Skip to main content

HoneySpam 2.0: Profiling Web Spambot Behaviour

  • Conference paper
Principles of Practice in Multi-Agent Systems (PRIMA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5925))

Abstract

Internet bots have been widely used for various beneficial and malicious activities on the web. In this paper we provide new insights into a new kind of bot termed as web spambot which is primarily used for spreading spam content on the web. To gain insights into web spambots, we developed a tool (HoneySpam 2.0) to track their behaviour. This paper presents two main contributions, firstly it describes the design of HoneySpam 2.0 and secondly we outline the experimental results that characterise web spambot behaviour. By profiling web spambots, we provide the foundation for identifying such bots and preventing and filtering web spam content.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gyongyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, Chiba, Japan (2005)

    Google Scholar 

  2. Hayati, P., Potdar, V.: Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods. In: 7th IEEE International Conference on Industrial Informatics Cardiff, Wales (2009)

    Google Scholar 

  3. Zeitgeist, L.S.: Comment Spam. In: Akismet, ed. (2009), http://akismet.com/stats/

  4. Cobb, S.: The Economics of Spam. EPrivacyGroup (2003), http://www.eprivacygroup.com

  5. Workathome, Work from home online ad placing work pay per posting (2009), http://www.workathomeforum.in/online-adplacing-homejob.htm , http://www.workathomeforum.in/online-adplacing-homejob.htm

  6. Tan, P.-N., Kumar, V.: Discovery of Web Robot Sessions Based on their Navigational Patterns. Data Mining and Knowledge Discovery 6, 9–35 (2002)

    Article  MathSciNet  Google Scholar 

  7. Park, K., Pai, V.S., Lee, K.-W., Calo, S.: Securing Web Service by Automatic Robot Detection. In: USENIX 2006 Annual Technical Conference Refereed Paper (2006)

    Google Scholar 

  8. Chellapilla, K., Simard, P.: Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In: NIPS (2004)

    Google Scholar 

  9. Abram, H., Michael, W.G., Richard, C.H.: Reverse Engineering CAPTCHAs. In: Proceedings of the 2008 15th Working Conference on Reverse Engineering. IEEE Computer Society, Los Alamitos (2008)

    Google Scholar 

  10. Mori, G., Malik, J.: Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Proceedings. 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, p I-134-I-141 (2003)

    Google Scholar 

  11. Baird, H.S., Bentley, J.L.: Implicit CAPTCHAs. In: Proceedings SPIE/IS&T Conference on Document Recognition and Retrieval XII (DR&R2005), San Jose, CA (2005)

    Google Scholar 

  12. Ogbuji, U.: Real Web 2.0: Battling Web spam (2008), http://www.ibm.com/developerworks/web/library/wa-realweb10/

  13. Mertz, D.: Charming Python: Beat spam using hashcash (2004), http://www.ibm.com/developerworks/linux/library/l-hashcash.html

  14. Cooley, R., Mobasher, B., Srivastava, J.: Web mining: information and pattern discovery on the World Wide Web. In: Proceedings of Ninth IEEE International Conference on Tools with Artificial Intelligence 1997, pp. 558–567 (1997)

    Google Scholar 

  15. Webb, S., Caverlee, J., Pu, C.: Social Honeypots: Making Friends with a Spammer Near You. In: Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA (2008)

    Google Scholar 

  16. Andreolini, M., Bulgarelli, A., Colajanni, M., Mazzoni, F.: HoneySpam: honeypots fighting spam at the source. In: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop (2005), Cambridge, MA, p. 11 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hayati, P., Chai, K., Potdar, V., Talevski, A. (2009). HoneySpam 2.0: Profiling Web Spambot Behaviour. In: Yang, JJ., Yokoo, M., Ito, T., Jin, Z., Scerri, P. (eds) Principles of Practice in Multi-Agent Systems. PRIMA 2009. Lecture Notes in Computer Science(), vol 5925. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11161-7_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11161-7_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11160-0

  • Online ISBN: 978-3-642-11161-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics