1 / 17

A method of extracting malicious expressions in bulletin board systems by using context analysis

A method of extracting malicious expressions in bulletin board systems by using context analysis. Presenter: Jun-Yi Wu Authors: Hiroshi Hanafusa , Kazuhiro Morita, Masao Fuketa , Jun- ichi Aoe. 國立雲林科技大學 National Yunlin University of Science and Technology. 2011 IPM. Outline. Motivation

neith
Download Presentation

A method of extracting malicious expressions in bulletin board systems by using context analysis

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A method of extracting malicious expressions in bulletin board systems by using context analysis Presenter: Jun-Yi Wu Authors: Hiroshi Hanafusa, Kazuhiro Morita, Masao Fuketa, Jun-ichiAoe 國立雲林科技大學 National Yunlin University of Science and Technology 2011 IPM

  2. Outline • Motivation • Objective • Methodology • Experiments • Conclusion • Comments

  3. Motivation • The extracting scheme of the traditional method depends on words or a sequence of words without considering contexts of articles. • To takes a lot of human efforts to alert malicious articles. Non-malicious expression text Malicious expression text

  4. Objective • To presents a new context filtering algorithm to reduce the effort of human and to improve the rate of false positive without degrading the rate of false negative.

  5. Methodology • The presented system • Rule-based extracting knowledge • Multi-attribute matching

  6. Methodology • The presented system

  7. Methodology Non-malicious expression text Malicious expression text • The presented system • The outline of context analysis

  8. Methodology • The presented system • Inadequate and crime expressions

  9. Methodology • Rule-based extracting knowledge • Definition of multi-attribute rules • For example: “He kills someone”

  10. Methodology • Multi-attribute matching • Construction of machines(MAPM) • Goto and out function

  11. Methodology • Multi-attribute matching • Procedure • For example : “I get a strong sward”

  12. Experiments

  13. Experiments

  14. Experiments

  15. Experiments • Time evaluation and error analysis

  16. Conclusion • The presented method MULTI is a very useful approach for filtering services for inadequate expressions. • It is difficult task to register new words and expressions into dictionaries together with their categories and semantics. • The rules bases of the presented method MULTI is building for frequent expressions step by step, but there are difficult problems as shown in the following examples: • ‘‘RQJmcf2O” kill ‘‘Aaaaqqqbbb” 16

  17. Comments • Advantage • Many examples • Drawback • Some mistakes • Application • Information retrieval • Context analysis 17

More Related