Skip to main content

Abstract

The emergence of social networking platforms in online space and its ever increasing user base has opened up a new arena for the spammers to exploit. Spam, in these kinds of platforms and such other interactive tools like forums, instant messaging, could be created easily and difficult to stop it from spreading, which necessitates the development of better detection strategies. In this paper, we present a contextual strategy for detecting spam in a restricted domain such as an academic portal. The proposed method uses the relationship between the concepts of the domain and the concepts of the individual message fragments to determine the relevancy of the message to the given context and marks the outliers. The strategy has been tested using a prototype system which had networking and interactive features for the participants to share information, and the results indicated that the contextual strategy was fairly successful in detecting spam.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A Bayesian Approach to Filtering Junk E-Mail. In: Learning for Text Categorization: Papers from the 1998 Workshop (1998)

    Google Scholar 

  2. Cournane, A., Hunt, R.: An analysis of the tools used for the generation and prevention of spam. Computers & Security 23, 154–166 (2004)

    Article  Google Scholar 

  3. Gyongyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, Chiba, Japan (2005)

    Google Scholar 

  4. So Young, P., Jeong Tae, K., Shin Gak, K.: Analysis of applicability of traditional spam regulations to VoIP spam. In: The 8th International Conference on Advanced Communication Technology, ICACT 2006, pp. 3–1217 (2006)

    Google Scholar 

  5. Nagamalai, D., Dhinakaran, B.C., Lee, J.K.: An in-depth Analysis of Spam and Spammers. International Journal of Security and its Applications 2(2) (April 2008)

    Google Scholar 

  6. LinkedIn, http://www.linkedin.com

  7. CiteULike, http://www.citeulike.org

  8. ArnetMiner, http://www.arnetminer.org

  9. Spam in Blogs, http://en.wikipedia.org/wiki/Spam_in_blogs

  10. Hayati, P., Potdar, V., Talevski, A., Firoozeh, N., Sarenche, S., Yeganeh, E.A.: Definition of spam 2.0: New spamming boom. In: Digital Ecosystem and Technologies (DEST). IEEE Computer Society, Dubai (2010)

    Google Scholar 

  11. Hayati, P., Potdar, V.: Toward spam 2.0: An evaluation of web 2.0 anti-spam meth. In: 7th IEEE International Conference on Industrial Informatics, pp. 875–880. IEEE Computer Society, Cardi (2009)

    Google Scholar 

  12. Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Computing 11, 36–45 (2007)

    Article  Google Scholar 

  13. Benevenuto, F., Rodrigues, T., Almeida, V.A.F., Almeida, J.M., Goncalves, M.A., Ross, K.W.: Video pollution on the web. First Monday 4 (2010)

    Google Scholar 

  14. Bhattarai, A., Rus, V., Dasgupta, D.: Characterizing comment spam in the blogosphere through content analysis. In: IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp. 37–44. IEEE Computer Society Press, Nashville (2009)

    Google Scholar 

  15. Dawei, Y., Davison Brian, D., Zhenzhen, X., Liangjie, H., April, K., Lynne, E.: Detection of harassment on web 2.0. In: CAW2.0 Workshop at WWW 2009 (2009)

    Google Scholar 

  16. Dhinakaran, B.C., Nagamalai, D., Lee, J.-K.: Bayesian Approach Based Comment Spam Defending Tool. In: Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T.-h., Yeo, S.-S. (eds.) ISA 2009. LNCS, vol. 5576, pp. 578–587. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. Niu, Y., Wang, Y.-M., Chen, H., Ma, M., Hsu, F.: A quantitative study of forum spamming using context-based analysis. In: 14th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, pp. 79–92 (2007)

    Google Scholar 

  18. Shin, Y., Gupta, M., Myers, S.: Prevalence and mitigation of forum spamming. In: IEEE INFOCOM. IEEE Computer Society (2011)

    Google Scholar 

  19. Social Networking Spam, http://en.wikipedia.org/wiki/Social_networking_spam

  20. McFedries, P.: Technically Speaking: Slicing the Ham from the Spam. IEEE Spectrum 41, 72 (2004)

    Article  Google Scholar 

  21. Han, S., Ahn, Y., Moon, S., Jeong, H.: Collaborative blog spam filtering using adaptive percolation search. In: WWW 2006 Workshop on Weblogging Ecosystem: Aggregation, Analysis and Dynamics (2006)

    Google Scholar 

  22. Narisawa, K., Yamada, Y., Ikeda, D., Takeda, M.: Detecting blog spam using the vocabulary size of all substrings in their copies. In: WWE 2006 3rd Annual Workshop on the Weblogging Ecosystem, Edinburgh, Scotland (2006)

    Google Scholar 

  23. Yu-Ru, L., Hari, S., Yun, C., Junichi, T., Belle, L.T.: Splog detection using self-similarity analysis on blog temporal dynamics. In: Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web. ACM, Banff (2007)

    Google Scholar 

  24. Zinman, A., Donath, J.: Is Britney Spears spam. In: Fourth Conference on Email and Anti-Spam Mountain View, California (2007)

    Google Scholar 

  25. Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., Ross, K.: Identifying Video Spammers in Online Social Networks. In: AIRWeb 2008, Beijing, China (2008)

    Google Scholar 

  26. Georgia, K., Frans Adjie, E., Zolt, G.n, ngyi, Paul, H., Hector, G.-M.: Combating spam in tagging systems. In: Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web, ACM, Banff (2007)

    Google Scholar 

  27. Sureka, A.: Mining User Comment Activity for Detecting Forum Spammers in YouTube. In: The Proceedings of 20th WWW Conference, Hyderabad (2011)

    Google Scholar 

  28. Rajendran, B.: Socio-Contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 384–389. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  29. Rajendran, B., Iyakutti, K.: Socio-contextual Network Mining for User Assistance in Web-based Knowledge Gathering Tasks. In: Memon, N., Alhajj, R. (eds.) From Sociology to Computing in Social Networks: Theory, Foundations and Applications. Lecture Notes in Social Networks, vol. 1, pp. 81–93. Springer, Wien (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Rajendran, B., Pandey, A.K. (2012). Contextual Strategies for Detecting Spam in Academic Portals. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Engineering. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27308-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27308-7_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27307-0

  • Online ISBN: 978-3-642-27308-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics