The changing nature of spam 2.0
Spam 2.0 (or Web 2.0 Spam) is referred to as spam content that is hosted on Web 2.0 applications (blogs, forums, social networks etc.). Such spam differs from traditional spam as this is targeted at Web 2.0 applications and spreads through legitimate websites. The main problems with Spam 2.0 is spam...
| Main Authors: | , , , , , |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
ACM
2012
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/26733 |
| _version_ | 1848752070361874432 |
|---|---|
| author | Potdar, Vidyasagar Firoozeh, N. Ridzuan, Farida Like, Y. Mukhopadhyay, D. Tejani, D. |
| author2 | Vidyasagar Potdar |
| author_facet | Vidyasagar Potdar Potdar, Vidyasagar Firoozeh, N. Ridzuan, Farida Like, Y. Mukhopadhyay, D. Tejani, D. |
| author_sort | Potdar, Vidyasagar |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Spam 2.0 (or Web 2.0 Spam) is referred to as spam content that is hosted on Web 2.0 applications (blogs, forums, social networks etc.). Such spam differs from traditional spam as this is targeted at Web 2.0 applications and spreads through legitimate websites. The main problems with Spam 2.0 is spam websites get undeserved high ranking in search engines, damage the reputation of legitimate websites, wastes' valuable computing resources and deceives users resulting in proliferation of scam, fraud and other security attacks. Protecting the Internet against Spam 2.0 attacks is increasingly becoming important due to the potential threats it poses to the innocent web users. The paper contributes in this direction by attempting to understand the root cause of the problem, by investigating the changing nature of Spam 2.0. To understand this we setup an online discussion forum as a Honeypot to capture spam content. The collected data is analysed to identify trends within the spam corpus, which includes repetitiveness in the use of email addresses, patterns within email addresses, repetitiveness of forum posts, domains used for spamming, keywords and categories, origin of spam traffic. In the future we aim to use these trends in developing a preventive or early detection system that could predict future spam activities and would allow us to take pre-emptive actions to address them. |
| first_indexed | 2025-11-14T08:02:46Z |
| format | Conference Paper |
| id | curtin-20.500.11937-26733 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T08:02:46Z |
| publishDate | 2012 |
| publisher | ACM |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-267332023-02-02T07:57:40Z The changing nature of spam 2.0 Potdar, Vidyasagar Firoozeh, N. Ridzuan, Farida Like, Y. Mukhopadhyay, D. Tejani, D. Vidyasagar Potdar Debajyoti Mukhopadhyyay spam content analysis spam tactics spam dataset spammer profiling Spam 2.0 (or Web 2.0 Spam) is referred to as spam content that is hosted on Web 2.0 applications (blogs, forums, social networks etc.). Such spam differs from traditional spam as this is targeted at Web 2.0 applications and spreads through legitimate websites. The main problems with Spam 2.0 is spam websites get undeserved high ranking in search engines, damage the reputation of legitimate websites, wastes' valuable computing resources and deceives users resulting in proliferation of scam, fraud and other security attacks. Protecting the Internet against Spam 2.0 attacks is increasingly becoming important due to the potential threats it poses to the innocent web users. The paper contributes in this direction by attempting to understand the root cause of the problem, by investigating the changing nature of Spam 2.0. To understand this we setup an online discussion forum as a Honeypot to capture spam content. The collected data is analysed to identify trends within the spam corpus, which includes repetitiveness in the use of email addresses, patterns within email addresses, repetitiveness of forum posts, domains used for spamming, keywords and categories, origin of spam traffic. In the future we aim to use these trends in developing a preventive or early detection system that could predict future spam activities and would allow us to take pre-emptive actions to address them. 2012 Conference Paper http://hdl.handle.net/20.500.11937/26733 10.1145/2381716.2381872 ACM restricted |
| spellingShingle | spam content analysis spam tactics spam dataset spammer profiling Potdar, Vidyasagar Firoozeh, N. Ridzuan, Farida Like, Y. Mukhopadhyay, D. Tejani, D. The changing nature of spam 2.0 |
| title | The changing nature of spam 2.0 |
| title_full | The changing nature of spam 2.0 |
| title_fullStr | The changing nature of spam 2.0 |
| title_full_unstemmed | The changing nature of spam 2.0 |
| title_short | The changing nature of spam 2.0 |
| title_sort | changing nature of spam 2.0 |
| topic | spam content analysis spam tactics spam dataset spammer profiling |
| url | http://hdl.handle.net/20.500.11937/26733 |