Design and Evaluation of a Real-Time URL Spam Filtering Service

@article{Thomas2011DesignAE,
  title={Design and Evaluation of a Real-Time URL Spam Filtering Service},
  author={Kurt Thomas and Chris Grier and Justin Ma and V. Paxson and D. Song},
  journal={2011 IEEE Symposium on Security and Privacy},
  year={2011},
  pages={447-462}
}
On the heels of the widespread adoption of web services such as social networks and URL shorteners, scams, phishing, and malware have become regular threats. Despite extensive research, email-based spam filtering techniques generally fall short for protecting other web services. To better address this need, we present Monarch, a real-time system that crawls URLs as they are submitted to web services and determines whether the URLs direct to spam. We evaluate the viability of Monarch and the… Expand
Angel or Demon? Characterizing Variations Across Twitter Timeline of Technical Support Campaigners
Phishing URL Detection Using URL Ranking
Detecting Spam URLs in Social Media via Behavioral Analysis
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath
BEAN: A BEhavior ANalysis Approach of URL Spam Filtering in Twitter
  • De Wang, C. Pu
  • Computer Science
  • 2015 IEEE International Conference on Information Reuse and Integration
  • 2015
Click traffic analysis of short URL spam on Twitter
Towards Online Spam Filtering in Social Networks
Suspended accounts in retrospect: an analysis of twitter spam
Analysis and Detection of Modern Spam Techniques on Social Networking Sites
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 68 REFERENCES
@spam: the underground on 140 characters or less
Detecting and characterizing social spam campaigns
Detecting Spammers on Twitter
Spamscatter: Characterizing Internet Scam Hosting Infrastructure
Exploiting Network Structure for Proactive Spam Mitigation
Detecting spammers on social networks
The Koobface botnet and the rise of social malware
  • Kurt Thomas, D. Nicol
  • Computer Science
  • 2010 5th International Conference on Malicious and Unwanted Software
  • 2010
Shades of grey: On the effectiveness of reputation-based “blacklists”
...
1
2
3
4
5
...