Identifying web spam with user behavior analysis
AIRWeb '08 Proceedings of the 4th international workshop on Adversarial information retrieval on the web
Evaluation of spam detection and prevention frameworks for email and image spam: a state of art
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web
HoneySpam 2.0: Profiling Web Spambot Behaviour
PRIMA '09 Proceedings of the 12th International Conference on Principles of Practice in Multi-Agent Systems
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
Proceedings of the 2010 ACM Symposium on Applied Computing
Key Parameters in Identifying Cost of Spam 2.0
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Web Spambot Detection Based on Web Navigation Behaviour
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
@spam: the underground on 140 characters or less
Proceedings of the 17th ACM conference on Computer and communications security
Detecting spammers on social networks
Proceedings of the 26th Annual Computer Security Applications Conference
Who is tweeting on Twitter: human, bot, or cyborg?
Proceedings of the 26th Annual Computer Security Applications Conference
USEWOD2011: 1st international workshop on usage analysis and the web of data
Proceedings of the 20th international conference companion on World wide web
The nuts and bolts of a forum spam automator
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Clustering-based web page prediction
International Journal of Knowledge and Web Intelligence
Behaviour-Based web spambot detection by utilising action time and action frequency
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II
Hi-index | 0.00 |
In this paper, we provide a high level overview of Spam 2.0, how it works, its impacts and its categorizations (which are annoying, tricky, deceiving and evil). We also describe the existing approaches taken to combat Spam 2.0, including the detection approach, the prevention approach, and the early detection approach. Three techniques based on the detection approach presented in this paper include: content based, metadata based and user flagging based. We also explore several open issues/problems in this area. These include problems regarding tools and technologies, awareness and responsibility, and spam and spammers. Issues discussed regarding awareness and responsibility are users' lack of awareness, governments' inaction in tackling Spam 2.0, companies' apathy in combating it, lack of collaboration between countries, and unclear accountabilities in this regard. The paper also identifies future trends for both anti-spammers and spammers. Anti-spammers will likely focus their efforts more on behaviour based techniques and produce more language independent tools. Implementation of dynamic forms and forcing every user to actually go through the registration form will be good ways to control spam. From a monetary perspective, estimating intangible costs associated with Spam 2.0 will help raise the awareness of public users regarding spamming. On the other hand, the spammers will predictably continue to find methods to decrease the filters' efficiency by imitating real users' behaviours and finding other spamming opportunities.