HoneySpam 2.0 Profiling Web Spambot Behaviour Pedram Hayati Kevin Chai Vidyasagar Potdar Alex Talevsky Prof. Tharam Dillon Prof. Elizabeth Chang Digital.

Slides:



Advertisements
Similar presentations
Joint Information Systems Committee Supporting Higher and Further Education Portals and the JISC Information Environment Strategy Chris Awre Programme.
Advertisements

Getting Your Web Site Found. Meta Tags Description Tag This allows you to influence the description of your page with the web crawlers.
Surrey Libraries Computer Learning Centres January 2012 Internet Searching Teaching Script Totally New to Computers Internet Searching.
Introduction Lesson 1 Microsoft Office 2010 and the Internet
WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEBSITE DONE BY: AYESHA NUSRATH 07L51A0517 FIRDOUSE AFREEN 07L51A0522.
An Integration Platform of Social Networking Applications to Support Life Long Learning in Rural Territories: the “SoRuraLL Virtual Learning World” Environment.
The Web is perhaps the single largest data source in the world. Due to the heterogeneity and lack of structure, mining and integration are challenging.
Typo-Squatting: a Nuisance or a Threat to Your Traffic? Mishari Almishari.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Anthony Bonomi, Amber Heeg, Elizabeth Newton, Bianca Robinson & Marzi Shabani.
Chapter 9 e-Commerce Systems.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Customer Service and Web Site Personalization Back to Table of Contents.
Software engineering on semantic web and cloud computing platform Xiaolong Cui Computer Science.
Introduction to Data Mining Engineering Group in ACL.
WEB DESIGNING Prof. Jesse A. Role Ph. D TM UEAB 2010.
Dr. Vidyasagar Potdar B.Sc. M.S. PhD Research Scholar Symbiosis Institute of Telecom Management Symbiosis International University Pune, Maharashtra, India.
Alexander Hartmann.  Free service offered by Google that generates detailed statistics about the visitors to a website. A premium version is also available.
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
Section 13.1 Add a hit counter to a Web page Identify the limitations of hit counters Describe the information gathered by tracking systems Create a guest.
CHUCK YOUNG MANAGING DIRECTOR OFFICE OF PUBLIC AFFAIRS GOVERNMENT ACCOUNTABILITY OFFICE to AGA BOSTON CHAPTER PROFESSIONAL DEVELOPMENT CONFERENCE MARCH.
Enterprise 2.0 Portals Using portals as web browsers Ensuring continued interest by internal users Creative design techniques and navigating content Consistent.
The 2nd International Conference of e-Learning and Distance Education, 21 to 23 February 2011, Riyadh, Saudi Arabia Prof. Dr. Torky Sultan Faculty of Computers.
Web 2.0 for Government Knowledge Management Everyone benefits by sharing knowledge March 24, 2010 Emerging Technologies Work Group Rich Zaziski, CEO FYI.
IOTA Improved Design and Implementation of a Modular and Extensible Website Framework Andrew Hamilton – TJHSST Computer Systems Lab Abstract.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
Measuring Web Site Performance Are companies making the leap?
Click here to continue. By: Allan Joe * What is the Internet? What is the Internet? * Who owns the Internet? Who owns the Internet? * How do you connect.
Emerging Technology StumbleUpon & QuizStar By Donna Perkins FOED 3010 Instructor, Ms. D. Crabtree.
Online Intelligence Solutions HOW CAN BIG DATA ANALYTICS HELP THE MEDIA BUSINESS? Mathieu Llorens – CEO – AT Internet Futur Media – June 27th Moscow.
Objective Understand concepts used to web-based digital media. Course Weight : 5%
DRUPAL AND INFORMATION ARCHITECTURE MICHAEL WAYNE HARRIS INFORMATION ARCHITECT USER EXPERIENCE & WEB SERVICES.
PLoS ONE Application Journal Publishing System (JPS) First application built on Topaz application framework Web 2.0 –Uses a template engine to display.
Module 5 A system where in its parts perform a unified job of receiving inputs, processes the information and transforms the information into a new kind.
A Collaborative Cloud-Based Multimedia Sharing Platform for Social Networking Environments Speaker : Chang,Kun-Hsiang /11/$26.00 ©2011.
Evaluation of Spam Detection and Prevention Frameworks for and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and.
Personalized Course Navigation Based on Grey Relational Analysis Han-Ming Lee, Chi-Chun Huang, Tzu- Ting Kao (Dept. of Computer Science and Information.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Next Generation Search Engines Ehsun Daroodi 1 Feb, 2003.
COMPSCI 726 Sumeet Outside the Closed World: On Using Machine Learning for Network Intrusion Detection Robin Sommer and Vern Paxson.
SEO & Analytics The Grey and the Hard Numbers. Introduction  Build a better mouse trap and the world will beat a path to your door  Mouse Trap -> Website.
 Goal recap  Implementation  Experimental Results  Conclusion  Questions & Answers.
Welcome. Getting Started with Discovery Streaming.
Types of websites and improving user experience UNIT 13 – WEBSITE DEVELOPMENT.
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Setting up and maintaining a web presence Your brand on the internet.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Natural Language Processing Lab National Taiwan University The splog Detection Task and A Solution Based on Temporal and Link Properties Yu-Ru Lin et al.
A New Generation of Artificial Neural Networks.  Support Vector Machines (SVM) appeared in the early nineties in the COLT92 ACM Conference.  SVM have.
Personal Branding. Objectives How do you see yourself? How do others see you? What is your personal brand?
Basics Components of Web Design & Development Basics, Components, Design and Development.
Web Analytics Fundamentals Presented by Tejaswi, Chandrika, Sunil.
Lecture-6 Bscshelp.com. Todays Lecture  Which Kinds of Applications Are Targeted?  Business intelligence  Search engines.
Stat Counter Web Traffic Analysis Tool. What is it ?!  How do you think you can improve your website?  Do you want to know which part of your site has.
Crawling When the Google visit your website for the purpose of tracking, Google does this with help of machine, known as web crawler, spider, Google bot,
The Web Information Technology Department
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Public Services Information Management
W3 Status Analyzer.
Search Engine Optimisation
Source: Procedia Computer Science(2015)70:
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Dieudo Mulamba November 2017
Basic Technology skills
DIGITAL IDENTITY FOR COMPANIES
Portals and the JISC Information Environment Strategy
Building Topic/Trend Detection System based on Slow Intelligence
Presentation transcript:

HoneySpam 2.0 Profiling Web Spambot Behaviour Pedram Hayati Kevin Chai Vidyasagar Potdar Alex Talevsky Prof. Tharam Dillon Prof. Elizabeth Chang Digital Ecosystem and Business Intelligence Institute (DEBII)

2 Agenda Introduction Background – Taxonomy of Spam 2.0 and Web Spambot – Current Literature Techniques HoneySpam 2.0 Architecture – Navigation Component – Form Tracking Component – Deploying HoneySpam 2.0 Experimental Results Related Works Conclusion and future works

3 Little bit what’s going on? Web 2.0 Spammer Spam 2.0

4 Web Spambot A kind of Web Robot or Internet Robot Distribute Spam content in Web 2.0 applications Scope –Application-Specific –Website-Specific

5 Countermeasures CAPTCHA HashCash Form variation Nonce 1.Decrease user convenience and increase complexity of human computer interaction. 2.As programs become better at deciphering CAPTCHA, the image may become difficult for humans to decipher. 3.As computers get more powerful, they will be able to decipher CAPTCHA better than humans. Web 2.0 Submission Workflow

6 HoneySpam 2.0 Monitor and Track Web Spambots Idea of Honeypots Implicitly Track –Click-steam –Page navigation –Keyboard activity –Mouse movement –Page Scrolling

7 HoneySpam 2.0 HoneySpam 2.0 Architecture

8 HoneySpam 2.0 in Action! % of Origin of WebSpam Bots % of Browser Type % of Content Contribution

9 HoneySpam 2.0 in Action! No. of Posts vs. Date No. of Users vs. Date No. of Online Users vs. Date No. of SpamBot vs. Hits

10 HoneySpam 2.0 in Action! No. Session vs. Dwell Visit Time No. of Spambots Vs. Return Visits

11 Web Spambot Behaviour Use of search engines to find target websites Create numerous user accounts Low website webpage hits and revisit rates Distribute spam content in a short period of time No web form interaction Generated usernames

12 Conclusion HoneySpam 2.0 as framework to monitor/track Web spambot behaviour Integrated to popular open source web applications Web Spambots – use search engines to find target websites, – create numerous user accounts, – distribute spam content in a short amount of time, – do not revisit the website, – do not interact with forms on the website, – and register with randomly generated usernames Future Work: Using of Machine Learning, Neural Network (SOM), extract features to do the classification

13 Thank You! debii.curtin.edu.au asrl.debii.curtin.edu.au Homepage: debii.curtin.edu.au/~pedram/ HoneySpam 2.0 Profiling Web Spambot Behaviour Pedram Hayati, Kevin Chai, Vidyasagar Potdar, Alex Talevsky