Decipherment of Evasive or Encrypted Offensive Text

نویسنده

  • Zhelun Wu
چکیده

Automated filters are commonly used in on line chat to stop users from sending malicious messages such as age-inappropriate language, bullying, and asking users to expose personal information. Rule based filtering systems are the most common way to deal with this problem but people invent increasingly subtle ways to disguise their malicious messages to bypass such filtering systems. Machine learning classifiers can also be used to identify and filter malicious messages, but such classifiers rely on training data that rapidly becomes out of date and new forms of malicious text cannot be classified accurately. In this thesis, we model the disguised messages as a cipher and apply automatic decipherment techniques to decrypt corrupted malicious text back into plain text which can be then filtered using rules or a classifier. We provide experimental results on three different data sets and show that decipherment is an effective tool for this task.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multilayer Perceptron Guided Key Generation Through Mutation with Recursive Replacement in Wireless Communication (MLPKG)

In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been proposed through recursive replacement using mutated character code generation for wireless communication of data/information. Multilayer perceptron transmitting systems at both ends accept an identical input vector, generate an output bit and the network are trained based on the output bit w...

متن کامل

Secured Wireless Communication through Simulated Annealing Guided Traingularized Encryption by Multilayer Perceptron Generated Session Key (satmlp)

In this paper, simulated annealing guided traingularized encryption using multilayer perceptron generated session key (SATMLP) has been proposed for secured wireless communication. Both sender and receiver station uses identical multilayer perceptron and depending on the final output of the both side multilayer perceptron, weights vector of hidden layer get tuned in both ends. After this tunnin...

متن کامل

Analysis of Different Cryptosystems Using Meta-heuristic Techniques

With the increasing usage of internet, the need of securing the information is also getting more important. The most widely used technique to make the information secure is cryptography. Cryptanalysis is a method to break the unreadable cipher text without having the key. This paper describes a method of deciphering encrypted messages of Vigenere cipher cryptosystems, Simple substitution crypto...

متن کامل

Secured Transmission through Multi Layer Perceptron in Wireless Communication (stmlp)

In this paper, a multilayer perceptron guided encryption/decryption (STMLP) in wireless communication has been proposed for exchange of data/information. Multilayer perceptron transmitting systems at both ends generate an identical output bit and the network are trained based on the output which is used to synchronize the network at both ends and thus forms a secret-key at end of synchronizatio...

متن کامل

Decoding Anagrammed Texts Written in an Unknown Language and Script

Algorithmic decipherment is a prime example of a truly unsupervised problem. The first step in the decipherment process is the identification of the encrypted language. We propose three methods for determining the source language of a document enciphered with a monoalphabetic substitution cipher. The best method achieves 97% accuracy on 380 languages. We then present an approach to decoding ana...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016