Abstract
Webspam is one of the most challenging problems faced by major search engines in the social computing arena. Spammers exploit weaknesses of major search engine algorithms to get their website in the top 10 search results, which results in higher traffic and increased revenue. The development of web applications where users can contribute content has also increased spam, since many web applications like blogging tools, CMS etc are vulnerable to spam. Spammers have developed targeted bots that can create accounts on such applications, add content and even leave comments automatically. In this paper we introduce the field of webspam, what it refers to, how spambots are designed and propagated, why webspam is becoming a big problem. We then experiment to show how spambots can be identified without using CAPTCHA. We aim to increase the general understanding of the webspam problem which will assist web developers, software engineers and web engineers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hayati, P., Potdar, V.: Evaluation of spam detection and prevention frameworks for email and image spam: a state of art. In: Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services. ACM, Linz (2008)
Aaron, W.: Ending spam’s free ride. netWorker 7(2), 18–24 (2003)
Fazlollahi, B.: Strategies for Ecommerce Success, p. 300. IGI Publishing (2002)
Chris, K., et al.: Spamalytics: an empirical analysis of spam marketing onversion. In: Proceedings of the 15th ACM conference on Computer and communications security, CM, Alexandria (2008)
Moheeb Abu, R., et al.: A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM conference on Internetmeasurement. ACM, Rio de Janeiro (2006)
Group, e., Spam: By Numbers (June 2003)
Neal, L.: Vendors Fight Spam’s Sudden Rise. Computer 40(3), 16–19 (2007)
Nucleus, R.: Spam: The silent ROI Killer. Research Note D59 (2003), http://www.nucleusresearch.com (citied July 14,2009)
Rockbridge, A.I.: National Technology Readiness Survey: Summary Report 2005 (2004)
Vrhnjak, S., Staff, C.: Spam is a big polluter in more ways than one (2009)
Yao, Z., et al.: BotGraph: large scale spamming botnet detection. In: Proceedings of the 6th USENIX symposium on Networked systems design and implementation. USENIX Association, Boston (2009)
Husna, H., et al.: Behavior Analysis of Spambotnets. In: 3rd International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE 2008, Bangalore, pp. 246–253 (2008)
http://www.joewein.net/dl/bl/from-bl.txt (citied July 13, 2009)
Antispam. http://antispam.imp.ch/swinoguri-rbl.txt (cited July 13, 2009)
Joewein. (cited July 13, 2009) http://www.joewein.net/dl/bl/dom-bl.txt
Juniper, http://www.juniper.net/security/spam/ [cited 13 July 2009]
Lowd, D., Meek, C.: Good Word Attacks on Statistical Spam Filters. In: Second Conference on Email and Anti-Spam (CEAS), Palo Alto, CA (2005)
Cunningham, P., et al.: A Case-Based Approach to Spam Filtering that Can Track Concept Drift. In: Ashley, K.D., Bridge, D.G. (eds.) ICCBR 2003. LNCS, vol. 2689, p. 3. Springer, Heidelberg (2003)
Yinglian, X., et al.: Spamming botnets: signatures and characteristics. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication. ACM, Seattle (2008)
Workathome, http://www.workathomeforum.in/online-adplacing-homejob.htm [cited July 13, 2009];
Leiba, B., Borenstein, N.: A multifaceted approach to spam reduction. In: First Conference on Email and Anti-Spam, CEAS (2004)
Cobb, S.: The Economics of Spam (2003)
Rich, L.L.: Internet Legal Issues: SPAM (1999)
Schwartz, E.I.: Spam Wars (2003)
Halprin, R.: Dependent CAPTCHAs: Preventing the Relay Attack, 26 (2009)
Hayati, P., Potdar, V.: Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods. In: 7th IEEE International Conference on Industrial Informatics (INDIN 2009), Cardiff, Wales (2009)
Sheffield, M.: ’Flag Spam,’ the Preferred Tool of the Left’s Web Censors (2008), (July 2009), http://newsbusters.org/blogs/matthewsheffield/2008/10/07/flag-spamlatest-tool-censors-left (cited July 14, 2009)
userscripts.org. Flagging Content Feature, http://userscripts.org/topics/1362 (cited July 14 2009)
Hayati, P., Potdar, V.: Spammer and Hacker, Two Old Friends. In: 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST 2009), Istanbul, Turkey (2009)
Hayati, P., Potdar, V.: Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods. In: 7th IEEE International Conference on Industrial Informatics (INDIN 2009), Cardiff, Wales (2009)
Hayati, P., Chai, K., Potdar, V., Talevski, A.: Behaviour-based web spambot detection by using Action Time and Action Frequency. In: The 2010 International Conference on Computational Science and Applications. Springer, Heidelberg (2010)
Hayati, P., Potdar, V., Chai, K., Talevski, A.: Web Spambot Detection Based on Web Usage Behavior. In: The International Conference on Advanced Information Networking and Applications, AINA 2010 (2010)
Ridzuan, F.H., Potdar, V., Talevski, A.: Key Parameters in Identifying Cost of Email Spam. In: The 2010 International Conference on Computational Science and Applications. Springer, Heidelberg (2010)
Ridzuan, F.H., Potdar, V., Talevski, A.: Key Parameters in Identifying Cost of Spam 2.0. In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010 (2010)
Sarencheh, S., Potdar, V., Yeganeh, E.A., Firouzeh, N.: Semi-Automatic Information Extraction from Discussion Boards with Applications for Anti-Spam Technology. In: International Conference on Computational Science & its Applications (ICCSA 2010). Springer, Heidelberg (2010)
Hayati, P., Chai, K., Potdar, V., Talevski, A.: HoneySpam 2.0: Profiling Web Spambot Behaviour. In: Yang, J.-J., Yokoo, M., Ito, T., Jin, Z., Scerri, P. (eds.) PRIMA 2009. LNCS, vol. 5925, pp. 335–344. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Potdar, V. et al. (2010). Spam 2.0: The Problem Ahead. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6017. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12165-4_32
Download citation
DOI: https://doi.org/10.1007/978-3-642-12165-4_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12164-7
Online ISBN: 978-3-642-12165-4
eBook Packages: Computer ScienceComputer Science (R0)