Detecting bad information in mobile wireless networks based on the wireless application protocol
Tóm tắt
The scale of mobile wireless networks is increasing sharply. However, many websites in the WAP networks contain obscenity information, viruses, and Trojans. How to crawl, judge and locate these bad websites is a challenging problem. In this article, a WAP bad information detection system is proposed, which contains crawling, judgment and location subsystems to identify bad WAP websites. The distributed crawling is adapted to break the IP limitation of WAP networks. Text and image automatic classification are introduced in the judgment subsystem. The location subsystem can locate the bad sites and collect the evidence. The experiment results verify that our WAP bad information detection system has high efficiency and accuracy.
Tài liệu tham khảo
Mason D, Jose JM, Joseph A (2002) WapSearch: a system for searching the web using WAP enabled devices. In: NDDL, pp 29–38
Roussev V (2009) Hashing and data fingerprinting in digital forensics. IEEE Secur Privacy 7:49–55
Zhu Y (2012) Introducing google chart tools and google maps API in data visualization courses. IEEE Comput Graph Appl 32:6–9
Lin T, Wang K, Liu A (2005) An efficient load balancing strategy for scalable WAP gateways. Comput Commun 28:1028–1037
Agustina JV, Zhang P, Kantola R (2003) Performance evaluation of GSM handover traffic in a GPRS/GSM network. In: ISCC, pp 137–142
Rutagemwa H, Shen X (2003) Modeling and Analysis of WAP Performance over Wireless Links. IEEE Trans Mob Comput 2:221–232
Yu S, Cai D, Wen J, Ma W (2003) Improving pseudo-relevance feedback in web information retrieval using web page segmentation. In: WWW, pp 11–18
Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34:1–47
Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18:613–620
Salton G, Buckley C (1990) Improving retrieval performance by relevance feedback. In: JASIS, pp 288–297
Sharma K, Ghose MK (2011) Cross layer security framework for wireless sensor networks. Int J Security Appl 5(1):35–52
Joachims T (1998) Text categorization with suport vector machines: learning with many relevant features. In: ECML, pp 137–142
Chang C, Lin C (2011) LIBSVM: a library for support vector machines. In: ACM TIST, pp 27–27
Xu J, Wang J, Xie S, Chen W, Kim JU (2013) Study on intrusion detection policy for wireless sensor networks. Int J Security Appl 7(1):1–6
Baohuai S, Jianli W, Ping L (2008) The covering number for some Mercer kernel Hilbert spaces. J Complex 24:241–258
Mitra K, Bhattacharyya D, Sattarova FY, Kim T (2009) A heuristic approach for mobile phone bases information management system in wireless sensor network. Int J Grid Dist Comp 2(3):1–12
Hsu C, Lin C (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13:415–425
Musznicki B, Zwierzykowski P (2012) Survey of simulators for wireless sensor networks. Int J Grid Dist Comput 5(3):23–50
Salton G, McGill M (1984) Introduction to modern information retrieval. McGraw-Hill Inc., New York