Skip to main content
Log in

Detecting bad information in mobile wireless networks based on the wireless application protocol

  • Published:
Computing Aims and scope Submit manuscript

Abstract

The scale of mobile wireless networks is increasing sharply. However, many websites in the WAP networks contain obscenity information, viruses, and Trojans. How to crawl, judge and locate these bad websites is a challenging problem. In this article, a WAP bad information detection system is proposed, which contains crawling, judgment and location subsystems to identify bad WAP websites. The distributed crawling is adapted to break the IP limitation of WAP networks. Text and image automatic classification are introduced in the judgment subsystem. The location subsystem can locate the bad sites and collect the evidence. The experiment results verify that our WAP bad information detection system has high efficiency and accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Mason D, Jose JM, Joseph A (2002) WapSearch: a system for searching the web using WAP enabled devices. In: NDDL, pp 29–38

  2. Roussev V (2009) Hashing and data fingerprinting in digital forensics. IEEE Secur Privacy 7:49–55

    Article  Google Scholar 

  3. Zhu Y (2012) Introducing google chart tools and google maps API in data visualization courses. IEEE Comput Graph Appl 32:6–9

    Google Scholar 

  4. Lin T, Wang K, Liu A (2005) An efficient load balancing strategy for scalable WAP gateways. Comput Commun 28:1028–1037

    Article  Google Scholar 

  5. Agustina JV, Zhang P, Kantola R (2003) Performance evaluation of GSM handover traffic in a GPRS/GSM network. In: ISCC, pp 137–142

  6. Rutagemwa H, Shen X (2003) Modeling and Analysis of WAP Performance over Wireless Links. IEEE Trans Mob Comput 2:221–232

    Article  Google Scholar 

  7. Yu S, Cai D, Wen J, Ma W (2003) Improving pseudo-relevance feedback in web information retrieval using web page segmentation. In: WWW, pp 11–18

  8. Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34:1–47

    Article  MathSciNet  Google Scholar 

  9. Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18:613–620

    Article  MATH  Google Scholar 

  10. Salton G, Buckley C (1990) Improving retrieval performance by relevance feedback. In: JASIS, pp 288–297

  11. Sharma K, Ghose MK (2011) Cross layer security framework for wireless sensor networks. Int J Security Appl 5(1):35–52

    Google Scholar 

  12. Joachims T (1998) Text categorization with suport vector machines: learning with many relevant features. In: ECML, pp 137–142

  13. Chang C, Lin C (2011) LIBSVM: a library for support vector machines. In: ACM TIST, pp 27–27

  14. Xu J, Wang J, Xie S, Chen W, Kim JU (2013) Study on intrusion detection policy for wireless sensor networks. Int J Security Appl 7(1):1–6

    MATH  Google Scholar 

  15. Baohuai S, Jianli W, Ping L (2008) The covering number for some Mercer kernel Hilbert spaces. J Complex 24:241–258

    Google Scholar 

  16. Mitra K, Bhattacharyya D, Sattarova FY, Kim T (2009) A heuristic approach for mobile phone bases information management system in wireless sensor network. Int J Grid Dist Comp 2(3):1–12

    Google Scholar 

  17. Hsu C, Lin C (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13:415–425

    Google Scholar 

  18. Musznicki B, Zwierzykowski P (2012) Survey of simulators for wireless sensor networks. Int J Grid Dist Comput 5(3):23–50

    Google Scholar 

  19. Salton G, McGill M (1984) Introduction to modern information retrieval. McGraw-Hill Inc., New York

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Basic Research Program of China under Grant No. G2011CB302605, the National Natural Science Foundation of China (NSFC) under grant No. 61173145, and the National High Technology Research and Development Program of China under Grant No. 2011AA010705.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weizhe Zhang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, W., Zhang, Y. & Kim, TH. Detecting bad information in mobile wireless networks based on the wireless application protocol. Computing 96, 855–874 (2014). https://doi.org/10.1007/s00607-013-0325-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-013-0325-1

Keywords

Mathematics Subject Classification (2010)

Navigation