Abstract
The use of the Internet for the purpose of crime is a rapidly growing phenomenon that requires a proactive and coordinated response (UNODC 2013). Cybercriminals increasingly use sophisticated tools and methods to distribute a wide range of malicious content, often combining deceptive “social engineering” tricks with spam emails, hosting of phishing sites, and identity theft (Smith and Hutchings 2014). Unsolicited bulk, mass emails, or “spam,” pose a global challenge because this remains a major vector for the dissemination of malware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Bibliography
Alazab, M., Layton, R., Broadhurst, R. and Bouhours, B. (2013) “Malicious Spam Emails Developments and Authorship Attribution, IEEE,” in The Fourth Cyber-crime and Trustworthy Computing Workshop 58–68, Sydney: IEEE.
Alazab, M. and Venkatraman, S. (2013) “Detecting Malicious Behaviour Using Supervised Learning Algorithms of the Function Calls,” International Journal of Electronic Security and Digital Forensics 5 (2): 90–109.
Anderson, R., Barton, C., Böhme, R., Clayton, R., Eeten, M., Levi, M., Moore, T. and Savage, S. (2013) “Measuring the Cost of Cybercrime,” in The Economics of Information Security and Privacy, R. Böhme (ed.), Berlin Heidelberg IV: Springer, 265–300.
Blanzieri, E. and Bryl, A. (2008) “A Survey of Learning-based Techniques of Email Spam Filtering,” Artificial Intelligence Review 29: 63–92.
Broadhurst, R. and Chang, L. (2013) “Cybercrime in Asia: Trends and Challenges,” in Handbook of Asian Criminology, J. Liu, B. Hebenton and S. Jou (eds.), New York: Springer, 49–63.
Chantler, A. and Broadhurst, R. (2006) Social Engineering and Crime Prevention in Cyberspace, Technical Report, Justice, Queensland University of Technology, http://eprints.qut.edu.au/7526/1/7526.pdf (accessed 1 October 2014).
Cisco (2014) Spam Hits Three-Year High-Water Mark, http://blogs.cisco.com/security/spam-hits-three-year-high-water-mark/ (accessed 1 October 2014).
Davis, M. and Suignard, M. (2013) Unicode Technical Report #36 “Unicode Security Considerations”, http://unicode.org/reports/tr36/#Bidirectional_Text_Spoofing (accessed 1 October 2014).
European Commission (2009) EU Study on the Legal Analysis of a Single Market for the Information Society: New Rules for a New Age?, Digtial Agenda for Europe, http://ec.europa.eu/information_society/newsroom/cf/itemdetail.cfm?item_id=7022& (accessed 1 October 2014).
FireEye (2013) FireEye Advanced Threat Report–2H 2012, FireEye Inc., http://www2.fireeye.com/rs/fireye/images/fireeye-advanced-threat-report-2h2012.pdf (accessed 1 October 2014).
Gudkova, D. (2013) Spam in Q1 2013, Securelist, http://www.securelist.com/en/analysis/204792291/Spam%20_in_Q1_2013 (accessed 1 October 2014).
John, J., Moshchuk, A., Gribble, S. and Krishnamurthy, A. (2009) “Studying Spamming Botnets Using Botlab,” in The 6th USENIX Symposium on Networked Systems Design and Implementation, Boston: 291–306.
Krebs, B. (2012) Who’s Behind the World’s Largest Spam Botnet?, Krebsonsecurity, http://krebsonsecurity.com/2012/02/whos-behind-the-worlds-largest-spambotnet/ (accessed 1 October 2014).
Krebs, B. (2011) “Right-to-Left Override” Aids Email Attacks, http://krebsonsecurity.com/2011/09/right-to-left-override-aids-email-attacks/ (accessed 1 October 2014).
Radicati, S. and Levenstein, J. (2013) Email Statistics Report, 2013–2017, The Radicati Group Inc., http://www.radicati.com/wp/wp-content/uploads/2013/04/Email -Statistics-Report-2013-2017-Executive-Summary.pdf (accessed 1 October 2014).
Rao, J. and Reiley, D. (2012) “The Economics of Spam,” Journal of Economic Perspectives 26 (3): 87–110.
Smith, R. and Hutchings, A. (2014) “Identity Crime and Misuse in Australia: Results of the 2013 Online Survey,” Research and Public Policy Series, Canberra, Australia: Australian Institute of Criminology, http://aic.gov.au/media_library/ publications/rpp/128/rpp128.pdf (accessed 1 October 2014).
Stringhini, G., Egele, M., Kruegel, C. and Vigna, G. (2012) “Breaking the Loop: Leveraging Botnet Feedback for Spam Mitigation,” in The Seventh Annual Graduate Student Workshop on Computing, Santa Barbara, CA: University of California, 25–6.
Stringhini, G., Holz, T., Stone-Gross, B., Kruegel, C. and Vigna, G. (2011) “BOT-MAGNIFIER: Locating Spambots on the Internet,” in The 20th USENIx Conference on Security, San Francisco, CA: USENIX Association, 1–16.
Symantec (2013) Internet Security Threat Report 2013 vol. 18, <https://scm.symantec.com/resources/istr18_en.pdf>.
Symantec (2012) Symantec Internet Security Threat Report: Trends for 2011 vol. 17, http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr _main_report_ 2011_21239364.en-us.pdf (accessed 1 October 2014).
Symantec (2010) MessageLabs Intelligence: 2010 Annual Security Report, https://www.inteco.es/file/27gHxrzWsYyeyRTFYq8MuQ (accessed 1 October 2014).
Symantec (2008) MessageLabs Intelligence: 2008 Annual Security Report, http://www.ifap.ruhttp://www.ifap.ru/pr/2008/n081208a.pdf (accessed 1 October 2014).
Takahashi, K., Sakai, A. and Sakurai, K. (2010) “Spam Mail Blocking in Mailing Lists,” in Multimedia, K. Nishi (ed. ), InTech.
Tran, K.-N., Alazab, M. and Broadhurst, R. (2013) “Towards a Feature Rich Model for Predicting Spam Emails Containing Malicious Attachments and URLs,” in Eleventh Australasian Data Mining Conference, P. Christen, P. Kennedy, L. Liu, K.-L. Ong, A. Stranieri and Y. Zhao (eds.), Canberra ACT vol. 146, Canberra, Australia: Australian Computer Society.
Trend Micro (2012) Spear-Phishing Email: Most Favored APT Attack Bait, Trend Micro, http://www.trendmicro.com.au/cloud-content/us/pdfs/security-intelligence/white-papers/wp-spear-phishing-email-most-favored-apt-attack-bait.pdf (accessed 1 October 2014).
UNODC (2013) Comprehensive Study on Cybercrime, http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf (accessed 1 October 2014).
Wang, D., Navathe, S., Liu, L., Irani, D., Tamersoy, A. and Pu, C. (2013) “Click Traffic Analysis of Short URL Spam on Twitter,” in The 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin: IEEE, 250–9.
Editor information
Editors and Affiliations
Copyright information
© 2015 Mamoun Alazab and Roderic Broadhurst
About this chapter
Cite this chapter
Alazab, M., Broadhurst, R. (2015). The Role of Spam in Cybercrime: Data from the Australian Cybercrime Pilot Observatory. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_7
Download citation
DOI: https://doi.org/10.1057/9781137474162_7
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-55788-2
Online ISBN: 978-1-137-47416-2
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)