Spammer and hacker, two old friends
dc.contributor.author | Hayati, Pedram | |
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.editor | Okyay Kaynak | |
dc.contributor.editor | Mukesh Mohania | |
dc.date.accessioned | 2017-01-30T15:06:27Z | |
dc.date.available | 2017-01-30T15:06:27Z | |
dc.date.created | 2010-02-08T20:03:33Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Hayati, Pedram and Potdar, Vidyasagar. 2009. Spammer and hacker, two old friends, in Okyay Kaynak and Mukesh Mohania (ed), International Conference on Digital Ecosystems and Technology (DEST 2009), Jun 1 2009, pp. 290-294. Istanbul, Turkey: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/43296 | |
dc.description.abstract |
Spammers are always looking for new ways to bypass filters and spread spam content. Currently, spammers have not only improved their spam methods but have also moved towards exploiting software security vulnerabilities in order to spread their spam content. Spammers use weaknesses inside web applications to inject their spam content into legitimate websites, redirect users to their own campaign, misuse web users resources, and hide their footprints. In this paper, we investigate security vulnerabilities that are exploited by spammers. We explain these security vulnerabilities, list their importance and provide a scenario of how spammers can exploit them. Additionally, we discuss two possible solutions to counter problems by patching and secure software development. The result of our work highlights importance of concerning security best-practices in developing secure software which lack of that would result to demotion of website popularity, blacklisting of website and lose of users' trust. | |
dc.publisher | IEEE | |
dc.title | Spammer and hacker, two old friends | |
dc.type | Conference Paper | |
dcterms.source.startPage | 290 | |
dcterms.source.endPage | 294 | |
dcterms.source.title | Proceedings of the international conference on digital ecosystems and technologies (DEST 2009) | |
dcterms.source.series | Proceedings of the international conference on digital ecosystems and technologies (DEST 2009) | |
dcterms.source.isbn | 9781424423453 | |
dcterms.source.conference | International Conference on Digital Ecosystems and Technology (DEST 2009) | |
dcterms.source.conference-start-date | Jun 1 2009 | |
dcterms.source.conferencelocation | Istanbul, Turkey | |
dcterms.source.place | Turkey | |
curtin.note |
Copyright © 2009 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | CBS - Digital Ecosystems and Business Intelligence Institute (DEBII) | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | The Digital Ecosystems and Business Intelligence Institute (DEBII) |