Abstract
Internet bots have been widely used for various beneficial and malicious activities on the web. In this paper we provide new insights into a new kind of bot termed as web spambot which is primarily used for spreading spam content on the web. To gain insights into web spambots, we developed a tool (HoneySpam 2.0) to track their behaviour. This paper presents two main contributions, firstly it describes the design of HoneySpam 2.0 and secondly we outline the experimental results that characterise web spambot behaviour. By profiling web spambots, we provide the foundation for identifying such bots and preventing and filtering web spam content.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gyongyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, Chiba, Japan (2005)
Hayati, P., Potdar, V.: Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods. In: 7th IEEE International Conference on Industrial Informatics Cardiff, Wales (2009)
Zeitgeist, L.S.: Comment Spam. In: Akismet, ed. (2009), http://akismet.com/stats/
Cobb, S.: The Economics of Spam. EPrivacyGroup (2003), http://www.eprivacygroup.com
Workathome, Work from home online ad placing work pay per posting (2009), http://www.workathomeforum.in/online-adplacing-homejob.htm , http://www.workathomeforum.in/online-adplacing-homejob.htm
Tan, P.-N., Kumar, V.: Discovery of Web Robot Sessions Based on their Navigational Patterns. Data Mining and Knowledge Discovery 6, 9–35 (2002)
Park, K., Pai, V.S., Lee, K.-W., Calo, S.: Securing Web Service by Automatic Robot Detection. In: USENIX 2006 Annual Technical Conference Refereed Paper (2006)
Chellapilla, K., Simard, P.: Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In: NIPS (2004)
Abram, H., Michael, W.G., Richard, C.H.: Reverse Engineering CAPTCHAs. In: Proceedings of the 2008 15th Working Conference on Reverse Engineering. IEEE Computer Society, Los Alamitos (2008)
Mori, G., Malik, J.: Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Proceedings. 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, p I-134-I-141 (2003)
Baird, H.S., Bentley, J.L.: Implicit CAPTCHAs. In: Proceedings SPIE/IS&T Conference on Document Recognition and Retrieval XII (DR&R2005), San Jose, CA (2005)
Ogbuji, U.: Real Web 2.0: Battling Web spam (2008), http://www.ibm.com/developerworks/web/library/wa-realweb10/
Mertz, D.: Charming Python: Beat spam using hashcash (2004), http://www.ibm.com/developerworks/linux/library/l-hashcash.html
Cooley, R., Mobasher, B., Srivastava, J.: Web mining: information and pattern discovery on the World Wide Web. In: Proceedings of Ninth IEEE International Conference on Tools with Artificial Intelligence 1997, pp. 558–567 (1997)
Webb, S., Caverlee, J., Pu, C.: Social Honeypots: Making Friends with a Spammer Near You. In: Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA (2008)
Andreolini, M., Bulgarelli, A., Colajanni, M., Mazzoni, F.: HoneySpam: honeypots fighting spam at the source. In: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop (2005), Cambridge, MA, p. 11 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hayati, P., Chai, K., Potdar, V., Talevski, A. (2009). HoneySpam 2.0: Profiling Web Spambot Behaviour. In: Yang, JJ., Yokoo, M., Ito, T., Jin, Z., Scerri, P. (eds) Principles of Practice in Multi-Agent Systems. PRIMA 2009. Lecture Notes in Computer Science(), vol 5925. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11161-7_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-11161-7_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11160-0
Online ISBN: 978-3-642-11161-7
eBook Packages: Computer ScienceComputer Science (R0)