7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference
(CEAS 2010)
Redmond, Washington, USA
13 - 14 July 2010
ISBN: 978-1-63266-578-2 Printed from e-media with permission by:
Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571
Some format issues inherent in the e-media version may also appear in this print version.
Copyright© (2010) by CEAS Conference All rights reserved.
Printed by Curran Associates, Inc. (2014)
For permission requests, please contact CEAS Conference at the address below.
CEAS Conference c/o Gordon V. Cormack 2502 Davis Centre University of Waterloo Waterloo, Ontario N2L 3G1
Phone: (519) 888-4567 (34450) Fax: (519) 885-1208 [email protected]
Additional copies of this publication are available from:
Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 USA Phone: 845-758-0400 Fax: 845-758-2634 Email: [email protected] Web: www.proceedings.com TABLE OF CONTENTS
Rule-Based On-The-Fly Web Spambot Detection Using Action Strings...... 1 P. Hayati, V. Potdar, A. Talevski, W. Smyth
MDMap: Assisting Users in Identifying Phishing Emails ...... 8 P. Dwyer, Z. Duan
Identifying Spammers by Their Resource Usage Patterns...... 12 K. Xu, M. Kliger, A. Hero
SHIFT-BOX: INBOX Time Shifting to Reduce Email Clutter...... 16 R. Vuillemot, J. Petit, M. Hacid
Filtering Offensive Language in Online Communities using Grammatical Relations...... 20 Z. Xu, S. Zhu
Understanding Forgery Properties of Spam Delivery Paths...... 30 F. Sanchez, Z. Duan, Y. Dong
Study of TrendStuffing on Twitter through Text Classification...... 40 D. Irani, S. Webb, C. Pu, K. Li
Understanding Large-Scale Spamming Botnets From Internet Edge Sites...... 50 T. Mori, H. Esquivel, A. Akella, A. Shimoda, S. Goto
Identifying New Spam Domains by Hosting IPs: Improving Domain Blacklisting...... 58 C. Wei, A. Sprague, G. Warner, A. Skjellum
Exploring the Spam Arms Race to Characterize Spam Evolution...... 66 P. Guerra, D. Guedes, W. Meira, C. Hoepers, M. Chaves, K. Steding-Jessen
Detecting Spammers on Twitter...... 75 F. Benevenuto, G. Magno, T. Rodrigues, V. Almeida
On the Difficulty of Counting Spam Sources ...... 84 R. Clayton
A Real-Life Study in Phishing Detection ...... 88 A. Bergholz, L. D'Addona
Image Repurposing for Gifar-Based Attacks ...... 98 S. Sundareswaran, A. Squicciarini
Dead Phish: An Examination of Deactivated Phishing Sites...... 108 C. Shue, E. Ferragut kaPoW Webmail: Effective Disincentives Against Spam ...... 116 W. Feng, E. Kaiser
A Game Theoretic Model and Empirical Analysis of Spammer Strategies ...... 125 M. Parameswaran, H. Rui, S. Sayin
Feature-Fusion Framework for Spam Filtering Based on SVM...... 132 Q. Ren
Author Index