The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2007 vol.11)
pp: 36-45
Paul Heymann , Stanford University
Georgia Koutrika , Stanford University
Hector Garcia-Molina , Stanford University
ABSTRACT
In recent years, social Web sites have become important components of the Web. With their success, however, has come an increasing flux of spam. If left unchecked, spam threatens to undermine resource sharing, interactivity, and openness. The authors survey three categories of potential countermeasures: those based on detection, demotion, and prevention. Although many of these countermeasures have been proposed before for email and Web spam, the authors find that their applicability to social Web sites differs. How should we evaluate spam countermeasures for social Web sites, and what future challenges might we face?
INDEX TERMS
social search, social media, spam, social Web sites, resource sharing, spam countermeasures
CITATION
Paul Heymann, Georgia Koutrika, Hector Garcia-Molina, "Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges", IEEE Internet Computing, vol.11, no. 6, pp. 36-45, November/December 2007, doi:10.1109/MIC.2007.125
REFERENCES
1. Z. Gyöngyi, H. Garcia-Molina, and J. Pedersen, "Combating Web Spam with TrustRank," Proc. 30th Very Large Databases Conf., 2004, pp. 576–587; http://dblp.uni-trier.de/db/conf/vldbvldb2004.html#GyongyiGP04 .
2. P. Graham, "A Plan for Spam," Aug. 2002; www.paulgraham.comspam.html.
3. A. Gray and M. Haahr, "Personalised, Collaborative Spam Filtering," Proc. 1st Conf. Email and Anti-Spam (CEAS 04), 2004; www.ceas.cc/papers-2004132.pdf.
4. T. Urvoy, T. Lavergne, and P. Filoche, "Tracking Web Spam with Hidden Style Similarity," Proc. 2nd Int'l Workshop on Adversarial Information Retrieval on the Web (AIRWeb 06), 2006; http://airweb.cse.lehigh.edu/2006proceedings.pdf .
5. G. Mishne, D. Carmel, and R. Lempel, "Blocking Blog Spam with Language Model Disagreement," Proc. 1st Int'l Workshop on Adversarial Information Retrieval on the Web (AIRWeb 05), 2005; http://airweb.cse.lehigh.edu/2005#proceedings .
6. L.H. Gomes et al., "Comparative Graph Theoretical Characterization of Networks of Spam," Proc. 2nd Conf. Email and Anti-Spam (CEAS 05), 2005; www.ceas.cc.
7. L. von Ahn et al., "CAPTCHA: Using Hard AI Problems for Security," Proc. Eurocrypt, 2003, pp. 294–311; citeseer.ist.psu.eduvonahn03captcha.html .
8. B. Templeton, "Proper Principles for Challenge/Response Anti-Spam Systems," Oct. 2007; www.templetons.com/brad/spamchallengeresponse.html .
9. E. Felten, "A Challenging Response to Challenge-Response," Freedom to Tinker,19 May 2003; www.freedom-to-tinker.com/archives000389.html .
10. J.R. Levine, "Experiences with Greylisting," Proc. 2nd Conf. Email and Anti-Spam (CEAS 05), 2005; www.ceas.cc.
11. C. Dwork and M. Naor, "Pricing via Processing or Combating Junk Mail," Proc. 12th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO 92), Springer-Verlag, 1993, pp. 139–147.
12. B. Templeton, E-stamps, Oct. 2007; www.templetons.com/brad/spamestamps.html ,.
13. G. Koutrika et al., "Combating Spam in Tagging Systems," Proc. 3rd Int'l Workshop Adversarial Information Retrieval on the Web (AIRWeb 07), 2007; http:/dbpubs.stanford.edu/pub2007-11.
14. T. Lynam and G. Cromack, "TREC Spam Filter Evaluation Toolkit," Oct. 2007; http://plg.uwaterloo.ca/~gvcormactreccorpus /.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool