CFP last date
15 October 2024
Call for Paper
November Edition
IJAIS solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 15 October 2024

Submit your paper
Know more
Reseach Article

Spam Detection Techniques: Issues and Challenges

Published on June 2013 by Amrita Mathur, Prachi Gharpure
International Conference and workshop on Advanced Computing 2013
Foundation of Computer Science USA
ICWAC - Number 3
June 2013
Authors: Amrita Mathur, Prachi Gharpure
ef0ef87b-88f0-438e-bbea-d01795699531

Amrita Mathur, Prachi Gharpure . Spam Detection Techniques: Issues and Challenges. International Conference and workshop on Advanced Computing 2013. ICWAC, 3 (June 2013), 0-0.

@article{
author = { Amrita Mathur, Prachi Gharpure },
title = { Spam Detection Techniques: Issues and Challenges },
journal = { International Conference and workshop on Advanced Computing 2013 },
issue_date = { June 2013 },
volume = { ICWAC },
number = { 3 },
month = { June },
year = { 2013 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/icwac/number3/498-1345/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and workshop on Advanced Computing 2013
%A Amrita Mathur
%A Prachi Gharpure
%T Spam Detection Techniques: Issues and Challenges
%J International Conference and workshop on Advanced Computing 2013
%@ 2249-0868
%V ICWAC
%N 3
%P 0-0
%D 2013
%I International Journal of Applied Information Systems
Abstract

In recent years social websites have become important components of the web. With their success, however has come a growing influx of spam. If left unchecked, spam threatens to undermine resource sharing, interactivity and openness. This article focuses on various countermeasures that are based on detection, demotion and prevention. Although various countermeasures have been proposed for e-mail and web spam but still there are challenges . This paper surveys various anti-spam strategies for social networking. In literature we have studied that many anti- spam strategies have been discovered but still there are some open challenges to these techniques. Some of them are highlighted in this article.

References
  1. ZoltanGyongi; Hector Garcia-Molina. ,"Web Spam Taxonomy ",. First International workshop on Adversarial Information Retrieval on the We (at the 14th International World Wide Web Conference) chiba, Japan, 2005. .
  2. Paul Heymann; Georgia Koutrika. ," Fighting Spam on Social Website", 2007; IEEE INTERNET COMPUTING; ISSN 1089-7801/07
  3. Nikita Sprin, Jiawei Han, "Survey on web spam detection: principles and algorithms", Proceedings of ACM SIGKDD Explorations newsletter, vol. 13 issue 2, December 2011.
  4. Vijay Krishnan, Rashmi Raj "Web Spam Detection with Anti Trust Rank". - Airweb. cse. lehigh. edu/2006/proceedings. pdf
  5. Jacob Abernethy, Olivier Chapelle, Carlos Castillo. , "Graph regularization methods for web spam detaction", springer. com , MachLearn(2010)81:207-225, DOI 10. 1007/s10994-010-5171-1, 25th march 2010
  6. Katarzyna Musial, Prezemyslaw, "Social Networks on the Internet", World Wide Web, DOI10. 1007/s11280-011-0155-z. , 27th December 2011.
  7. Saeed Abu-Nimeh. , Thomas M. Chen, "proliferation and detection of Blog Spam", published by IEEE computer and reliability society,1540-7993, september2010.
  8. Zi Chu, Steven Gianvecchio, Haining Wang. , "Detecting Automation of Twitter Accounts : Are You A Human, Bot or Cyborg?", IEEE transactions on dependable and secure computing, DOI 10. 1109/TDSC. 2012. 75, pp No 1545-5971/12
  9. Jacob Piskorsike et. al "Exploring Linguistic Features for Web Spam Detection":AIRWeb '08 , Procedings of the 4th international workshop on Adversarial information retrival on the web,pages25-28, ACM, DOI 10. 1145/1451983. 1451990 ISBN: 978-1-60558-159-0
  10. Win, B,Goel, & Davison, BD Topical Trust Rank using topicality to combat Web Spam. WWW2006.
Index Terms

Computer Science
Information Sciences

Keywords

Social networking spam anti-spam strategies