skip to main content
10.1145/2381716.2381855acmotherconferencesArticle/Chapter ViewAbstractPublication PagescubeConference Proceedingsconference-collections
research-article

Spam 2.0

Published:03 September 2012Publication History

ABSTRACT

In this paper, we provide a high level overview of Spam 2.0, how it works, its impacts and its categorizations (which are annoying, tricky, deceiving and evil). We also describe the existing approaches taken to combat Spam 2.0, including the detection approach, the prevention approach, and the early detection approach. Three techniques based on the detection approach presented in this paper include: content based, metadata based and user flagging based. We also explore several open issues/problems in this area. These include problems regarding tools and technologies, awareness and responsibility, and spam and spammers. Issues discussed regarding awareness and responsibility are users' lack of awareness, governments' inaction in tackling Spam 2.0, companies' apathy in combating it, lack of collaboration between countries, and unclear accountabilities in this regard. The paper also identifies future trends for both anti-spammers and spammers. Anti-spammers will likely focus their efforts more on behaviour based techniques and produce more language independent tools. Implementation of dynamic forms and forcing every user to actually go through the registration form will be good ways to control spam. From a monetary perspective, estimating intangible costs associated with Spam 2.0 will help raise the awareness of public users regarding spamming. On the other hand, the spammers will predictably continue to find methods to decrease the filters' efficiency by imitating real users' behaviours and finding other spamming opportunities.

References

  1. O'Reilly, T., 2005. What is Web 2.0. http://oreilly.com/web2/archive/what-is-web-20.htmlGoogle ScholarGoogle Scholar
  2. Nielsenwire, 2010. What Americans Do Online: Social Media And Games Dominate Activity. http://blog.nielsen.com/nielsenwire/online_mobile/what-americans-do-online-social-media-and-games-dominate-activityGoogle ScholarGoogle Scholar
  3. Internet World Stats, 2011. World Internet Usage Statistics News and World Population Stats. http://www.internetworldstats.com/stats.htmGoogle ScholarGoogle Scholar
  4. Hayati, P., Potdar, V., Talevski, A., Firoozeh, N., Sarenche, S., Yeganeh., E. 2010. Definition of spam 2.0: New spamming boom. In Digital Ecosystem and Technologies (DEST), Dubai, UAE, 2010. IEEE Computer Society.Google ScholarGoogle Scholar
  5. Hayati, P., Potdar, V. 2009. Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods. In 7th IEEE International Conference on Industrial Informatics, Cardiff, Wales, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  6. Hayati, P., Chai, K., Potdar, V., Talevski, A. 2009. HoneySpam 2.0: Profiling Web Spambot Behaviour. In 12th International Conference on Principles of Practise in Multi-Agent Systems, Nagoya, Japan, 2009, pp. 335--344. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Roundtable, 2007. 75% of Google's Blogspot Blogs are Spam. http://www.seroundtable.com/archives/012778.htmlGoogle ScholarGoogle Scholar
  8. Akismet, 2011. 25 Billion Pieces of Spam. http://blog.akismet.com/Google ScholarGoogle Scholar
  9. Mollom, 2011. Scorecard | Mollom. http://mollom.com/scorecardGoogle ScholarGoogle Scholar
  10. SC Magazine, 2009. Twitter, Facebook and LiveJournal Attacked.http://www.scmagazine.com.au/News/152328,twitter-facebook-and-livejournal-attacked.aspxGoogle ScholarGoogle Scholar
  11. SC Magazine, 2008. Facebook user profiles hacked. http://www.scmagazine.com.au/News/107015,facebook-user-profiles-hacked-wall-feature-relaying-spam.aspxGoogle ScholarGoogle Scholar
  12. Chai, K., Hayati, P., Potdar, V., Wu, C., Talevski, A. 2010. Assessing Post Usage for Measuring the Quality of Forum Posts. In Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST).Google ScholarGoogle ScholarCross RefCross Ref
  13. Hayati, P., Potdar, V. 2008. Evaluation of spam detection and prevention frameworks for email and image spam: a state of art. In Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, ACM, Linz. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ridzuan, F., Potdar, V., Talevski, A., Smyth, W. F. 2010. Key Parameters in Identifying Cost of Spam 2.0. In Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE Computer Society, 2010, 789--796. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Scam Sniper, 2011. Phishing Scam Alert: Comment Spam Leads to Facebook Phishing Scam. http://scamsniper.blogspot.com.au/2011/06/phishing-scam-alert-commenting-spam.htmlGoogle ScholarGoogle Scholar
  16. Naked Security Sophos, 2012. The Pink Facebook rogue application and survey scam. http://nakedsecurity.sophos.com/2012/02/27/pink-facebook-survey-scam/Google ScholarGoogle Scholar
  17. Webroot, 2010. Facebook spam Leads to Viagra Vendor, Drive-by Download. http://blog.webroot.com/2010/05/28/facebook-spam-leads-to-viagra-vendor-drive-by-download/Google ScholarGoogle Scholar
  18. Naked Security Sophos, 2010. Erin Andrews Peephole Video maker jailed, as hackers take advantage. http://nakedsecurity.sophos.com/2010/03/16/erin-andrews-peephole-video-maker-jailed-hackers-advantage/Google ScholarGoogle Scholar
  19. Sean, 2010. CPAlead Spam on YouTube. http://www.f-secure.com/weblog/archives/00002019.htmlGoogle ScholarGoogle Scholar
  20. Hayati, P., Potdar, V. 2009. Spammer and Hacker, Two Old Friends. In 3rd IEEE International Conference on Digital Ecosystems and Technologies (IEEE-DEST 2009) Istanbul, Turkey, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  21. Thomason, A. 2007. Blog Spam: A Review. In Conference on Email and Anti-Spam (Mountain View, California, August 2-3, 2007).CEAS2007.Google ScholarGoogle Scholar
  22. Shin, Y., Gupta, M., Myers, S. 2011. Prevalence and mitigation of forum spamming. In the 30th IEEE International Conference on Computer Communications. (Shanghai, China, April 12-14, 2011) IEEE INFOCOM 2011. IEEE Computer Society, Shanghai, China.Google ScholarGoogle ScholarCross RefCross Ref
  23. Markines, B., Cattuto, C., Menczer, F. 2009. Social Spam Detection. In Fifth International Workshop on Adversarial Information Retrieval on the Web (Madrid, Spain, April 21, 2009). AIRWeb'09. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Chu, Z., Gianvecchio, S., Haining, W., Jajodia, S. 2010. Who is Tweeting on Twitter: Human, Bot or Cyborg? In Annual Computer Security Applications Conference (Austin, Texas, USA, December 6-10, 2010). ACSAC'10. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Grier, C., Thomas, K., Paxson, V, Zhang, M. 2010. The Underground on 140 Characters or Less. In 17th ACM Conference on Computer and Communications Security (Chicago, Illinois, USA, October 4-8, 2010). CCS'10. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Egele, M., Bilge, L., Kirda, E., Kruegel, C. 2010. CAPTCHA Smuggling: Hijacking Web Browsing Sessions to Create CAPTCHA Farms. In the 25th Symposium on Applied Computing (Sierre, Switzerland, March 22-26, 2010). ACS'10. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Liu, Y., Cen, R., Zhang, M., Ma, S., Ru, L. Identifying Web Spam With User Behavior Analysis. In Fourth International Workshop on Adversarial Information Retrieval on the Web (Beijing, China, April 22, 2008). AIRWeb'08. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Sureka, A. Mining User Comment Activity for Detecting Forum Spammers in Youtube. In 1st International Workshop on Usage Analysis and the Web of Data in the 20th International World Wide Web Conference (Hyderabad, India, March 28, 2011). WWW2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Stringhini, G., Kruegel, C., Vigna, G. 2010. Detecting Spammers on Social Networks. In Annual Computer Security Applications Conference (Austin, Texas, USA, December 6-10, 2010). ACSAC'10. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Weiss, D. 2009. The Security Implications of URL Shortening Services. http://unweary.com/2009/04/the-security-implications-of-url-shortening-services.htmlGoogle ScholarGoogle Scholar
  31. Hayati, P., Potdar, V, Chai, K, Talevski, A. 2010. "Web Spambot Detection Based on Web Navigation Behaviour. In 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Western Australia, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Hayati, P., Chai, K., Talevski, A., Potdar, V. 2010. Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency. In The 2010 International Conference on Computational Science and Applications (ICCSA 2010), Fukuoka, Japan, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Hayati, P., Potdar, V., Talevski, A., Chai, K. 2010. Web Spambot Characterising using Self Organising Maps. In International Journal of Computer Systems Science and Engineering), 2010.Google ScholarGoogle Scholar
  34. Hayati, P., Potdar, V., Smyth, W. F., Talevski, A. 2010. Rule-Based Web Spambot Detection Using Action Strings. In The Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010), Redmond, Washington, 2010.Google ScholarGoogle Scholar
  35. Shin, Youngsang, Minaxi Gupta, and Steven Myers. "The Nuts and Bolts of a Forum Spam Automator." In the LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, Berkeley, CA, USA, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Ramachandran, A., Dasgupta, A., Feamster, N., Weinberger, K. 2011. Spam or Ham? Characterizing and Detecting Fraudulent "Not Spam" Reports in Web Mail Systems. In the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (Perth, Western Australia, September 1-2, 2011). CEAS2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Brian Krebs, 2012. ZeuS Trojan author in spam kingpins. http://www.theage.com.au/it-pro/security-it/zeus-trojan-author-in-with-spam-kingpins-20120222-1tmqp.htmlGoogle ScholarGoogle Scholar
  38. Sukanta Sinha, Rana Dattagupta, Debajyoti Mukhopadhyay; Identify Web-page Content meaning using Knowledge based System for Dual Meaning Words; International Journal of Engineering Research and Applications; Vol.2, N0.4; July-August 2012; pp.877--880; ISSN 2248-9622.Google ScholarGoogle Scholar
  39. Ruma Dutta, Anirban Kundu, Debajyoti Mukhopadhyay; Clustering based Web Page Prediction; International Journal of Knowledge and Web Intelligence; Inderscience Publishers; UK; Vol.2, No.4, 2011; pp.257--271; ISSN 1755-8255. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Debajyoti Mukhopadhyay, Debasis Giri, Sanasam Ranbir Singh; An Approach to Confidence Based Page Ranking for User Oriented Web Search; ACM SIGMOD Record, ACM Press, New York, USA; Vol.32, No.2, June 2003; pp.28--33; ISSN 0163-5808. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Spam 2.0

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CUBE '12: Proceedings of the CUBE International Information Technology Conference
          September 2012
          879 pages
          ISBN:9781450311854
          DOI:10.1145/2381716

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 September 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader