ckt.<\/li>\n\n\n\n<li>Sannolikhetsbaserad funktionsutvinning och aggregering.<\/li>\n\n\n\n<li>GraphLab Create och Probabilistic Soft Logic f\u00f6r funktionsutvinning<\/li>\n\n\n\n<li>Gradient-Boosted Decision Tree klassificerare f\u00f6r klassificering.<\/li>\n<\/ol>\n\n\n<h4 class=\"wp-block-heading\" id=\"social-network-spam\"><strong>Sociala n\u00e4tverksskr\u00e4ppost<\/strong><\/h4>\n\n\n<p>Nuvarande antispamtekniker har identifierat att generatorerna av sociala n\u00e4tverksskr\u00e4ppost \u00e4r robotar. Dessa robotar \u00e4r k\u00e4nda som Displayer, Bragger, Poster och Whisperer. Antispamteknikerna f\u00f6r sociala n\u00e4tverk inkluderar:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FF Ratio: F\u00f6rh\u00e5llandet mellan v\u00e4nf\u00f6rfr\u00e5gningar och det befintliga antalet v\u00e4nner. <\/li>\n\n\n\n<li>URL-f\u00f6rh\u00e5llande: F\u00f6rh\u00e5llandet mellan URL:er i ett meddelande och antalet ord. <\/li>\n\n\n\n<li>Friend choice: The similarity between the spammer and the victim\u2019s friend lists. <\/li>\n\n\n\n<li>Skickade meddelanden: Antalet meddelanden en anv\u00e4ndare skickar under en given tidsram. <\/li>\n\n\n\n<li>Antal v\u00e4nner: Antalet v\u00e4nner en anv\u00e4ndare har.<\/li>\n<\/ul>\n\n\n\n<p>Med andra ord, dessa \u00e4r klassificeringsbaserade tekniker baserade p\u00e5 skr\u00e4ppost-bot och skr\u00e4ppostprofil och k\u00f6rningstidklassificering. Klustringstekniker fokuserar p\u00e5 Markov-klustring p\u00e5 sociala grafer och <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1110016814000970#:~:text=The%20Self%2DOrganizing%20Map%20(SOM)%20is%20an%20unsupervised%20learning,a%20low%2Ddimensional%20topology%20map.\" target=\"_blank\" rel=\"noreferrer noopener\">SOM-l\u00e4randealgoritmen<\/a>, medan detektions- och borttagningstekniker \u00e4r baserade p\u00e5 inkrementell klustring f\u00f6ljt av klassificering. Klassificerings- och \u00f6vervakningstekniker fokuserar p\u00e5 det sociala n\u00e4tverksbaserade Social Spam Guard, och o\u00f6vervakade detektionstekniker fokuserar p\u00e5 <a href=\"https:\/\/www.openphilanthropy.org\/research\/hits-based-giving\/\" target=\"_blank\" rel=\"noreferrer noopener\">HITS-baserad ramverk<\/a>.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"review-spam\"><strong>Recensionskr\u00e4ppost<\/strong><\/h4>\n\n\n<p>Review Spam is a type of spam that appears as reviews on various e-commerce websites. Positive reviews can boost a company\u2019s business, but negative reviews can harm it. Some spammers intentionally <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/How-much-can-a-bad-review-hurt-your-business\" target=\"_blank\" rel=\"noreferrer noopener\">publicera recensioner f\u00f6r att skada en produkts eller f\u00f6retags rykte<\/a>, och robotar kan ocks\u00e5 generera dessa recensioner. \u00c5r 2013 designades en modell f\u00f6r att generera syntetiska recensioner. En ny f\u00f6rsvarsmetod f\u00f6reslogs f\u00f6r att uppt\u00e4cka skillnaden i semantiska fl\u00f6den mellan falska och sanna recensioner, som \u00e4r sv\u00e5ra att uppt\u00e4cka med befintliga metoder.<\/p>\n\n\n\n<p>F\u00f6r n\u00e4rvarande finns det flera antispamtekniker f\u00f6r att uppt\u00e4cka recensionskr\u00e4ppost, inklusive:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Klassificeringsbaserade tekniker fokuserade p\u00e5 linj\u00e4r k\u00e4rna SVM och n-gram-baserade metoder. <\/li>\n\n\n\n<li>Regelbaserade tekniker. <\/li>\n\n\n\n<li>Tidsk\u00e4nsliga funktionsbaserade tekniker. <\/li>\n\n\n\n<li>Kombinerade tekniker baserade p\u00e5 ramverk f\u00f6r klassificering och klustring. <\/li>\n\n\n\n<li>Klassificeringsbaserade tekniker fokuserade p\u00e5 att generera och analysera syntetiska recensioner. <\/li>\n\n\n\n<li>Loopy Belief Propagation (LBP) n\u00e4tverksbaserade tekniker.<\/li>\n<\/ul>\n\n\n<h4 class=\"wp-block-heading\" id=\"location-search-spam\"><strong>Platsbaserad s\u00f6kskr\u00e4ppost<\/strong><\/h4>\n\n\n<p>Enligt cybers\u00e4kerhetsforskning kan skr\u00e4ppostare infiltrera och st\u00f6ra ett giltigt s\u00f6ksystem genom att associera orelaterade taggar med dokument eller till och med slumpm\u00e4ssigt inf\u00f6ra dokument med termer relaterade till en viss plats. En metodik f\u00f6r att uppt\u00e4cka skr\u00e4ppost p\u00e5 en platsbaserad social bokm\u00e4rkessajt, Foursquare, utvecklades f\u00f6r att hantera detta problem. Foursquare till\u00e5ter anv\u00e4ndare att l\u00e4mna tips om olika platser och attraktioner, som andra anv\u00e4ndare kan komma \u00e5t. Men skr\u00e4ppostare publicerar irrelevant inneh\u00e5ll, s\u00e5som aff\u00e4rstips, vilket vilseleder anv\u00e4ndare som \u00e4r intresserade av att l\u00e4ra sig om en viss plats.<\/p>\n\n\n\n<p>Detta dokument analyserar f\u00f6rslagsskr\u00e4ppostare, med m\u00e5let att utveckla automatiserade verktyg f\u00f6r att uppt\u00e4cka anv\u00e4ndare som publicerar skr\u00e4pf\u00f6rslag. De platsbaserade s\u00f6kskr\u00e4ppostteknikerna \u00e4r baserade p\u00e5 klassificering och klustring fokuserad p\u00e5 Random Forest och beslutstr\u00e4desbaserad klassificering, <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320312002117\" target=\"_blank\" rel=\"noreferrer noopener\">EM-klustring<\/a> f\u00f6r kategorisering och Random Forest-klassificering.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"comment-spam\"><strong>Kommentarskr\u00e4ppost<\/strong><\/h4>\n\n\n<p>Kommentarskr\u00e4ppost \u00e4r vanligt f\u00f6rekommande p\u00e5 sociala medieplattformar, s\u00e4rskilt p\u00e5 YouTube och nyhetssajter. En datautvinningsmetod har f\u00f6reslagits f\u00f6r att filtrera skr\u00e4ppostkommentarer p\u00e5 YouTube-forum f\u00f6r att bek\u00e4mpa denna cyberattack. Till skillnad fr\u00e5n inneh\u00e5llsanalys f\u00f6r skr\u00e4ppostdetektering utnyttjar denna metod kommentarens beteende f\u00f6r att identifiera skr\u00e4ppostare. Metodiken utnyttjar <a href=\"https:\/\/deepai.org\/publication\/mining-user-comment-activity-for-detecting-forum-spammers-in-youtube\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube\u2019s hasSpamHint feature<\/a> som \u00e5tf\u00f6ljer anv\u00e4ndarkommentarer. H\u00e4r \u00e4r stegen som ing\u00e5r:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>H\u00e4mta kommentarer markerade som hasSpamHint f\u00f6r en given video.<\/li>\n\n\n\n<li>Extrahera anv\u00e4ndar-ID:n bakom de misst\u00e4nkta skr\u00e4ppostkommentarerna f\u00f6r att samla information om anv\u00e4ndarens kommentarsaktivitet.<\/li>\n\n\n\n<li>H\u00e4rled attribut som kommentartext, tidsst\u00e4mpel, VideoID f\u00f6r den kommenterade videon och v\u00e4rdet av hasSpamHint bin\u00e4r variabel fr\u00e5n anv\u00e4ndningsloggen i diskussionsforum.<\/li>\n\n\n\n<li>Ber\u00e4kna v\u00e4rdena f\u00f6r variabler som indikerar anv\u00e4ndarens skr\u00e4ppostavsikt.<\/li>\n\n\n\n<li>Tilldela en po\u00e4ng till anv\u00e4ndaren f\u00f6r att identifiera dem som en skr\u00e4ppostare eller inte.<\/li>\n\n\n\n<li>Apply a specific rule derived from manual data inspection to mark any user who meets the rule\u2019s conditions (with at least five comments) as a spammer.<\/li>\n<\/ol>\n\n\n\n<p>Denna antispamteknik kallas Regelbaserad och <a href=\"https:\/\/arxiv.org\/pdf\/2004.13820\" target=\"_blank\" rel=\"noreferrer noopener\">NLP-inducerad \u00e4mneslikhet<\/a> i inl\u00e4gg och kommentarer f\u00f6ljt av klassificering.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"crossmedia-spam\"><strong>Cross-media skr\u00e4ppost<\/strong><\/h4>\n\n\n<p>Cross-media skr\u00e4ppost \u00e4r en unik antispammetodik som uppt\u00e4cker skr\u00e4ppost \u00f6ver olika plattformar. Det inneb\u00e4r snabb identifiering av skr\u00e4ppost i alla sociala n\u00e4tverk och en \u00f6kning av skr\u00e4ppostdetekteringsnoggrannheten med deltagande av en stor datam\u00e4ngd. \u00c4ven om en enda effektiv strategi inte kan till\u00e4mpas p\u00e5 alla former och plattformar av skr\u00e4ppost, \u00e4r denna teknik ett innovativt plattforms\u00f6vergripande ramverk f\u00f6r att uppt\u00e4cka social skr\u00e4ppost.<\/p>\n\n\n\n<p>Denna teknik \u00e4r indelad i tre huvudkomponenter:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Kartl\u00e4ggning och montering anv\u00e4nder konvertering av ett specifikt socialt n\u00e4tverksobjekt till en ramverksdefinierad standardmodell f\u00f6r objektet.<\/li>\n\n\n\n<li>F\u00f6rfiltrering \u00e4r baserad p\u00e5 svartlistor, hashning och likhetsj\u00e4mf\u00f6relse f\u00f6r att j\u00e4mf\u00f6ra inkommande objekt med k\u00e4nda skr\u00e4ppostobjekt.<\/li>\n\n\n\n<li>Klassificering \u00e4r baserad p\u00e5 \u00f6vervakade maskininl\u00e4rningstekniker f\u00f6r att klassificera inkommande och associerade objekt.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">Sammanfattningsvis<\/h2>\n\n\n<p>Skr\u00e4ppost \u00e4r ett utbrett problem p\u00e5 internet, och antispamtekniker har utvecklats och implementerats \u00f6ver olika plattformar med varierande grad av framg\u00e5ng. Dessa tekniker faller brett in i deterministiska, sannolikhetsbaserade eller grafbaserade algoritmer, men varje kategori har betydande variation. Sannolikhetsbaserade metoder \u00e4r mest anv\u00e4nda i moderna tekniker, eftersom egenskaperna hos sociala n\u00e4tverk skiljer sig avsev\u00e4rt fr\u00e5n standarddokument eller webbsidor. Men kampen mot skr\u00e4ppost \u00e4r ett o\u00e4ndligt spel eftersom skr\u00e4ppostare utvecklar nya metoder f\u00f6r att undvika uppt\u00e4ckt. <\/p>\n\n\n\n<p>D\u00e4rf\u00f6r \u00e4r st\u00e4ndig vaksamhet och utveckling av nya och b\u00e4ttre skr\u00e4ppostbek\u00e4mpningstekniker avg\u00f6rande f\u00f6r att effektivt bek\u00e4mpa skr\u00e4ppost.<\/p>","protected":false},"excerpt":{"rendered":"<p>Spam avser o\u00f6nskade eller icke beg\u00e4rda meddelanden som skickas eller tas emot elektroniskt via e-post, snabbmeddelanden, bloggar, nyhetsgrupper, sociala medier, webbs\u00f6kning och mobiltelefoner, med reklamb\u00f6ter, n\u00e4tfiske, skadlig kod etc. .... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/skrappost\/senaste-utvecklingen-inom-social-spam-detektion-och-bekampningstekniker\/\">Continue reading <span class=\"screen-reader-text\">Den senaste utvecklingen inom teknik f\u00f6r att uppt\u00e4cka och bek\u00e4mpa social skr\u00e4ppost<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1584,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-1564","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spam","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Latest Techniques for Detecting and Preventing Social Spam<\/title>\n<meta name=\"description\" content=\"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/skrappost\/senaste-utvecklingen-inom-social-spam-detektion-och-bekampningstekniker\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Latest Techniques for Detecting and Preventing Social Spam\" \/>\n<meta property=\"og:description\" content=\"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/skrappost\/senaste-utvecklingen-inom-social-spam-detektion-och-bekampningstekniker\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-12T21:23:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Recent Developments in Social Spam Detection and Combating Techniques\",\"datePublished\":\"2023-03-12T21:23:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\"},\"wordCount\":2040,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"articleSection\":[\"spam\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\",\"url\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\",\"name\":\"Latest Techniques for Detecting and Preventing Social Spam\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"datePublished\":\"2023-03-12T21:23:10+00:00\",\"description\":\"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"Recent Developments in Social Spam\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recent Developments in Social Spam Detection and Combating Techniques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Senaste teknikerna f\u00f6r att uppt\u00e4cka och f\u00f6rhindra socialt skr\u00e4ppost","description":"Uppt\u00e4ck avancerade algoritmer och tekniker f\u00f6r kollaborativ filtrering som anv\u00e4nds f\u00f6r att bek\u00e4mpa socialt spam p\u00e5 olika onlineplattformar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/skrappost\/senaste-utvecklingen-inom-social-spam-detektion-och-bekampningstekniker\/","og_locale":"sv_SE","og_type":"article","og_title":"Latest Techniques for Detecting and Preventing Social Spam","og_description":"Discover advanced algorithms and collaborative filtering techniques used to combat social spam on various online platforms.","og_url":"https:\/\/securitybriefing.net\/sv\/skrappost\/senaste-utvecklingen-inom-social-spam-detektion-och-bekampningstekniker\/","og_site_name":"Security Briefing","article_published_time":"2023-03-12T21:23:10+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"security","Ber\u00e4knad l\u00e4stid":"10 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Recent Developments in Social Spam Detection and Combating Techniques","datePublished":"2023-03-12T21:23:10+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/"},"wordCount":2040,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","articleSection":["spam"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/","url":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/","name":"Senaste teknikerna f\u00f6r att uppt\u00e4cka och f\u00f6rhindra socialt skr\u00e4ppost","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","datePublished":"2023-03-12T21:23:10+00:00","description":"Uppt\u00e4ck avancerade algoritmer och tekniker f\u00f6r kollaborativ filtrering som anv\u00e4nds f\u00f6r att bek\u00e4mpa socialt spam p\u00e5 olika onlineplattformar.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Recent-Developments-in-Social-Spam-1.jpg","width":600,"height":369,"caption":"Recent Developments in Social Spam"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/spam\/recent-developments-in-social-spam-detection-and-combating-techniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Recent Developments in Social Spam Detection and Combating Techniques"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"s\u00e4kerhet","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e4r en senior personalf\u00f6rfattare f\u00f6r Government Technology. Hon skrev tidigare f\u00f6r PYMNTS och The Bay State Banner och har en BA i kreativt skrivande fr\u00e5n Carnegie Mellon. Hon \u00e4r baserad utanf\u00f6r Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/sv\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=1564"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1564\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/1584"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=1564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=1564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=1564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}