Show simple item record

dc.contributor.authorPotdar, Vidyasagar
dc.contributor.authorFiroozeh, N.
dc.contributor.authorRidzuan, Farida
dc.contributor.authorLike, Y.
dc.contributor.authorMukhopadhyay, D.
dc.contributor.authorTejani, D.
dc.contributor.editorVidyasagar Potdar
dc.contributor.editorDebajyoti Mukhopadhyyay
dc.date.accessioned2017-01-30T12:54:57Z
dc.date.available2017-01-30T12:54:57Z
dc.date.created2013-02-27T20:00:36Z
dc.date.issued2012
dc.identifier.citationPotdar, Vidyasagar and Firoozeh, Nazanin and Ridzuan, Farida and Like, Yan and Mukhopadhyay, Debajyoti and Tejani, Dhiren. 2012. The changing nature of spam 2.0, in Potdar, V. and Debajyoti, M. (ed), Proceedings of the CUBE International Information Technology Conference (CUBE 2012), Sep 3-5 2012, pp. 826-831. Pune, India: Association for Computing Machinery.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/26733
dc.identifier.doi10.1145/2381716.2381872
dc.description.abstract

Spam 2.0 (or Web 2.0 Spam) is referred to as spam content that is hosted on Web 2.0 applications (blogs, forums, social networks etc.). Such spam differs from traditional spam as this is targeted at Web 2.0 applications and spreads through legitimate websites. The main problems with Spam 2.0 is spam websites get undeserved high ranking in search engines, damage the reputation of legitimate websites, wastes' valuable computing resources and deceives users resulting in proliferation of scam, fraud and other security attacks. Protecting the Internet against Spam 2.0 attacks is increasingly becoming important due to the potential threats it poses to the innocent web users. The paper contributes in this direction by attempting to understand the root cause of the problem, by investigating the changing nature of Spam 2.0. To understand this we setup an online discussion forum as a Honeypot to capture spam content. The collected data is analysed to identify trends within the spam corpus, which includes repetitiveness in the use of email addresses, patterns within email addresses, repetitiveness of forum posts, domains used for spamming, keywords and categories, origin of spam traffic. In the future we aim to use these trends in developing a preventive or early detection system that could predict future spam activities and would allow us to take pre-emptive actions to address them.

dc.publisherACM
dc.subjectspam content analysis
dc.subjectspam tactics
dc.subjectspam dataset
dc.subjectspammer profiling
dc.titleThe changing nature of spam 2.0
dc.typeConference Paper
dcterms.source.startPage826
dcterms.source.endPage831
dcterms.source.titleProceedings of the CUBE International Information Technology Conference
dcterms.source.seriesProceedings of the CUBE International Information Technology Conference
dcterms.source.isbn9781450311854
dcterms.source.conferenceCUBE 2012
dcterms.source.conference-start-dateSep 3 2012
dcterms.source.conferencelocationPune India
dcterms.source.placeNew York
curtin.department
curtin.accessStatusFulltext not available


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record