The changing nature of spam 2.0
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Firoozeh, N. | |
dc.contributor.author | Ridzuan, Farida | |
dc.contributor.author | Like, Y. | |
dc.contributor.author | Mukhopadhyay, D. | |
dc.contributor.author | Tejani, D. | |
dc.contributor.editor | Vidyasagar Potdar | |
dc.contributor.editor | Debajyoti Mukhopadhyyay | |
dc.date.accessioned | 2017-01-30T12:54:57Z | |
dc.date.available | 2017-01-30T12:54:57Z | |
dc.date.created | 2013-02-27T20:00:36Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Potdar, Vidyasagar and Firoozeh, Nazanin and Ridzuan, Farida and Like, Yan and Mukhopadhyay, Debajyoti and Tejani, Dhiren. 2012. The changing nature of spam 2.0, in Potdar, V. and Debajyoti, M. (ed), Proceedings of the CUBE International Information Technology Conference (CUBE 2012), Sep 3-5 2012, pp. 826-831. Pune, India: Association for Computing Machinery. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/26733 | |
dc.identifier.doi | 10.1145/2381716.2381872 | |
dc.description.abstract |
Spam 2.0 (or Web 2.0 Spam) is referred to as spam content that is hosted on Web 2.0 applications (blogs, forums, social networks etc.). Such spam differs from traditional spam as this is targeted at Web 2.0 applications and spreads through legitimate websites. The main problems with Spam 2.0 is spam websites get undeserved high ranking in search engines, damage the reputation of legitimate websites, wastes' valuable computing resources and deceives users resulting in proliferation of scam, fraud and other security attacks. Protecting the Internet against Spam 2.0 attacks is increasingly becoming important due to the potential threats it poses to the innocent web users. The paper contributes in this direction by attempting to understand the root cause of the problem, by investigating the changing nature of Spam 2.0. To understand this we setup an online discussion forum as a Honeypot to capture spam content. The collected data is analysed to identify trends within the spam corpus, which includes repetitiveness in the use of email addresses, patterns within email addresses, repetitiveness of forum posts, domains used for spamming, keywords and categories, origin of spam traffic. In the future we aim to use these trends in developing a preventive or early detection system that could predict future spam activities and would allow us to take pre-emptive actions to address them. | |
dc.publisher | ACM | |
dc.subject | spam content analysis | |
dc.subject | spam tactics | |
dc.subject | spam dataset | |
dc.subject | spammer profiling | |
dc.title | The changing nature of spam 2.0 | |
dc.type | Conference Paper | |
dcterms.source.startPage | 826 | |
dcterms.source.endPage | 831 | |
dcterms.source.title | Proceedings of the CUBE International Information Technology Conference | |
dcterms.source.series | Proceedings of the CUBE International Information Technology Conference | |
dcterms.source.isbn | 9781450311854 | |
dcterms.source.conference | CUBE 2012 | |
dcterms.source.conference-start-date | Sep 3 2012 | |
dcterms.source.conferencelocation | Pune India | |
dcterms.source.place | New York | |
curtin.department | ||
curtin.accessStatus | Fulltext not available |