Subscribe
Issue No.05 - September/October (2010 vol.8)
pp: 42-47
Saeed Abu-Nimeh , Websense, San Diego
Thomas Chen , Swansea University, Swansea
ABSTRACT
The ease of posting comments and links in blogs has attracted spammers as an alternative venue to conventional email. An experimental study investigates the nature and prevalence of blog spam. Using Defensio logs, the authors collected and analyzed more than one million blog comments during the last two weeks of June 2009. They used a support vector machine (SVM) classifier combined with heuristics to identify spam posters' IP addresses, autonomous system numbers (ASN), and IP blocks. Experimental results show that more than 75 percent of blog comments during the reporting period are spam. In addition, the results show that blog spammers likely operate from a few colocation facilities.
INDEX TERMS
network-level security and protection; Web browser.
CITATION
Saeed Abu-Nimeh, Thomas Chen, "Proliferation and Detection of Blog Spam", IEEE Security & Privacy, vol.8, no. 5, pp. 42-47, September/October 2010, doi:10.1109/MSP.2010.113
REFERENCES
1. D. Fetterly, M. Manasse, and M. Najork, "Spam, Damn Spam, and Statistics," Proc. 7th ACM Int'l Workshop Web and Databases, ACM Press, 2004, pp. 1–6.
2. M. Ramilli and M. Prandini, "Comment Spam Injection Made Easy," Proc. 6th IEEE Consumer Comm. and Networking Conf., IEEE Press, 2009, pp. 1–5.
3. Y-R. Lin et al., "Detecting Splogs via Temporal Dynamics Using Self-Similarity Analysis," ACM Trans. Web, vol. 2, no. 1, 2008, pp. 1–35.
4. "Security Threat Report: 2009," white paper, Sophos, Jan. 2009; www.sophos.com/sophos/docs/eng/marketing_material sophos-security-threat-report-jan-2009-na.pdf .
5. A. Bhattarai, V. Rus, and D. Dasgupta, "Characterizing Comment Spam in the Blogosphere through Content Analysis," Proc. IEEE Symp. Computational Intelligence in Cyber Security, IEEE Press, 2009, pp. 37–44.
6. A. Ntoulas et al., "Detecting Spam Web Pages through Content Analysis," Proc. 15th ACM Int'l Conf. World Wide Web, ACM Press, 2006, pp. 83–92.
7. E. Alpaydin, Introduction to Machine Learning, MIT Press, 2004.
8. "Reputation-Based Mail Flow Control," white paper, IronPort, 2002; www.ironport.com/pdfironport_reputation_based_control_whitepaper.pdf .