Spamalytics: an empirical analysis of spam marketing conversion

  title={Spamalytics: an empirical analysis of spam marketing conversion},
  author={Chris Kanich and Christian Kreibich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage},
The "conversion rate" of spam--the probability that an unsolicited e-mail will ultimately elicit a "sale"--underlies the entire spam value proposition. However, our understanding of this critical behavior is quite limited, and the literature lacks any quantitative study concerning its true value. In this paper we present a methodology for measuring the conversion rate of spam. Using a parasitic infiltration of an existing botnet's infrastructure, we analyze two spam campaigns: one designed to… 

How much money do spammers make from your website?

This experiment launched a spam campaign and set up a website to replicate spam practices, and posted spam content to 7,772 websites that resulted in 2059 unique visits to the authors' website, and 3 purchase transactions, in a period of a month.

The Spammer , the Botmaster , and the Researcher : on the Arms Race in Spamming Botnet Mitigation-Major Area Exam

Nowadays, most of worldwide spam is sent by botnets, which are networks of compromised computers that act under the control of a single entity, the so called botmaster.

Dimensioning SPAM: an in depth examination of why users click on deceptive emails

This work examined four dimensions of SPAM and measured click-through rates by dimension, finding SPAM timing was found to be the most effective dimension to lure users to click on links.

Analysis of bulk email campaigns using a challenge-response anti-spam system

This thesis approaches the study of gray area as bulk emails, by focusing on the analysis of email campaigns and proposes a three-phase approach based on message clustering, classification, and graph-based refinement that is able to automatically classify 50% of the gray emails with only 0.2% of false positives.

The Potential Profitability of Spams Traditional spamming is a lucrative business : in 2008 , Kanich

It is concluded that sextortion spamming is a lucrative business and spammers will likely continue to send bulk emails that try to extort money through cryptocurrencies.

Examining the Demand for Spam: Who Clicks?

It is found that the volume of spam and clicking norms in a users' network are significantly related to individual consumption behavior, and that more active users are less likely to click, suggesting that experience and internet skill may create more savvy consumers.

Improving Efficiency of Spam Detection using Economic Model

A novel economic metric is introduced, based on the underlying spam economic system, to assist detectors in keeping their false positives at bay by associating detection accuracy to the spammer's cost.

Spam campaign detection, analysis, and formalization

A categorical clustering methodology, named CCTree, is proposed to divide large amount of spam emails into spam campaigns by structural similarity, and under some conditions the proposed approach fully abstracts the tree representation.

The Underground on 140 Characters or Less ∗

A characterization of spam on Twitter finds that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blacklists, and examines whether the use of URL blacklists would help to significantly stem the spread of Twitter spam.

Locating Spambots on the Internet

A novel technique to support the identification and tracking of bots that send spam, which takes as input an initial set of IP addresses that are known to be associated with spam bots, and learns their spamming behavior.



On the Spam Campaign Trail

A new methodology— distribution infiltration— for measuring spam campaigns from the inside is explored, motivated by the observation that as spammers have migrated from open relays and open proxies to more complex malware-based “botnet” email distribution, they have unavoidably opened their infrastructure to outside observation.

Spamscatter: Characterizing Internet Scam Hosting Infrastructure

An opportunistic measurement technique called spamscatter is described that mines emails in real-time, follows the embedded link structure, and automatically clusters the destination Web sites using image shingling to capture graphical similarity between rendered sites.

Understanding and Reversing the Profit Model of Spam

All the ingredients of an impending solution to the spam problem, such as near universal deployment of constantly technologically advancing anti-spam filtering technologies, improved user education, establishment of legal frameworks and aggressive enforcement of those frameworks, are already known and are at various stages of implementation.

Spam double-funnel: connecting web spammers with advertisers

A five-layer, double-funnel model for describing end-to-end redirection spam is proposed, a methodology for analyzing the layers is presented, and prominent domains on each layer are identified using two sets of commercial keywords.

An Economic Analysis of Spam Law

In this paper, I develop an economic argument for regulating the sending of junk emails, and examine the efficiency of various approaches to regulate junk emails. The first part of the paper develops

Stopping outgoing spam

It is shown that maximizing complaint rates is a key factor, and new standards to encourage high complaint rates are suggested, and each system is designed to impose minimal costs on legitimate users, while being too costly for spammers.

On the effects of stock spam e-mails

The Effect of Stock Spam on Financial Markets

This paper correlates incoming spam messages that promote the investment in particular equity securities with financial market data and uses multivariate regression models to measure the impact of stock spam on traded volume and conduct an event study to find effects on market valuation.

Modeling Incentives for Email Blocking Strategies

This work derives formulae that express when blocking is an appropriate action and shows that the number of legitimate users at the ISP must be taken into account as well as thenumber of spam sources.

Revealing Botnet Membership Using DNSBL Counter-Intelligence

It is found that bots are performing reconnaissance on behalf of other bots, and counterintelligence techniques that may be useful for early bot detection are suggested.