skip to main content
10.1145/2030376.2030400acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceasConference Proceedingsconference-collections
research-article

Storage cost of spam 2.0 in a web discussion forum

Published: 01 September 2011 Publication History

Abstract

This paper presents an empirical research that identifies cost of Spam 2.0. This experiment is a part of ongoing research for identifying the cost of Spam 2.0 and focuses only on storage cost. The data is collected via a honeypot setup using a discussion forum for a period of 13 months. Forum provides a good place for the spammers to continue their spamming activities. Spamming give both direct and indirect cost towards forum owner and forum users. In this paper, we present a method to measure direct cost focusing only on storage cost. The main observation of the experiment is done towards 450,772 posts, 141 personal messages and 62,798 profiles. It uses 2.69 GB storage space. We first define our cost formula. We then set up a web based discussion forum and collect the information posted on the forum. This data is pre-processed to discover information that can be used in our formula. In order to identify the storage used for spam, we define related attributes based on maximum storage and impact factor features named as spam unit, and measure the storage taken by all these spam units. We evaluate the cost of storage based on three sources which are our real self-hosted server, commercial web hosting package and cloud hosting package. The experiment resulted that the storage cost for our research forum are AUD 23.66 based on self-hosted server, AUD133.90 for commercial web hosting, and AUD11.53 for cloud hosting. The highest storage cost for 10,000 spam posts, profiles and personal messages is AUD2.963, AUD0.068 and AUD0.056.

References

[1]
Yin, D., Davison, B. D., Xue, Z., Hong, L., Kontostathis, A., and Edwards, L. 2009. Detection of Harassment on Web 2.0. In Proceedings of the Content Analysis In The Web 2.0 (CAW2.0) Workshop At WWW2009. (Madrid, Spain, April 21, 2009). CAW 2.0 2009. Madrid, Spain.
[2]
Hayati, P., Potdar, V., Talevski, A., Firoozeh, N., Sarenche, S., and Yeganeh, E. A. 2010. Definition of spam 2.0: New spamming boom. In 4th IEEE International Conference on Digital Ecosystems and Technologies. (Dubai, United Arab Emirates, April 12--15, 2010). IEEE DEST 2010. IEEE, Dubai, UAE, 580--584. DOI= 10.1109/DEST.2010.5610590
[3]
Shin, Y., Gupta, M., and Myers, S. 2011. The nuts and bolts of a forum spam automator. In Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats. (Berkeley, CA, USA, March 2011). LEET `11. USENIX Association, Berkeley, CA, USA, 3--3.
[4]
Shin, Y., Gupta, M., and Myers, S. 2011. Prevalence and mitigation of forum spamming. In the 30th IEEE International Conference on Computer Communications. (Shanghai, China, April 12--14, 2011) IEEE INFOCOM 2011. IEEE Computer Society, Shanghai, China.
[5]
Chai, K., Hayati, P., Potdar, V., Wu, C., Talevski, A. 2010. Assessing Post Usage for Measuring the Quality of Forum Posts. In Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST).
[6]
Potdar, V., Ridzuan, F., Hayati, P., Talevski, A., Yeganeh, E. A., Firuzeh, N. and Sarencheh, S. 2010. Spam 2.0: The Problem Ahead. In Computational Science and Its Applications -- ICCSA 2010, D. Taniar, O. Gervasi, B. Murgante, E. Pardede, and B. O. Apduhan, Eds., Springer Berlin/Heidelberg. 400--411.
[7]
Niu, Y., Wang, Y. M., Chen, H., Ma, M., and Hsu, F. 2007. A Quantitative Study of Forum Spamming Using Context-based Analysis. In Proceedings Network and Distributed System Security (NDSS) Symposium. February 2007.
[8]
Motoyama, M., K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. 2010. Re: CAPTCHAs--Understanding CAPTCHA-solving services in an economic context. In Proceedings of the 19 th USENIX Conference on Security Symposium. August 11--13, 2010, Washington DC.
[9]
Benjamin Markines, B., Cattuto, C. and Menczer, F. 2009. Social spam detection. In Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb '09). Dennis Fetterly and Zoltán Gyöngyi (Eds.). ACM, New York, NY, USA, 41--48. DOI=10.1145/1531914.1531924
[10]
Ridzuan, F., Potdar, V., Talevski, A., and Smyth, W. F. 2010. Key Parameters in Identifying Cost of Spam 2.0. In Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications. Washington, DC, USA: IEEE Computer Society, 2010, 789--796. DOI = http://doi.ieeecomputersociety.org/10.1109/AINA.2010.163
[11]
Hayati, P., Chai, K., Potdar, V. and Talevski, A. 2009. HoneySpam 2.0: Profiling Web Spambot Behaviour. In Principles of Practice in Multi-Agent Systems, J.-J. Yang, M. Yokoo, T. Ito, Z. Jin and P. Scerri Eds. Springer Berlin/Heidelberg, 335--344.
[12]
Hayati, P., Potdar, V., Chai, K., and Talevski, A. 2010. Web Spambot Detection Based on Web Navigation Behaviour. In 24 th IEEE International Conference on Advanced Information Networking and Applications (AINA) 2010, Apr. 2010, IEEE Computer Society. 797--803. DOI = http://doi.ieeecomputersociety.org/10.1109/AINA.2010.92
[13]
Yaiche, H., Mazumdar, R. R., and C. Rosenberg. 2000. A game theoretic framework for bandwidth allocation and pricing in broadband networks, IEEE/ACM Transactions On Networking (TON), v. 8, n.5, October 2000, 667--678. DOI = 10.1109/90.879352

Cited By

View all
  • (2025)From warnings to bans: The role of social networks in the severity of sanctionsSocial Networks10.1016/j.socnet.2025.02.00182(1-13)Online publication date: Jul-2025
  • (2012)Spam 2.0 State of the ArtInternational Journal of Digital Crime and Forensics10.4018/jdcf.20120101024:1(17-36)Online publication date: 1-Jan-2012
  • (2012)Improving network security and design using honeypotsProceedings of the CUBE International Information Technology Conference10.1145/2381716.2381875(847-852)Online publication date: 3-Sep-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
September 2011
230 pages
ISBN:9781450307888
DOI:10.1145/2030376
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cost
  2. discussion forum
  3. spam 2.0
  4. storage cost
  5. web 2.0

Qualifiers

  • Research-article

Conference

CEAS '11

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)From warnings to bans: The role of social networks in the severity of sanctionsSocial Networks10.1016/j.socnet.2025.02.00182(1-13)Online publication date: Jul-2025
  • (2012)Spam 2.0 State of the ArtInternational Journal of Digital Crime and Forensics10.4018/jdcf.20120101024:1(17-36)Online publication date: 1-Jan-2012
  • (2012)Improving network security and design using honeypotsProceedings of the CUBE International Information Technology Conference10.1145/2381716.2381875(847-852)Online publication date: 3-Sep-2012
  • (2012)How much money do spammers make from your website?Proceedings of the CUBE International Information Technology Conference10.1145/2381716.2381856(732-739)Online publication date: 3-Sep-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media