A Quantitative Study of Forum Spamming Using Context-Based Analysis

Total Page:16

File Type:pdf, Size:1020Kb

A Quantitative Study of Forum Spamming Using Context-Based Analysis A Quantitative Study of Forum Spamming Using Context-based Analysis Yuan Niu†, Yi-Min Wang‡, Hao Chen†, Ming Ma‡, and Francis Hsu† †University of California, Davis {niu,hchen,hsuf}@cs.ucdavis.edu ‡Microsoft Research, Redmond {ymwang,mingma}@microsoft.com Abstract forums range from the older message boards and guestbooks to the newer blogs and wikis. Since forums are designed to facilitate collaborative content Forum spamming has become a major means of search contribution, they become attractive targets for engine spamming. To evaluate the impact of forum spammers. For example, spammers have created spam spamming on search quality, we have conducted a blogs (splogs) and have injected spam comments into comprehensive study from three perspectives: that of legitimate forums (See Table A1 in Appendix for the search user, the spammer, and the forum hosting sample spammed forums). Compared to the site. We examine spam blogs and spam comments in “propagandist” methods of web spamming through the both legitimate and honey forums. Our study shows use of link farms 2 [16], forum spamming poses new that forum spamming is a widespread problem. challenges to search engines because (1) it is easy and Spammed forums, powered by the most popular often free to create forums and to post comments in software, show up in the top 20 search results for all processes that can often be automated, and (2) search the 189 popular keywords. On two blog sites, more engines cannot simply blacklist forums that contain than half (75% and 54% respectively) of the blogs are spam comments because these forums may be spam, and even on a major and reputably well 1 legitimate and contain valuable information. maintained blog site, 8.1% of the blogs are spam . The Anecdotal evidence as well as our own experience observation on our honey forums confirms that indicates that spammers have successfully promoted spammers target abandoned pages and that most their web sites in search results through forum comment spam is meant to increase page rank rather spamming. To combat forum spamming and to gain than generate immediate traffic. We propose context- insight on effective defense mechanisms, we need a based analyses, consisting of redirection and cloaking comprehensive study of the problem, such as its scale analysis, to detect spam automatically and to overcome and its popular techniques. shortcomings of content-based analyses. Our study This paper reports our quantitative study of forum shows that these analyses are very effective in spamming. We examine the scale of forum spamming identifying spam pages. from three different perspectives: that of the search user, the spammer, and the forum hosting site. We 1 Introduction examine both spam blogs, and spam comments in forums. For such a large-scale study, manual Search engine spamming (or search spamming or identification of spam would be unscalable, so we need web spamming [1]) refers to the practice of using automated approaches. Most existing automatic spam questionable search engine optimization techniques to detection approaches are based on content analysis. improve the ranking of web pages in search results. However, since spammers have discovered many ways When search spamming started, spammers created a to circumvent content-based analysis (such as large number of web pages with crafted keywords and plagiarized legitimate content, redirection 3, and link structures to promote the ranking of their web sites cloaking 4), we propose context-based analyses of in search results. As search engines develop more redirection and cloaking. sophisticated techniques to identify spam web pages, spammers are moving towards more fertile 2 A link farm consists of a group of sites using specific linking playgrounds: web forums . We define a web forum as a structures to boost rankings of one or more pages in the farm. web page where visitors may contribute content. Web 3 Redirection changes the user’s final destination or fetches dynamic content from other web sites. 4 Cloaking serves different content to different web visitors. For 1 We detected only redirection spam, so the actual percentage of example, it may serve browsers a page with spam content while spam blogs could be much higher. serving crawlers a page optimized for improving ranking. 1.1 Three perspectives of forum spamming based approach that uses URL-redirection and cloaking analysis . Our work was primarily motivated First, we examine forum spamming from the by two key observations: search user’s perspective: when a user searches • Many spam pages use cloaking and forums, how much spam shows up among the top redirection techniques [1,4] so that search results? To answer this question, we search for 190 top engines see different content than human keywords in forums powered by nine most popular users. A common technique is to serve page forum programs. We will describe our findings in content that the browser will dynamically Section 3.1.1. rewrite through script executions but the Second, we examine forum spamming from the crawler will not. Our approach is to treat each spammer’s perspective: we try to understand the page as a dynamic program, and to use a spammer’s modus operandi. To this end, we set up “monkey program” [6] to visit each page with three honey blogs, which should attract no legitimate a full fledged browser (so that the program comments, and have collected 41,100 comments over a can be executed in full fidelity) while year. We will analyze these spam comments in analyzing the redirection traffic. Section 3.1.2. • Many successful, large-scale spammers have Finally, we examine forum spamming from the created a huge number of doorway pages that forum hosting site’s perspective: how many forums are generate redirection traffic to a single domain spam on a hosting site, and what typical techniques do that serves the spam content. By identifying spammers apply to avoid detection? We examine over those domains that serve content to a large 20,000 blogs from four blog sites and will describe our number of doorway pages, we can catch findings in Section 3.2 and 3.3. major spammers’ domains together with all their doorway pages and doorway domains. 1.2 Context-based analysis To avoid exposing their spam domains directly 1.3 Contributions and being blacklisted by search engines, many We make the following contributions: spammers are creating doorway pages on free-hosting • domains and using their URLs in comment spamming. We conduct a comprehensive, quantitative When a user clicks a doorway-page link in search study of forum spamming. We examine this results, her browser is instructed to either redirect to or problem from three perspectives: that of the fetch ad listings from the actual spam domain or search user, the spammer, and the hosting site. advertising companies that serve the spammer as a • To overcome the limitation of content-based customer. For example, the comment-spammed URL spam detection, we propose context-based http://mywebpage.netscape.com/fendiblog/fendi- detection techniques that use URL redirection handbag.html redirects to the well-known domain tracing and cloaking analysis. We show that topsearch10.com . our context-based detection is effective in Many spammers set up doorway pages on free identifying spam pages automatically. forum hosting websites such as blogspot.com , Particularly, the two domains of a prolific blogstudio.com , forumsity.com , etc. Such doorway spammer, who created a large percentage of pages are a form of spam blogs. For example, as of this spam on two blog sites, appear in the top writing, http://seiko-diver-watch.blogspot.com results returned by our analysis tool. appeared as the top Yahoo! search result for “Seiko diver watch”, and http://forumsity.com/mobile/1/free- • Our study confirmed that forum spamming is motorola-ringtone.html appears as the top MSN search a widespread problem. The observation on result for “free motorola ringtone”. Figure 1 illustrates our honey forums confirms that spammers the end-to-end search spamming activity involving target abandoned pages and that most both spam blog creation and spam comment injection. comment spam is meant to increase page rank To overcome the limitations of content-based rather than generate immediate traffic. spam detection, we propose an orthogonal context- Spammed Pages #3: Search-engine Spamming “http://foobar.blogspot.com ” “http://foobar1.blogspot.com ” Spammed Forum … Search Engine “http://foobar.blogspot.com ” Spammed “http://foobar1.blogspot.com ” Spammer … Message Board Search Results “http://foobar.blogspot.com ” Spammed (1) http://foobar.blogspot.com “http://foobar1.blogspot.com ” #2: Comment Spamming Guestbook (2) http://GoodSite.com … (3) http://foobar1.blogspot.com (4) http://OKSite.com … Spam Blogs (Splogs) as Doorways #4: User Clicking http://good.blogspot.com Blogspot.com http://foobar.blogspot.com #5: URL Redirection Spammer Domain http://foobar1.blogspot.com Spammer’s content #1: Splog Creation (Usually advertisement) http://blogstudio.com/good Blogstudio.com http://blogstudio.com/foobar http://blogstudio.com/foobar1 Figure 1: Spam Blogs (splogs) and Comment Spamming. #1: The spammer creates splogs. #2: The spammer spams forums with the URLs of his splogs. #3: These splog URLs are ranked high in search results. #4: The search user clicks the splog URLs in the search results. #5: The splogs redirect the user to the spammer domain. syndicators and web-analytics servers, may crowd the Top Domain view because they serve a large number 2 Redirection-based spam detection of non-spam URLs. To filter out the noise, we scanned the top one million (mostly non-spam) click-through 2.1 URL redirection tracing and analysis URLs [6] to obtain a “known-good whitelist” of top third-party domains and filtered them out from the Top Our context-based spam detection process starts Domain view. The remaining ranked Top Domain list with the collection of a list of “URLs of interest”.
Recommended publications
  • Click Trajectories: End-To-End Analysis of the Spam Value Chain
    Click Trajectories: End-to-End Analysis of the Spam Value Chain ∗ ∗ ∗ ∗ z y Kirill Levchenko Andreas Pitsillidis Neha Chachra Brandon Enright Mark´ Felegyh´ azi´ Chris Grier ∗ ∗ † ∗ ∗ Tristan Halvorson Chris Kanich Christian Kreibich He Liu Damon McCoy † † ∗ ∗ Nicholas Weaver Vern Paxson Geoffrey M. Voelker Stefan Savage ∗ y Department of Computer Science and Engineering Computer Science Division University of California, San Diego University of California, Berkeley z International Computer Science Institute Laboratory of Cryptography and System Security (CrySyS) Berkeley, CA Budapest University of Technology and Economics Abstract—Spam-based advertising is a business. While it it is these very relationships that capture the structural has engendered both widespread antipathy and a multi-billion dependencies—and hence the potential weaknesses—within dollar anti-spam industry, it continues to exist because it fuels a the spam ecosystem’s business processes. Indeed, each profitable enterprise. We lack, however, a solid understanding of this enterprise’s full structure, and thus most anti-spam distinct path through this chain—registrar, name server, interventions focus on only one facet of the overall spam value hosting, affiliate program, payment processing, fulfillment— chain (e.g., spam filtering, URL blacklisting, site takedown). directly reflects an “entrepreneurial activity” by which the In this paper we present a holistic analysis that quantifies perpetrators muster capital investments and business rela- the full set of resources employed to monetize spam email— tionships to create value. Today we lack insight into even including naming, hosting, payment and fulfillment—using extensive measurements of three months of diverse spam data, the most basic characteristics of this activity. How many broad crawling of naming and hosting infrastructures, and organizations are complicit in the spam ecosystem? Which over 100 purchases from spam-advertised sites.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Adversarial Web Search by Carlos Castillo and Brian D
    Foundations and TrendsR in Information Retrieval Vol. 4, No. 5 (2010) 377–486 c 2011 C. Castillo and B. D. Davison DOI: 10.1561/1500000021 Adversarial Web Search By Carlos Castillo and Brian D. Davison Contents 1 Introduction 379 1.1 Search Engine Spam 380 1.2 Activists, Marketers, Optimizers, and Spammers 381 1.3 The Battleground for Search Engine Rankings 383 1.4 Previous Surveys and Taxonomies 384 1.5 This Survey 385 2 Overview of Search Engine Spam Detection 387 2.1 Editorial Assessment of Spam 387 2.2 Feature Extraction 390 2.3 Learning Schemes 394 2.4 Evaluation 397 2.5 Conclusions 400 3 Dealing with Content Spam and Plagiarized Content 401 3.1 Background 402 3.2 Types of Content Spamming 405 3.3 Content Spam Detection Methods 405 3.4 Malicious Mirroring and Near-Duplicates 408 3.5 Cloaking and Redirection 409 3.6 E-mail Spam Detection 413 3.7 Conclusions 413 4 Curbing Nepotistic Linking 415 4.1 Link-Based Ranking 416 4.2 Link Bombs 418 4.3 Link Farms 419 4.4 Link Farm Detection 421 4.5 Beyond Detection 424 4.6 Combining Links and Text 426 4.7 Conclusions 429 5 Propagating Trust and Distrust 430 5.1 Trust as a Directed Graph 430 5.2 Positive and Negative Trust 432 5.3 Propagating Trust: TrustRank and Variants 433 5.4 Propagating Distrust: BadRank and Variants 434 5.5 Considering In-Links as well as Out-Links 436 5.6 Considering Authorship as well as Contents 436 5.7 Propagating Trust in Other Settings 437 5.8 Utilizing Trust 438 5.9 Conclusions 438 6 Detecting Spam in Usage Data 439 6.1 Usage Analysis for Ranking 440 6.2 Spamming Usage Signals 441 6.3 Usage Analysis to Detect Spam 444 6.4 Conclusions 446 7 Fighting Spam in User-Generated Content 447 7.1 User-Generated Content Platforms 448 7.2 Splogs 449 7.3 Publicly-Writable Pages 451 7.4 Social Networks and Social Media Sites 455 7.5 Conclusions 459 8 Discussion 460 8.1 The (Ongoing) Struggle Between Search Engines and Spammers 460 8.2 Outlook 463 8.3 Research Resources 464 8.4 Conclusions 467 Acknowledgments 468 References 469 Foundations and TrendsR in Information Retrieval Vol.
    [Show full text]
  • Battling the Internet Water Army: Detection of Hidden Paid Posters
    Battling the Internet Water Army: Detection of Hidden Paid Posters Cheng Chen Kui Wu Venkatesh Srinivasan Xudong Zhang Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science University of Victoria University of Victoria University of Victoria Peking University Victoria, BC, Canada Victoria, BC, Canada Victoria, BC, Canada Beijing, China Abstract—We initiate a systematic study to help distinguish on different online communities and websites. Companies are a special group of online users, called hidden paid posters, or always interested in effective strategies to attract public atten- termed “Internet water army” in China, from the legitimate tion towards their products. The idea of online paid posters ones. On the Internet, the paid posters represent a new type of online job opportunity. They get paid for posting comments is similar to word-of-mouth advertisement. If a company hires and new threads or articles on different online communities enough online users, it would be able to create hot and trending and websites for some hidden purposes, e.g., to influence the topics designed to gain popularity. Furthermore, the articles opinion of other people towards certain social events or business or comments from a group of paid posters are also likely markets. Though an interesting strategy in business marketing, to capture the attention of common users and influence their paid posters may create a significant negative effect on the online communities, since the information from paid posters is usually decision. In this way, online paid posters present a powerful not trustworthy. When two competitive companies hire paid and efficient strategy for companies.
    [Show full text]
  • The History of Digital Spam
    The History of Digital Spam Emilio Ferrara University of Southern California Information Sciences Institute Marina Del Rey, CA [email protected] ACM Reference Format: This broad definition will allow me to track, in an inclusive Emilio Ferrara. 2019. The History of Digital Spam. In Communications of manner, the evolution of digital spam across its most popular appli- the ACM, August 2019, Vol. 62 No. 8, Pages 82-91. ACM, New York, NY, USA, cations, starting from spam emails to modern-days spam. For each 9 pages. https://doi.org/10.1145/3299768 highlighted application domain, I will dive deep to understand the nuances of different digital spam strategies, including their intents Spam!: that’s what Lorrie Faith Cranor and Brian LaMacchia ex- and catalysts and, from a technical standpoint, how they are carried claimed in the title of a popular call-to-action article that appeared out and how they can be detected. twenty years ago on Communications of the ACM [10]. And yet, Wikipedia provides an extensive list of domains of application: despite the tremendous efforts of the research community over the last two decades to mitigate this problem, the sense of urgency ``While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant remains unchanged, as emerging technologies have brought new messaging spam, Usenet newsgroup spam, Web search engine spam, dangerous forms of digital spam under the spotlight. Furthermore, spam in blogs, wiki spam, online classified ads spam, mobile when spam is carried out with the intent to deceive or influence phone messaging spam, Internet forum spam, junk fax at scale, it can alter the very fabric of society and our behavior.
    [Show full text]
  • Image Spam Detection: Problem and Existing Solution
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 Image Spam Detection: Problem and Existing Solution Anis Ismail1, Shadi Khawandi2, Firas Abdallah3 1,2,3Faculty of Technology, Lebanese University, Lebanon ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Today very important means of communication messaging spam, Internet forum spam, junk fax is the e-mail that allows people all over the world to transmissions, and file sharing network spam [1]. People communicate, share data, and perform business. Yet there is who create electronic spam are called spammers [2]. nothing worse than an inbox full of spam; i.e., information The generally accepted version for source of spam is that it crafted to be delivered to a large number of recipients against their wishes. In this paper, we present a numerous anti-spam comes from the Monty Python song, "Spam spam spam spam, methods and solutions that have been proposed and deployed, spam spam spam spam, lovely spam, wonderful spam…" Like but they are not effective because most mail servers rely on the song, spam is an endless repetition of worthless text. blacklists and rules engine leaving a big part on the user to Another thought maintains that it comes from the computer identify the spam, while others rely on filters that might carry group lab at the University of Southern California who gave high false positive rate. it the name because it has many of the same characteristics as the lunchmeat Spam that is nobody wants it or ever asks Key Words: E-mail, Spam, anti-spam, mail server, filter.
    [Show full text]
  • A Study on Topologically Dedicated Hosts on Malicious Web Infrastructures
    Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures Zhou Li, Sumayah Alrwais Yinglian Xie, Fang Yu XiaoFeng Wang Indiana University at Bloomington MSR Silicon Valley Indiana University at Bloomington {lizho, salrwais}@indiana.edu {yxie, fangyu}@microsoft.com [email protected] Abstract—Malicious Web activities continue to be a major misdeeds. Indeed, such infrastructures become the backbone threat to the safety of online Web users. Despite the plethora of the crimes in today’s cyberspace, delivering malicious forms of attacks and the diversity of their delivery channels, web content world wide and causing hundreds of millions in the back end, they are all orchestrated through malicious Web infrastructures, which enable miscreants to do business in damage every year. with each other and utilize others’ resources. Identifying the Malicious Web infrastructures. Given the central role linchpins of the dark infrastructures and distinguishing those those infrastructures play, an in-depth understanding of their valuable to the adversaries from those disposable are critical for gaining an upper hand in the battle against them. structures and the ways they work becomes critical for coun- In this paper, using nearly 4 million malicious URL paths teracting cybercrimes. To this end, prior research investi- crawled from different attack channels, we perform a large- gated the infrastructures associated with some types of chan- scale study on the topological relations among hosts in the nels (e.g., Spam [2], black-hat Search-Engine Optimization malicious Web infrastructure. Our study reveals the existence (SEO) [11]) and exploits (e.g., drive-by downloads [23]).
    [Show full text]
  • Understanding the Business Ofonline Pharmaceutical Affiliate Programs
    PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs Damon McCoy Andreas Pitsillidis∗ Grant Jordan∗ Nicholas Weaver∗† Christian Kreibich∗† Brian Krebs‡ Geoffrey M. Voelker∗ Stefan Savage∗ Kirill Levchenko∗ Department of Computer Science ∗Department of Computer Science and Engineering George Mason University University of California, San Diego †International Computer Science Institute ‡KrebsOnSecurity.com Berkeley, CA Abstract driven by competition between criminal organizations), a broad corpus of ground truth data has become avail- Online sales of counterfeit or unauthorized products able. In particular, in this paper we analyze the content drive a robust underground advertising industry that in- and implications of low-level databases and transactional cludes email spam, “black hat” search engine optimiza- metadata describing years of activity at the GlavMed, tion, forum abuse and so on. Virtually everyone has en- SpamIt and RX-Promotion pharmaceutical affiliate pro- countered enticements to purchase drugs, prescription- grams. By examining hundreds of thousands of orders, free, from an online “Canadian Pharmacy.” However, comprising a settled revenue totaling over US$170M, even though such sites are clearly economically moti- we are able to provide comprehensive documentation on vated, the shape of the underlying business enterprise three key aspects of underground advertising activity: is not well understood precisely because it is “under- Customers. We provide detailed analysis on the con- ground.” In this paper we exploit a rare opportunity to sumer demand for Internet-advertised counterfeit phar- view three such organizations—the GlavMed, SpamIt maceuticals, covering customer demographics, product and RX-Promotion pharmaceutical affiliate programs— selection (including an examination of drug abuse as a from the inside.
    [Show full text]
  • Internet Security
    In the News Articles in the news from the past month • “Security shockers: 75% of US bank websites Internet Security have flaws” • “Blank robbers swipe 3,000 ‘fraud-proof’ UK passports” • “Korean load sharks feed on hacked data” • “Worms spread via spam on Facebook and Nan Niu ([email protected]) MySpace” CSC309 -- Fall 2008 • “Beloved websites riddled with crimeware” • “Google gives GMail always-on encryption” http://www.theregister.co.uk 2 New Targets of 2007 Scenario 1 • Cyber criminals and cyber spies have • The Chief Information Security Officer shifted their focus again of a medium sized, but sensitive, federal – Facing real improvements in system and agency learned that his computer was network security sending data to computers in China. • The attackers now have two new targets • He had been the victim of a new type of spear phishing attack highlighted in this – users who are easily misled year’s Top 20. – custom-built applications • Once they got inside, the attackers had • Next, 4 exploits scenarios… freedom of action to use his personal • Reported by SANS (SysAdmin, Audit, Network, computer as a tunnel into his agency’s Security), http://www.sans.org systems. 3 4 Scenario 2 Scenario 3 • Hundreds of senior federal officials and business • A hospital’s website was compromised executives visited a political think-tank website that had been infected and caused their computers to because a Web developer made a become zombies. programming error. • Keystroke loggers, placed on their computers by the • Sensitive patient records were taken. criminals (or nation-state), captured their user names and passwords when their stock trading accounts and • When the criminals proved they had the their employers computers, and sent the data to data, the hospital had to choose between computers in different countries.
    [Show full text]
  • The Abcs—Web Lingo and Definitions
    THE ABCS—WEB LINGO AND DEFINITIONS THE A's ABOVE THE FOLD the page section visible without scrolling down—the exact size depends on screen settings; this is premium ad-rate space but may be worth it. AD EXTENSIONS added information in a text ad such as location, phone number, and links. AD NETWORKING multiple websites with a single advertiser controlling all or a portion of the sites' ad space, such as Google Search Network, which includes AOL, Amazon, Ask.com (formerly Ask Jeeves), and thousands of other sites. AD WORDS is Google’s paid search marketing program (introduced in 2001), the world's largest and available in only a handful of countries that run their own similar programs such as Russia (Yandex) and China (Baidu). AdWords uses a Quality Score determined by search relevancy (via click- through rate) and bid to determine an ad's positioning. AFFILIATE MARKETING involves internet marketing with other partner websites, individuals, or companies to drive site traffic, typically with fees based on a Cost per Acquisition (CPA) or Cost per Click (CPC) basis. AGGREGATE DATA details how a group of consumers interacts with your marketing or websites and what they do after interacting, offering a comprehensive view of your target market as a whole, as opposed to the behavior of individuals. ALGORITHM is a trade-secret formula (or formulas) used by search engines to determine search rankings in natural or organic search. Search engines periodically crawl sites (using “Spiders”) to analyze site content and value-rank your site for searches. ALT TAGS are embedded HTML tags used to make website graphics viewable by search engines, which are otherwise generally unable to view graphics or see text they might contain.
    [Show full text]
  • Spam in Blogs and Social Media
    ȱȱȱȱ ȱ Pranam Kolari, Tim Finin Akshay Java, Anupam Joshi March 25, 2007 ȱ • Spam on the Internet –Variants – Social Media Spam • Reason behind Spam in Blogs • Detecting Spam Blogs • Trends and Issues • How can you help? • Conclusions Pranam Kolari is a UMBC PhD Tim Finin is a UMBC Professor student. His dissertation is on with over 30 years of experience spam blog detection, with tools in the applying AI to information developed in use both by academia and systems, intelligent interfaces and industry. He has active research interest robotics. Current interests include social in internal corporate blogs, the Semantic media, the Semantic Web and multi- Web and blog analytics. agent systems. Akshay Java is a UMBC PhD student. Anupam Joshi is a UMBC Pro- His dissertation is on identify- fessor with research interests in ing influence and opinions in the broad area of networked social media. His research interests computing and intelligent systems. He include blog analytics, information currently serves on the editorial board of retrieval, natural language processing the International Journal of the Semantic and the Semantic Web. Web and Information. Ƿ Ȭȱ • Early form seen around 1992 with MAKE MONEY FAST • 80-85% of all e-mail traffic is spam • In numbers 2005 - (June) 30 billion per day 2006 - (June) 55 billion per day 2006 - (December) 85 billion per day 2007 - (February) 90 billion per day Sources: IronPort, Wikipedia http://www.ironport.com/company/ironport_pr_2006-06-28.html ȱȱǵ • “Unsolicited usually commercial e-mail sent to a large
    [Show full text]
  • Get Your Site Indexed
    Get Your Site Indexed ● Three basic questions from this chapter: – What if your site is not indexed? – How many pages on your site are indexed? – How do you get more pages indexed? Fall 2006 Davison/Lin CSE 197/BIS 197: Search Engine Strategies 10-1 What If Your Site Is Not Indexed? ● Are you certain it is not indexed? – Look for a PageRank bar in the Google Toolbar – Perform a site: search in Google/Yahoo/Ask/MSN Fall 2006 Davison/Lin CSE 197/BIS 197: Search Engine Strategies 10-2 What If Your Site Is Not Indexed? ● Verify your site is not banned or penalized – Has the number of your pages in the search engine decreased recently? – Can you only find your home page via a direct search with the URL? (not with relevant queries?) ● Search engines publish guidelines against spamming techniques – e.g., Google – What is search engine spam? Fall 2006 Davison/Lin CSE 197/BIS 197: Search Engine Strategies 10-3 Search Engine Spam Sometimes also known as web spam, spamdexing ● The use of techniques to manipulate search engines, typically to generate undeservedly high search engine result page rankings. – Cloaking (including hidden text, redirection) – Keyword stuffing – Link farms, link exchanges, web rings – Comment spam, referrer spam – Link bombing (a.k.a., googlebombing, “miserable failure”, “out of touch executives”) – Blog spam (splogs) ● Methods you want to avoid! Fall 2006 Davison/Lin CSE 197/BIS 197: Search Engine Strategies 10-4 Cloaking Example Examples credit: Kumar Chellapilla, Microsoft Live Labs Fall 2006 Davison/Lin CSE 197/BIS 197:
    [Show full text]