skip to main content
10.1145/1655008.1655010acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

TrackBack spam: abuse and prevention

Published:13 November 2009Publication History

ABSTRACT

Contemporary blogs receive comments and TrackBacks, which result in cross-references between blogs. We conducted a longitudinal study of TrackBack spam, collecting and analyzing almost 10 million samples from a massive spam campaign over a one-year period. Unlike common delivery of email spam, the spammers did not use bots, but took advantage of an official Chinese site as a relay. Based on our analysis of TrackBack misuse found in the wild, we propose an authenticated TrackBack mechanism that defends against TrackBack spam even if attackers use a very large number of different source addresses and generate unique URLs for each TrackBack blog.

References

  1. Clive Akass. Storm worm 'making millions a day'. http://www.pcw.co.uk/personal-computer-world/news/2209293/strom-worm-making-millions-day, Feb 2008.Google ScholarGoogle Scholar
  2. Six Apart. Six apart guide to comment spam. http://www.sixapart.com/pronet/comment_spam.Google ScholarGoogle Scholar
  3. Six Apart. Trackback technical specification. http://www.sixapart.com/pronet/docs/trackback_spec.Google ScholarGoogle Scholar
  4. Dotclear. Dotclear blog plateform. http://dotclear.org/.Google ScholarGoogle Scholar
  5. Tom Espiner. Filipino news site hit by trackback spam. ZDNet Asia, http://www.zdnetasia.com/news/security/0,39044215,61998878,00.htm, 2007.Google ScholarGoogle Scholar
  6. F-secure. F-secure blog. http://www.f-secure.com/weblog/.Google ScholarGoogle Scholar
  7. Jonathan Feinberg. Wordle. http://www.wordle.net/.Google ScholarGoogle Scholar
  8. Brad L. Graham. Bradland must see http comments. blog http://www.bradlands.com/weblog/comments/september_10_1999/, Sep. 1999.Google ScholarGoogle Scholar
  9. Ironport. Internet security trends. http://www.ironport.com/securitytrends, 2008.Google ScholarGoogle Scholar
  10. Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage. Spamalytics: an empirical analysis of spam marketing conversion. In CCS'08: Proceedings of the 15th ACM conference on Computer and communications security, pages 3--14, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Kirk. Former spammer: 'I know I'm going to hell'. http://www.macworld.com/article/58997/2007/07/spammer.html, July 2007.Google ScholarGoogle Scholar
  12. Pranam Kolari, Akshay Java, Tim Finin, Tim Oates, and Anupam Joshi. Detecting spam blogs: A machine learning approach. In 2006. Proceedings of the 21st National Conference on Artificial Intelligence (AAAI), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamcraft: An inside look at spam campaign orchestration. In USENIX, editor, LEET, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Craig Macdonald and Iadh Ounis. The trec blogs06 collection: Creating and analysing a blog test collection. DCS Technical Report Series, 2006.Google ScholarGoogle Scholar
  15. Ashraf Matrawy, Anil Somayaji, and P. C. Oorschot. Mitigating network denial-of-service through diversity-based traffic management. In ACNS'05, pages 104--121. Springer Science+Business Media, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Universal McCann. Power to the people - social media tracker wave.3. http://www.universalmccann.com/Assets/wave_3_20080403093750.pdf.Google ScholarGoogle Scholar
  17. Declan McCullagh and Anne Broache. Blogs turn 10-who's the father? http://news.cnet.com/2100-1025_3-6168681.html.Google ScholarGoogle Scholar
  18. Gilad Mishne, David Carmel, and Ronny Lempel. Blocking blog spam with language model disagreement. In In Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2005.Google ScholarGoogle Scholar
  19. Alexandros Ntoulas and Mark Manasse. Detecting spam web pages through content analysis. In In Proceedings of the World Wide Web conference, pages 83--92. ACM Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Automattic Production. Askimet trackback statistics. http://akismet.com/stats/.Google ScholarGoogle Scholar
  21. Dan Sandler and Andy Thomas. Trackback validator. http://seclab.cs.rice.edu/proj/trackback/.Google ScholarGoogle Scholar
  22. Technorati. State of the blogosphere. http://technorati.com/blogging/state-of-the-blogosphere/.Google ScholarGoogle Scholar
  23. Technorati. Technorati top 100 blogs. http://technorati.com/pop/blogs/.Google ScholarGoogle Scholar
  24. D. Watson. All spammers go to hell (posting to funsec list). http://www.mail- archive.com/[email protected]/msg03346.html, July 2007.Google ScholarGoogle Scholar
  25. Michal Zalewski. P0f2: "Dr. Jekyll had something to Hyde" passive OS fingerprinting tool. Web, 2006.Google ScholarGoogle Scholar

Index Terms

  1. TrackBack spam: abuse and prevention

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security
        November 2009
        144 pages
        ISBN:9781605587844
        DOI:10.1145/1655008
        • Program Chairs:
        • Radu Sion,
        • Dawn Song

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 November 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate37of108submissions,34%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader