Skip to main content

An Analysis of the Effectiveness of Personalized Spam Using Online Social Network Public Information

  • Conference paper
  • First Online:
Book cover International Joint Conference (CISIS 2015)

Abstract

Unsolicited email campaigns remain as one of the biggest threats affecting millions of users per day. Spam filters are capable of detecting and avoiding an increasing number of messages, but researchers have quantified a response rate of a 0.006 % [1], still significant to turn a considerable profit. While research directions are addressing topics such as better spam filters, or spam detection inside online social networks, in this paper we demonstrate that a classic spam model using online social network information can harvest a 7.62 % of click-through rate. We collect email addresses from the Internet, complete email owner information using their public social network profile data, and analyzed response of personalized spam sent to users according to their profile. Finally we demonstrate the effectiveness of these profile-based templates to circumvent spam detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 3–14. CCS ’08, New York, NY, USA. ACM (2008)

    Google Scholar 

  2. KasperskyLab: Spam and phishing in q3. http://www.kaspersky.com/about/news/spam/2014/iPhones-and-Ice-Buckets-Used-to-Promote-Junk-Mailings

  3. Facebook: Facebook: Newsroom. http://newsroom.fb.com/company-info/

  4. Bonneau, J., Anderson, J., Danezis, G.: Prying data out of a social network. In: International Conference on Advances in Social Network Analysis and Mining, pp. 249–254 (2009)

    Google Scholar 

  5. Balduzzi, Marco, Platzer, Christian, Holz, Thorsten, Kirda, Engin, Balzarotti, Davide, Kruegel, Christopher: Abusing social networks for automated user profiling. In: Jha, Somesh, Sommer, Robin, Kreibich, Christian (eds.) RAID 2010. LNCS, vol. 6307, pp. 422–441. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., Markatos, E.P.: Using social networks to harvest email addresses. In: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 11–20. WPES ’10, New York, NY, USA, ACM (2010)

    Google Scholar 

  7. Alexa Internet, I.: Alexa top 500 global sites. http://www.alexa.com/topsites

  8. Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1–9. ACSAC ’10, New York, NY, USA. ACM (2010)

    Google Scholar 

  9. Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 17th ACM conference on Computer and Communications Security, pp. 681–683. CCS ’10, New York, NY, USA. ACM (2010)

    Google Scholar 

  10. Jakobsson, M., Johnson, N., Finn, P.: Why and how to perform fraud experiments. IEEE Secur. Priv. 6(2), 66–68 (2008)

    Article  Google Scholar 

  11. Jakobsson, M., Ratkiewicz, J.: Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In: WWW ’06: Proceedings of the 15th International Conference on World Wide Web, pp. 513–522, New York, NY, USA. ACM (2006)

    Google Scholar 

Download references

Acknowledgments

This work has been partially funded by the Basque Department of Education, Language policy and Culture under the project SocialSPAM (PI_2014_1_102).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Enaitz Ezpeleta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ezpeleta, E., Zurutuza, U., Hidalgo, J.M.G. (2015). An Analysis of the Effectiveness of Personalized Spam Using Online Social Network Public Information. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics