The changing nature of spam 2.0

Spam 2.0 (or Web 2.0 Spam) is referred to as spam content that is hosted on Web 2.0 applications (blogs, forums, social networks etc.). Such spam differs from traditional spam as this is targeted at Web 2.0 applications and spreads through legitimate websites. The main problems with Spam 2.0 is spam...

Full description

Bibliographic Details
Main Authors: Potdar, Vidyasagar, Firoozeh, N., Ridzuan, Farida, Like, Y., Mukhopadhyay, D., Tejani, D.
Other Authors: Vidyasagar Potdar
Format: Conference Paper
Published: ACM 2012
Subjects:
Online Access:http://hdl.handle.net/20.500.11937/26733
_version_ 1848752070361874432
author Potdar, Vidyasagar
Firoozeh, N.
Ridzuan, Farida
Like, Y.
Mukhopadhyay, D.
Tejani, D.
author2 Vidyasagar Potdar
author_facet Vidyasagar Potdar
Potdar, Vidyasagar
Firoozeh, N.
Ridzuan, Farida
Like, Y.
Mukhopadhyay, D.
Tejani, D.
author_sort Potdar, Vidyasagar
building Curtin Institutional Repository
collection Online Access
description Spam 2.0 (or Web 2.0 Spam) is referred to as spam content that is hosted on Web 2.0 applications (blogs, forums, social networks etc.). Such spam differs from traditional spam as this is targeted at Web 2.0 applications and spreads through legitimate websites. The main problems with Spam 2.0 is spam websites get undeserved high ranking in search engines, damage the reputation of legitimate websites, wastes' valuable computing resources and deceives users resulting in proliferation of scam, fraud and other security attacks. Protecting the Internet against Spam 2.0 attacks is increasingly becoming important due to the potential threats it poses to the innocent web users. The paper contributes in this direction by attempting to understand the root cause of the problem, by investigating the changing nature of Spam 2.0. To understand this we setup an online discussion forum as a Honeypot to capture spam content. The collected data is analysed to identify trends within the spam corpus, which includes repetitiveness in the use of email addresses, patterns within email addresses, repetitiveness of forum posts, domains used for spamming, keywords and categories, origin of spam traffic. In the future we aim to use these trends in developing a preventive or early detection system that could predict future spam activities and would allow us to take pre-emptive actions to address them.
first_indexed 2025-11-14T08:02:46Z
format Conference Paper
id curtin-20.500.11937-26733
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T08:02:46Z
publishDate 2012
publisher ACM
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-267332023-02-02T07:57:40Z The changing nature of spam 2.0 Potdar, Vidyasagar Firoozeh, N. Ridzuan, Farida Like, Y. Mukhopadhyay, D. Tejani, D. Vidyasagar Potdar Debajyoti Mukhopadhyyay spam content analysis spam tactics spam dataset spammer profiling Spam 2.0 (or Web 2.0 Spam) is referred to as spam content that is hosted on Web 2.0 applications (blogs, forums, social networks etc.). Such spam differs from traditional spam as this is targeted at Web 2.0 applications and spreads through legitimate websites. The main problems with Spam 2.0 is spam websites get undeserved high ranking in search engines, damage the reputation of legitimate websites, wastes' valuable computing resources and deceives users resulting in proliferation of scam, fraud and other security attacks. Protecting the Internet against Spam 2.0 attacks is increasingly becoming important due to the potential threats it poses to the innocent web users. The paper contributes in this direction by attempting to understand the root cause of the problem, by investigating the changing nature of Spam 2.0. To understand this we setup an online discussion forum as a Honeypot to capture spam content. The collected data is analysed to identify trends within the spam corpus, which includes repetitiveness in the use of email addresses, patterns within email addresses, repetitiveness of forum posts, domains used for spamming, keywords and categories, origin of spam traffic. In the future we aim to use these trends in developing a preventive or early detection system that could predict future spam activities and would allow us to take pre-emptive actions to address them. 2012 Conference Paper http://hdl.handle.net/20.500.11937/26733 10.1145/2381716.2381872 ACM restricted
spellingShingle spam content analysis
spam tactics
spam dataset
spammer profiling
Potdar, Vidyasagar
Firoozeh, N.
Ridzuan, Farida
Like, Y.
Mukhopadhyay, D.
Tejani, D.
The changing nature of spam 2.0
title The changing nature of spam 2.0
title_full The changing nature of spam 2.0
title_fullStr The changing nature of spam 2.0
title_full_unstemmed The changing nature of spam 2.0
title_short The changing nature of spam 2.0
title_sort changing nature of spam 2.0
topic spam content analysis
spam tactics
spam dataset
spammer profiling
url http://hdl.handle.net/20.500.11937/26733