ABSTRACT
In this paper, we provide a high level overview of Spam 2.0, how it works, its impacts and its categorizations (which are annoying, tricky, deceiving and evil). We also describe the existing approaches taken to combat Spam 2.0, including the detection approach, the prevention approach, and the early detection approach. Three techniques based on the detection approach presented in this paper include: content based, metadata based and user flagging based. We also explore several open issues/problems in this area. These include problems regarding tools and technologies, awareness and responsibility, and spam and spammers. Issues discussed regarding awareness and responsibility are users' lack of awareness, governments' inaction in tackling Spam 2.0, companies' apathy in combating it, lack of collaboration between countries, and unclear accountabilities in this regard. The paper also identifies future trends for both anti-spammers and spammers. Anti-spammers will likely focus their efforts more on behaviour based techniques and produce more language independent tools. Implementation of dynamic forms and forcing every user to actually go through the registration form will be good ways to control spam. From a monetary perspective, estimating intangible costs associated with Spam 2.0 will help raise the awareness of public users regarding spamming. On the other hand, the spammers will predictably continue to find methods to decrease the filters' efficiency by imitating real users' behaviours and finding other spamming opportunities.
- O'Reilly, T., 2005. What is Web 2.0. http://oreilly.com/web2/archive/what-is-web-20.htmlGoogle Scholar
- Nielsenwire, 2010. What Americans Do Online: Social Media And Games Dominate Activity. http://blog.nielsen.com/nielsenwire/online_mobile/what-americans-do-online-social-media-and-games-dominate-activityGoogle Scholar
- Internet World Stats, 2011. World Internet Usage Statistics News and World Population Stats. http://www.internetworldstats.com/stats.htmGoogle Scholar
- Hayati, P., Potdar, V., Talevski, A., Firoozeh, N., Sarenche, S., Yeganeh., E. 2010. Definition of spam 2.0: New spamming boom. In Digital Ecosystem and Technologies (DEST), Dubai, UAE, 2010. IEEE Computer Society.Google Scholar
- Hayati, P., Potdar, V. 2009. Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods. In 7th IEEE International Conference on Industrial Informatics, Cardiff, Wales, 2009.Google ScholarCross Ref
- Hayati, P., Chai, K., Potdar, V., Talevski, A. 2009. HoneySpam 2.0: Profiling Web Spambot Behaviour. In 12th International Conference on Principles of Practise in Multi-Agent Systems, Nagoya, Japan, 2009, pp. 335--344. Google ScholarDigital Library
- Roundtable, 2007. 75% of Google's Blogspot Blogs are Spam. http://www.seroundtable.com/archives/012778.htmlGoogle Scholar
- Akismet, 2011. 25 Billion Pieces of Spam. http://blog.akismet.com/Google Scholar
- Mollom, 2011. Scorecard | Mollom. http://mollom.com/scorecardGoogle Scholar
- SC Magazine, 2009. Twitter, Facebook and LiveJournal Attacked.http://www.scmagazine.com.au/News/152328,twitter-facebook-and-livejournal-attacked.aspxGoogle Scholar
- SC Magazine, 2008. Facebook user profiles hacked. http://www.scmagazine.com.au/News/107015,facebook-user-profiles-hacked-wall-feature-relaying-spam.aspxGoogle Scholar
- Chai, K., Hayati, P., Potdar, V., Wu, C., Talevski, A. 2010. Assessing Post Usage for Measuring the Quality of Forum Posts. In Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST).Google ScholarCross Ref
- Hayati, P., Potdar, V. 2008. Evaluation of spam detection and prevention frameworks for email and image spam: a state of art. In Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, ACM, Linz. Google ScholarDigital Library
- Ridzuan, F., Potdar, V., Talevski, A., Smyth, W. F. 2010. Key Parameters in Identifying Cost of Spam 2.0. In Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE Computer Society, 2010, 789--796. Google ScholarDigital Library
- Scam Sniper, 2011. Phishing Scam Alert: Comment Spam Leads to Facebook Phishing Scam. http://scamsniper.blogspot.com.au/2011/06/phishing-scam-alert-commenting-spam.htmlGoogle Scholar
- Naked Security Sophos, 2012. The Pink Facebook rogue application and survey scam. http://nakedsecurity.sophos.com/2012/02/27/pink-facebook-survey-scam/Google Scholar
- Webroot, 2010. Facebook spam Leads to Viagra Vendor, Drive-by Download. http://blog.webroot.com/2010/05/28/facebook-spam-leads-to-viagra-vendor-drive-by-download/Google Scholar
- Naked Security Sophos, 2010. Erin Andrews Peephole Video maker jailed, as hackers take advantage. http://nakedsecurity.sophos.com/2010/03/16/erin-andrews-peephole-video-maker-jailed-hackers-advantage/Google Scholar
- Sean, 2010. CPAlead Spam on YouTube. http://www.f-secure.com/weblog/archives/00002019.htmlGoogle Scholar
- Hayati, P., Potdar, V. 2009. Spammer and Hacker, Two Old Friends. In 3rd IEEE International Conference on Digital Ecosystems and Technologies (IEEE-DEST 2009) Istanbul, Turkey, 2009.Google ScholarCross Ref
- Thomason, A. 2007. Blog Spam: A Review. In Conference on Email and Anti-Spam (Mountain View, California, August 2-3, 2007).CEAS2007.Google Scholar
- Shin, Y., Gupta, M., Myers, S. 2011. Prevalence and mitigation of forum spamming. In the 30th IEEE International Conference on Computer Communications. (Shanghai, China, April 12-14, 2011) IEEE INFOCOM 2011. IEEE Computer Society, Shanghai, China.Google ScholarCross Ref
- Markines, B., Cattuto, C., Menczer, F. 2009. Social Spam Detection. In Fifth International Workshop on Adversarial Information Retrieval on the Web (Madrid, Spain, April 21, 2009). AIRWeb'09. ACM. Google ScholarDigital Library
- Chu, Z., Gianvecchio, S., Haining, W., Jajodia, S. 2010. Who is Tweeting on Twitter: Human, Bot or Cyborg? In Annual Computer Security Applications Conference (Austin, Texas, USA, December 6-10, 2010). ACSAC'10. ACM. Google ScholarDigital Library
- Grier, C., Thomas, K., Paxson, V, Zhang, M. 2010. The Underground on 140 Characters or Less. In 17th ACM Conference on Computer and Communications Security (Chicago, Illinois, USA, October 4-8, 2010). CCS'10. ACM. Google ScholarDigital Library
- Egele, M., Bilge, L., Kirda, E., Kruegel, C. 2010. CAPTCHA Smuggling: Hijacking Web Browsing Sessions to Create CAPTCHA Farms. In the 25th Symposium on Applied Computing (Sierre, Switzerland, March 22-26, 2010). ACS'10. ACM. Google ScholarDigital Library
- Liu, Y., Cen, R., Zhang, M., Ma, S., Ru, L. Identifying Web Spam With User Behavior Analysis. In Fourth International Workshop on Adversarial Information Retrieval on the Web (Beijing, China, April 22, 2008). AIRWeb'08. ACM. Google ScholarDigital Library
- Sureka, A. Mining User Comment Activity for Detecting Forum Spammers in Youtube. In 1st International Workshop on Usage Analysis and the Web of Data in the 20th International World Wide Web Conference (Hyderabad, India, March 28, 2011). WWW2011. Google ScholarDigital Library
- Stringhini, G., Kruegel, C., Vigna, G. 2010. Detecting Spammers on Social Networks. In Annual Computer Security Applications Conference (Austin, Texas, USA, December 6-10, 2010). ACSAC'10. ACM. Google ScholarDigital Library
- Weiss, D. 2009. The Security Implications of URL Shortening Services. http://unweary.com/2009/04/the-security-implications-of-url-shortening-services.htmlGoogle Scholar
- Hayati, P., Potdar, V, Chai, K, Talevski, A. 2010. "Web Spambot Detection Based on Web Navigation Behaviour. In 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Western Australia, 2010. Google ScholarDigital Library
- Hayati, P., Chai, K., Talevski, A., Potdar, V. 2010. Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency. In The 2010 International Conference on Computational Science and Applications (ICCSA 2010), Fukuoka, Japan, 2010. Google ScholarDigital Library
- Hayati, P., Potdar, V., Talevski, A., Chai, K. 2010. Web Spambot Characterising using Self Organising Maps. In International Journal of Computer Systems Science and Engineering), 2010.Google Scholar
- Hayati, P., Potdar, V., Smyth, W. F., Talevski, A. 2010. Rule-Based Web Spambot Detection Using Action Strings. In The Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010), Redmond, Washington, 2010.Google Scholar
- Shin, Youngsang, Minaxi Gupta, and Steven Myers. "The Nuts and Bolts of a Forum Spam Automator." In the LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, Berkeley, CA, USA, 2011. Google ScholarDigital Library
- Ramachandran, A., Dasgupta, A., Feamster, N., Weinberger, K. 2011. Spam or Ham? Characterizing and Detecting Fraudulent "Not Spam" Reports in Web Mail Systems. In the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (Perth, Western Australia, September 1-2, 2011). CEAS2011. Google ScholarDigital Library
- Brian Krebs, 2012. ZeuS Trojan author in spam kingpins. http://www.theage.com.au/it-pro/security-it/zeus-trojan-author-in-with-spam-kingpins-20120222-1tmqp.htmlGoogle Scholar
- Sukanta Sinha, Rana Dattagupta, Debajyoti Mukhopadhyay; Identify Web-page Content meaning using Knowledge based System for Dual Meaning Words; International Journal of Engineering Research and Applications; Vol.2, N0.4; July-August 2012; pp.877--880; ISSN 2248-9622.Google Scholar
- Ruma Dutta, Anirban Kundu, Debajyoti Mukhopadhyay; Clustering based Web Page Prediction; International Journal of Knowledge and Web Intelligence; Inderscience Publishers; UK; Vol.2, No.4, 2011; pp.257--271; ISSN 1755-8255. Google ScholarDigital Library
- Debajyoti Mukhopadhyay, Debasis Giri, Sanasam Ranbir Singh; An Approach to Confidence Based Page Ranking for User Oriented Web Search; ACM SIGMOD Record, ACM Press, New York, USA; Vol.32, No.2, June 2003; pp.28--33; ISSN 0163-5808. Google ScholarDigital Library
Index Terms
- Spam 2.0
Recommendations
The changing nature of Spam 2.0
CUBE '12: Proceedings of the CUBE International Information Technology ConferenceSpam 2.0 (or Web 2.0 Spam) is referred to as spam content that is hosted on Web 2.0 applications (blogs, forums, social networks etc.). Such spam differs from traditional spam as this is targeted at Web 2.0 applications and spreads through legitimate ...
@spam: the underground on 140 characters or less
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityIn this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blacklists. We analyze the accounts that send spam and find evidence that it ...
Thwarting E-mail Spam Laundering
Laundering e-mail spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in the underground e-mail spam industry. Spammers have plagued the Internet by exploiting a large number of spam ...
Comments