Proliferation and detection of blog spam

Article English OPEN
Abu-Nimeh, S.; Chen, T.M.;
(2010)

The ease of posting comments and links in blogs has attracted spammers as an alternative venue to conventional email. An experimental study investigates the nature and prevalence of blog spam. Using Defensio logs, the authors collected and analyzed more than one million... View more
  • References (8)

    1. D. Fetterly, M. Manasse, and M. Najork, “Spam, Damn Spam, and Statistics,” Proc. 7th ACM Int'l Workshop Web and Databases, ACM Press, 2004, pp. 1-6.

    2. M. Ramilli and M. Prandini, “Comment Spam Injection Made Easy,” Proc. 6th IEEE Consumer Comm. and Networking Conf., IEEE Press, 2009, pp. 1-5.

    3. Y-R. Lin et al., “Detecting Splogs via Temporal Dynamics Using Self-Similarity Analysis,” ACM Trans. Web, vol. 2, no. 1, 2008, pp. 1-35.

    4. “Security Threat Report: 2009,” white paper, Sophos, Jan. 2009; www.sophos.com/sophos/docs/eng/ marketing _material/sophos-security-threat-report -jan-2009-na.pdf.

    5. A. Bhattarai, V. Rus, and D. Dasgupta, “Characterizing Comment Spam in the Blogosphere through Content Analysis,” Proc. IEEE Symp. Computational Intelligence in Cyber Security, IEEE Press, 2009, pp. 37-44.

    6. A. Ntoulas et al., “Detecting Spam Web Pages through Content Analysis,” Proc. 15th ACM Int'l Conf. World Wide Web, ACM Press, 2006, pp. 83-92.

    7. E. Alpaydin, Introduction to Machine Learning, MIT Press, 2004.

    8. “Reputation-Based Mail Flow Control,” white paper, IronPort, 2002; www.ironport.com/pdf/ironport _reputation_based_control_whitepaper.pdf.

  • Metrics
Share - Bookmark