{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:24:03Z","timestamp":1761989043885,"version":"3.41.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T00:00:00Z","timestamp":1489363200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s00500-017-2531-9","type":"journal-article","created":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T04:20:30Z","timestamp":1489378830000},"page":"3803-3814","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Detecting redirection spam using multilayer perceptron neural network"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7458-8084","authenticated-orcid":false,"given":"Kanchan","family":"Hans","sequence":"first","affiliation":[]},{"given":"Laxmi","family":"Ahuja","sequence":"additional","affiliation":[]},{"given":"S. K.","family":"Muttoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,13]]},"reference":[{"key":"2531_CR1","doi-asserted-by":"crossref","unstructured":"Canali D, Cova M, Vigna G, Kruegel C (2011) Prophiler: A fast filter for the large-scale detection of malicious web pages categories and subject descriptors. In: International world wide web conference. ACM, Hyderabad, pp 197\u2013206","DOI":"10.1145\/1963405.1963436"},{"key":"2531_CR2","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.camwa.2011.07.068","volume":"63","author":"A Castiglione","year":"2012","unstructured":"Castiglione A, De Santis A, Fiore U, Palmieri F (2012) An asynchronous covert channel using spam. Comput Math Appl 63:437\u2013447. doi: 10.1016\/j.camwa.2011.07.068","journal-title":"Comput Math Appl"},{"key":"2531_CR3","unstructured":"Castillo C, Davison BD (2011) Adversarial web search. In: Foundations and trends $${}^{\\textregistered }$$ \u00ae in information retrieval, pp 377\u2013486"},{"key":"2531_CR4","doi-asserted-by":"crossref","unstructured":"Chellapilla K, Maykov A (2007) A taxonomy of JavaScript redirection spam. In: Proceedings of the 3rd international workshop on adversarial information retrieval on the web\u2014AIRWeb \u201907, pp 81\u201388","DOI":"10.1145\/1244408.1244423"},{"key":"2531_CR5","unstructured":"CloudMark (2015) Annual security threat report. https:\/\/www.cloudmark.com\/releases\/docs\/threat_report\/cloudmark-security-threat-report-annual-2015.pdf . Accessed 9 June 2016"},{"key":"2531_CR6","unstructured":"Dell (2016) Security annual threat report. http:\/\/www.netthreat.co.uk\/assets\/assets\/dell-security-annual-threat-report-2016-white-paper-197571.pdf . Accessed 9 June 2016"},{"key":"2531_CR7","unstructured":"Demuth H, Beale M, Hagan M (2010) Neural network $$\\text{toolbox}^{\\text{ TM }}$$ toolbox TM 6. User guide"},{"key":"2531_CR8","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TDSC.2011.49","volume":"9","author":"Z Duan","year":"2012","unstructured":"Duan Z, Chen P, Sanchez F et al (2012) Detecting spam zombies by monitoring outgoing messages. IEEE Trans Dependable Secure Comput 9:198\u2013210. doi: 10.1109\/TDSC.2011.49","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2531_CR9","doi-asserted-by":"publisher","first-page":"3237","DOI":"10.1007\/s00500-014-1479-2","volume":"19","author":"NOF Elssied","year":"2015","unstructured":"Elssied NOF, Ibrahim O, Osman AH (2015) Enhancement of spam detection mechanism based on hybrid k-mean clustering and support vector machine. Soft Comput 19:3237\u20133248. doi: 10.1007\/s00500-014-1479-2","journal-title":"Soft Comput"},{"key":"2531_CR10","doi-asserted-by":"crossref","unstructured":"Eshete B (2013) Effective analysis, characterization, and detection of malicious web pages. In: Proceedings of the 22nd international conference on world wide web companion, pp 355\u2013360","DOI":"10.1145\/2487788.2487942"},{"key":"2531_CR11","doi-asserted-by":"crossref","unstructured":"Fukushima Y, Hori Y, Sakurai K (2011) Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration. In: In Proceedings of 10th international conference on trust, security and privacy in computing and communications. IEEE, pp 352\u2013361","DOI":"10.1109\/TrustCom.2011.46"},{"key":"2531_CR12","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Tay KY et al (2015a) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26:1403\u20131416","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2531_CR13","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Wang Z et al (2015) Incremental learning for $${\\upnu }$$ \u03bd -Support Vector Regression. Neural Netw 67:140\u2013150. doi: 10.1016\/j.neunet.2015.03.013","journal-title":"Neural Netw"},{"key":"2531_CR14","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MC.2005.352","volume":"38","author":"Z Gyongyi","year":"2005","unstructured":"Gyongyi Z, Garcia-Molina H (2005) Spam: it\u2019s not just for inboxes. Computer 38:28\u201334","journal-title":"Computer"},{"key":"2531_CR15","unstructured":"Hans K, Ahuja L, Muttoo SK (2013) Characterization and detection of Redirection Spam. In: Wilkes-100 international conference on computing sciences (ICCS\u201913). Elsevier, Jallandhar, India, pp 325\u2013331"},{"key":"2531_CR16","first-page":"975","volume":"101","author":"K Hans","year":"2014","unstructured":"Hans K, Ahuja L, Muttoo SK (2014) Approaches for web spam detection. Int J Comput Appl 101:975\u2013987","journal-title":"Int J Comput Appl"},{"key":"2531_CR17","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1504\/IJESDF.2016.077435","volume":"8","author":"K Hans","year":"2016","unstructured":"Hans K, Ahuja L, Muttoo SK (2016) A fuzzy logic approach for detecting redirection spam. Int J Electron Secur Digit Forensics 8:191\u2013204","journal-title":"Int J Electron Secur Digit Forensics"},{"key":"2531_CR18","volume-title":"Neural networks: a comprehensive foundation","author":"S Haykin","year":"1999","unstructured":"Haykin S (1999) Neural networks: a comprehensive foundation, 2nd edn. Prentice-Hall, Washington","edition":"2"},{"key":"2531_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/792550.792553","volume":"36","author":"MR Henzinger","year":"2002","unstructured":"Henzinger MR, Motwani R, Silverstein C (2002) Challenges in web search engines. ACM SIGIR Forum 36:11\u201322. doi: 10.1145\/792550.792553","journal-title":"ACM SIGIR Forum"},{"key":"2531_CR20","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1142\/S0129065791000261","volume":"2","author":"EM Johansson","year":"1991","unstructured":"Johansson EM, Dowla FU, Goodman DM (1991) Backpropagation learning for multilayer feed-forward neural networks using the conjugate gradient method. Int J Neural Syst 2:291\u2013301. doi: 10.1142\/S0129065791000261","journal-title":"Int J Neural Syst"},{"key":"2531_CR21","unstructured":"Bhargrava VK, Brewer D, Li K (2009) A study of URL redirection indicating spam. In: Sixth conference on e-mail and anti-spam. Steve Sheng\u2019s Publications, California, USA, pp 1\u20134"},{"key":"2531_CR22","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1109\/TDSC.2013.3","volume":"10","author":"S Lee","year":"2013","unstructured":"Lee S, Kim J (2013) Warningbird: a near real-time detection system for suspicious urls in twitter stream. IEEE Trans Dependable Secure Comput 10:183\u2013195","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2531_CR23","unstructured":"Lee S, Kim J (2012) WARNING B IRD?: detecting suspicious URLs in twitter stream. In: Network and distributed system security symposium (NDSS). San Diego, USA"},{"key":"2531_CR24","unstructured":"Leontiadis N, Moore T, Christin N (2011) Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In: 20th USENIX security symposium. San Francisco, CA, pp 1\u201317"},{"key":"2531_CR25","doi-asserted-by":"crossref","unstructured":"Li Z, Zhang K, Xie Y et al (2012) Knowing your enemy: understanding and detecting malicious web advertising. In: 19th conference on computer and communications security. ACM, Harvard, pp 674\u2013686","DOI":"10.1145\/2382196.2382267"},{"key":"2531_CR26","doi-asserted-by":"crossref","unstructured":"Lu L, Perdisci R, Lee W (2011) SURF: detecting and measuring search poisoning. In: Proceedings of the 18th ACM conference on computer and communications security. ACM, Chicago, USA, pp 467\u2013476","DOI":"10.1145\/2046707.2046762"},{"key":"2531_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961202","volume":"2","author":"J Ma","year":"2011","unstructured":"Ma J, Saul LK, Savage S, Voelker GM (2011) Learning to detect malicious URLs. ACM Trans Intell Syst Technol 2:1\u201324. doi: 10.1145\/1961189.1961202","journal-title":"ACM Trans Intell Syst Technol"},{"key":"2531_CR28","doi-asserted-by":"crossref","unstructured":"Ma J, Saul LK, Savage S, Voelker GM (2009) Beyond blacklists? Learning to detect malicious web sites from suspicious URLs. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, Paris, France, pp 1245\u20131253","DOI":"10.1145\/1557019.1557153"},{"key":"2531_CR29","doi-asserted-by":"crossref","unstructured":"Mekky H, Torres R, Zhang ZL et al (2014) Detecting malicious HTTP redirections using trees of user browsing activity. In: IEEE conference on computer communications. IEEE, Canada, pp 1159\u20131167","DOI":"10.1109\/INFOCOM.2014.6848047"},{"key":"2531_CR30","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/S0893-6080(05)80056-5","volume":"6","author":"M M\u00f8ller","year":"1993","unstructured":"M\u00f8ller M (1993) A scaled conjugate gradient algorithm for fast supervised learning. Neural Netw 6:525\u2013533","journal-title":"Neural Netw"},{"key":"2531_CR31","unstructured":"Niu Y, Wang Y-M, Chen H, et al (2007) A quantitative study of forum spamming using context-based analysis cloaking redirection. In: Proceedings of 15th network and distributed system security (NDSS) symposium. San Diego, USA, pp 1\u201315"},{"key":"2531_CR32","unstructured":"OpenDNS (2015) PhishTank. https:\/\/www.phishtank.com\/ . Accessed 8 Nov 2015"},{"key":"2531_CR33","doi-asserted-by":"crossref","unstructured":"Prieto VM, \u00c1lvarez M, L\u00f3pez-Garc\u00eda R, Cacheda F (2012) Analysing the effectiveness of crawlers on the client-side hidden web. In: Trends in practical applications of agents and multiagent systems. Springer Berlin Heidelberg, New Delhi, India, pp 141\u2013148","DOI":"10.1007\/978-3-642-28795-4_17"},{"key":"2531_CR34","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s00500-009-0440-2","volume":"14","author":"G Ruan","year":"2010","unstructured":"Ruan G, Tan Y (2010) A three-layer back-propagation neural network for spam detection using artificial immune concentration. Soft Comput 14:139\u2013150. doi: 10.1007\/s00500-009-0440-2","journal-title":"Soft Comput"},{"key":"2531_CR35","unstructured":"Sophos (2013) Security threat report 2013. https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophossecuritythreatreport2013.pdf . Accessed 7 Sept 2016"},{"key":"2531_CR36","doi-asserted-by":"crossref","unstructured":"Takata Y, Goto S, Mori T (2011) Analysis of redirection caused by web-based malware. In: Proceedings of the Asia-Pacific advanced network, pp 53\u201362","DOI":"10.7125\/APAN.32.7"},{"key":"2531_CR37","doi-asserted-by":"crossref","unstructured":"Tao W, Shunzheng Y, Bailin X (2010) A novel framework for learning to detect malicious web pages. In: International forum on information technology and applications (IFITA). IEEE, China, pp 353\u2013357","DOI":"10.1109\/IFITA.2010.173"},{"key":"2531_CR38","doi-asserted-by":"crossref","unstructured":"Thomas K, Grier C, Ma J et al (2011) Design and evaluation of a real-time URL spam filtering service. In: Symposium on security and privacy. IEEE, California, USA, pp 447\u2013462","DOI":"10.1109\/SP.2011.25"},{"key":"2531_CR39","doi-asserted-by":"crossref","unstructured":"Wang Y, Ma M, Niu Y, Chen H (2007) Spam double-funnel: connecting web spammers with advertisers. In: Proceedings of the 16th international conference on world wide web. ACM, Alberta, Canada, pp 291\u2013300","DOI":"10.1145\/1242572.1242612"},{"key":"2531_CR40","doi-asserted-by":"crossref","unstructured":"Wang YM, Ma M (2007) Strider search ranger: towards an autonomic anti-spam search engine. In: Fourth international conference on autonomic computing. IEEE, Florida, USA, pp 32\u201342","DOI":"10.1109\/ICAC.2007.38"},{"key":"2531_CR41","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1109\/TDSC.2015.2457918","volume":"13","author":"MR Watson","year":"2016","unstructured":"Watson MR, Marnerides AK, Mauthe A, Hutchison David (2016) Malware detection in cloud computing infrastructures. IEEE Trans Dependable Secure Comput 13:192\u2013205","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2531_CR42","unstructured":"Websense (2014) Threat report. http:\/\/www.websense.com\/assets\/reports\/report-2014-threat-report-en.pdf . Accessed 9 June 2016"},{"key":"2531_CR43","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/TDSC.2013.49","volume":"11","author":"S Wen","year":"2014","unstructured":"Wen S, Zhou W, Zhang J et al (2014) Modeling and analysis on the propagation dynamics of modern email malware. IEEE Trans Dependable Secure Comput 11:361\u2013374. doi: 10.1109\/TDSC.2013.49","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2531_CR44","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.ins.2014.10.040","volume":"295","author":"X Wen","year":"2015","unstructured":"Wen X, Shao L, Xue Y, Fang W (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395\u2013406. doi: 10.1016\/j.ins.2014.10.040","journal-title":"Inf Sci"},{"key":"2531_CR45","unstructured":"Wu B, Davison B (2005) Cloaking and redirection: a preliminary study. In: First international workshop on adversarial information retrieval on the web (AIRWeb\u201905). ACM, Chiba, Japan, pp 7\u201316"},{"key":"2531_CR46","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X et al (2016a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75:1947\u20131962. doi: 10.1007\/s11042-014-2381-8","journal-title":"Multimed Tools Appl"},{"key":"2531_CR47","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7:1283\u20131291. doi: 10.1002\/sec.864","journal-title":"Secur Commun Netw"},{"key":"2531_CR48","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L et al (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11:2594\u20132608. doi: 10.1109\/TIFS.2016.2590944","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2531_CR49","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11277-014-1748-5","volume":"78","author":"S Xie","year":"2014","unstructured":"Xie S, Wang Y (2014) Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Pers Commun 78:231\u2013246. doi: 10.1007\/s11277-014-1748-5","journal-title":"Wireless Pers Commun"},{"key":"2531_CR50","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s00500-006-0116-0","volume":"11","author":"X Yue","year":"2007","unstructured":"Yue X, Abraham A, Chi ZX et al (2007) Artificial immune system inspired behavior-based anti-spam filter. Soft Comput 11:729\u2013740. doi: 10.1007\/s00500-006-0116-0","journal-title":"Soft Comput"},{"key":"2531_CR51","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/ICMLC.2011.6016954","volume":"2011","author":"W Zhang","year":"2011","unstructured":"Zhang W, Ding Y-X, Tang Y, Zhao B (2011) Malicious web page detection based on on-line learning algorithm. Int Conf Mach Learn Cybern 2011:1914\u20131919. doi: 10.1109\/ICMLC.2011.6016954","journal-title":"Int Conf Mach Learn Cybern"},{"key":"2531_CR52","doi-asserted-by":"publisher","first-page":"961","DOI":"10.3233\/IFS-141378","volume":"28","author":"Y Zheng","year":"2015","unstructured":"Zheng Y, Jeon B, Xu D et al (2015) Image segmentation by generalized hierarchical fuzzy C-means algorithm. J Intell Fuzzy Syst 28:961\u2013973. doi: 10.3233\/IFS-141378","journal-title":"J Intell Fuzzy Syst"},{"key":"2531_CR53","doi-asserted-by":"crossref","unstructured":"Zhou J, Ding Y (2012) An analysis of URLs generated from JavaScript code. In: Proceedings of 11th international conference on computer and information science. IEEE, Shanghai, China, pp 688\u2013693","DOI":"10.1109\/ICIS.2012.28"},{"key":"2531_CR54","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2016","unstructured":"Zhou Z, Wang Y, Wu QMJ et al (2016) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12:48\u201363. doi: 10.1109\/TIFS.2016.2601065","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2531-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2531-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2531-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T18:43:40Z","timestamp":1750099420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2531-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,13]]},"references-count":54,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["2531"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2531-9","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,3,13]]}}}