This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges
November/December 2007 (vol. 11 no. 6)
pp. 36-45
Paul Heymann, Stanford University
Georgia Koutrika, Stanford University
Hector Garcia-Molina, Stanford University
In recent years, social Web sites have become important components of the Web. With their success, however, has come an increasing flux of spam. If left unchecked, spam threatens to undermine resource sharing, interactivity, and openness. The authors survey three categories of potential countermeasures: those based on detection, demotion, and prevention. Although many of these countermeasures have been proposed before for email and Web spam, the authors find that their applicability to social Web sites differs. How should we evaluate spam countermeasures for social Web sites, and what future challenges might we face?

1. Z. Gyöngyi, H. Garcia-Molina, and J. Pedersen, "Combating Web Spam with TrustRank," Proc. 30th Very Large Databases Conf., 2004, pp. 576–587; http://dblp.uni-trier.de/db/conf/vldbvldb2004.html#GyongyiGP04 .
2. P. Graham, "A Plan for Spam," Aug. 2002; www.paulgraham.comspam.html.
3. A. Gray and M. Haahr, "Personalised, Collaborative Spam Filtering," Proc. 1st Conf. Email and Anti-Spam (CEAS 04), 2004; www.ceas.cc/papers-2004132.pdf.
4. T. Urvoy, T. Lavergne, and P. Filoche, "Tracking Web Spam with Hidden Style Similarity," Proc. 2nd Int'l Workshop on Adversarial Information Retrieval on the Web (AIRWeb 06), 2006; http://airweb.cse.lehigh.edu/2006proceedings.pdf .
5. G. Mishne, D. Carmel, and R. Lempel, "Blocking Blog Spam with Language Model Disagreement," Proc. 1st Int'l Workshop on Adversarial Information Retrieval on the Web (AIRWeb 05), 2005; http://airweb.cse.lehigh.edu/2005#proceedings .
6. L.H. Gomes et al., "Comparative Graph Theoretical Characterization of Networks of Spam," Proc. 2nd Conf. Email and Anti-Spam (CEAS 05), 2005; www.ceas.cc.
7. L. von Ahn et al., "CAPTCHA: Using Hard AI Problems for Security," Proc. Eurocrypt, 2003, pp. 294–311; citeseer.ist.psu.eduvonahn03captcha.html .
8. B. Templeton, "Proper Principles for Challenge/Response Anti-Spam Systems," Oct. 2007; www.templetons.com/brad/spamchallengeresponse.html .
9. E. Felten, "A Challenging Response to Challenge-Response," Freedom to Tinker,19 May 2003; www.freedom-to-tinker.com/archives000389.html .
10. J.R. Levine, "Experiences with Greylisting," Proc. 2nd Conf. Email and Anti-Spam (CEAS 05), 2005; www.ceas.cc.
11. C. Dwork and M. Naor, "Pricing via Processing or Combating Junk Mail," Proc. 12th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO 92), Springer-Verlag, 1993, pp. 139–147.
12. B. Templeton, E-stamps, Oct. 2007; www.templetons.com/brad/spamestamps.html ,.
13. G. Koutrika et al., "Combating Spam in Tagging Systems," Proc. 3rd Int'l Workshop Adversarial Information Retrieval on the Web (AIRWeb 07), 2007; http:/dbpubs.stanford.edu/pub2007-11.
14. T. Lynam and G. Cromack, "TREC Spam Filter Evaluation Toolkit," Oct. 2007; http://plg.uwaterloo.ca/~gvcormactreccorpus /.

Index Terms:
social search, social media, spam, social Web sites, resource sharing, spam countermeasures
Citation:
Paul Heymann, Georgia Koutrika, Hector Garcia-Molina, "Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges," IEEE Internet Computing, vol. 11, no. 6, pp. 36-45, Nov.-Dec. 2007, doi:10.1109/MIC.2007.125
Usage of this product signifies your acceptance of the Terms of Use.