Intrusive feature classification model

Data processing: artificial intelligence – Machine learning

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07991710

ABSTRACT:
Landing pages associated with advertisements are partitioned into training landing pages and testing landing pages. Iterative training and testing of a classification mode on intrusion features of the partitioned landing pages is conducted until the occurrence of a cessation event. Feature weights are derived from the iterative training and testing, and are associated with the intrusion features. The associated feature weights and intrusion features can be used to classify other landing pages.

REFERENCES:
patent: 6654725 (2003-11-01), Langheinrich et al.
patent: 7111246 (2006-09-01), Suave et al.
patent: 7222127 (2007-05-01), Bem et al.
patent: 2004/0143756 (2004-07-01), Munson et al.
patent: 2005/0108227 (2005-05-01), Russell-Falla et al.
patent: 2006/0015404 (2006-01-01), Tran
patent: 2006/0085854 (2006-04-01), Agrawal et al.
patent: 2007/0118903 (2007-05-01), Bates et al.
Niels Provos, Peter Honeyman, ‘Hide and Seek:An introduction to Steganography’, 2003, IEEE, 1540-7993, pp. 32-44.
Casado, M. and Freedman, M.J., “Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification,” In Proceedings of the 4th Networked Systems Design and Implementation, Apr. 2007.
Christianson, B. and Harbison, W.S., “Why Isn't Trust Transitive?” In Proceedings of the International Workshop on Security Protocols, pp. 171-176, London, UK, 1997. Springer-Verlag.
Christodorescu, M., et al., “Malware Normalization,” Technical Report 1539, University of Wisconsin, Madison, Wisconsin, USA, Nov. 2005.
Cooke, E., et al., “The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets,” In Proceedings of the USENIX SRUTI Workshop, pp. 39-44, 2005.
Dean, J. and Ghemawat, S., “MapReduce: Simplified Data Processing on Large Clusters,” In Proceedings of the Sixth Symposium on Operating System Design and Implementation, pp. 137-150, Dec. 2004.
Microsoft Security Bulletin MS060-014, Vulnerability in the Microsoft Data Access Components (MDAC) Function Could Allow Code Execution (911562), <http://www.microsoft.com/technet/security/Bulletin/>, MS06-014.mspx, May 2006.
Moshchuk, A., et al., “A Crawler-based Study of Spyware on the Web,” In Proceedings of the 2006 Network and Distributed System Security Symposium, pp. 17-33, Feb. 2006.
Provos, N., et al., “The Ghost in the Browser Analysis of Web-based Malware,” [on-line], [Retrieved on Sep. 10, 2007], Retrieved from the internet <http://www.usenix.org/events/hotbots07/tech/full—papers/provos/provos.pdf>.
Wang Y-M., “Automated Web Patrol with Strider HoneyMonkeys:Finding Web Sites That Exploit Browser Vulnerabilities” In Proceedings of the 2006 Network and Distributed System Security Symposium, pp. 35-49, Feb. 2006.
U.S. Appl. No. 12/277,436, filed Nov. 25, 2008, Wolf et al.
Hammami, 2003, IEEE, 0-7695-1932, “WebGuard: Web based adult content detection and filtering system,” Proceedings of the IEEE/WIC international conference on webg intelligence (WI'03), 5 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Intrusive feature classification model does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Intrusive feature classification model, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Intrusive feature classification model will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2626578

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.