2. INTRODUCTION
• SPAM- Sending spam emails sent to a large
number of Internet users without their
consent
• VIRUS- A harmful program hiding in other
innocent programs
• CYBER CRIME- Crime that is committed on the
internet
3. DEFINITION
• SPAM is defined as an unsolicited, unwanted,
postings on social network websites or suspicious
emails sent to a large number of users.
• Social Spam is unwanted spam content appearing
on social network and any website with user-
generated content (comments, chat, etc.). It can
be manifested in many ways, including bulk
messages, profanity, insults, hate speech,
malicious links, fraudulent reviews, fake friends,
and personally identifiable information.
4. • Spammer- A person who creates electronic
spam is called a spammer
5. HISTORY
• The first major commercial spam incident began on
March 5, 1994.
• In a few years, the focus of spam (and anti-spam
efforts) has shifted primarily to electronic mail, where
it still resides today. It can be argued that aggressive
spam emails from various high profile spammers like
Sanford Wallace of Cyber Promotions in the mid to late
1990s helped make spam primarily an email
phenomenon in the public mind.
• In 2009, the majority of spam emails sent worldwide
were in English. Spammers have started using machine
translation services to send spam in other languages.
6. TYPES
• E-mail
• Instant Messaging
• Mobile Phones
• Social Networking Spam
• Social Spam
• Spam Targeting Video Sharing Sites
• Academic search
• Mobile Apps
7. E-MAIL
• Email Spam, also known as unsolicited bulk email
(UBE), spam, or unsolicited commercial email
(UCE), is the sending of unwanted email
messages, often with commercial content, in
large quantities. to a set of indiscriminate
recipients. Spam in e-mail began to become a
problem when the Internet was opened to the
general public in the mid-1990s. It has grown
exponentially in the following years and today
represents between 80 and 85%. of all emails in
the world. according to a “conservative estimate”.
8. INSTANT MESSAGING
• According to a report by Ferris Research, 500
million spam instant messages were sent in
2003, double the 2002 level. Instant
messaging is rarely blocked by firewalls,
making it a particularly useful channel for
spammers. . This is very common in many
instant messaging systems such as like Skype
9. MOBILE PHONES
• Mobile phone spam targets the text messaging service
of a mobile phone. This can be particularly irritating for
customers, not just for the inconveniences, but also for
the costs which can be invoiced by SMS received in
certain markets.
• The term "SpaSMS" was coined on the adnews Adland
website in 2000 to describe spam. To comply with CAN-
SPAM regulations in the United States, SMS messages
must now provide the HELP and STOP options, the
latter completely terminating communication with the
advertiser by SMS.
10. SOCIAL NETWORKING SPAM
• Facebook and Twitter are not immune to messages
containing spam links. Spammers hack into accounts and
send fake links disguised as the user's trusted contacts,
such as friends and family.
• As for Twitter, spammers gain credibility by following
verified accounts like Lady Gaga's; When the account
owner follows the spammer, they legitimize the spammer.
• Twitter has studied which structures of interest allow its
users to receive interesting tweets and avoid spam, despite
the fact that the site uses the delivery model, in which all of
a user's tweets are broadcast to all. user subscribers.
Spammers, with malicious intent, post unwanted (or
irrelevant) information or spread false information on social
media platforms.
11. SOCIAL SPAM
• Extending beyond centrally managed social
media platforms, user-generated content is
increasingly appearing on commercial,
government and non-profit websites around the
world.
• Fake accounts and comments entered by
computers programmed to send social spam can
infiltrate these websites.
• Well-meaning and malicious human users can
violate website policies by sending profanity,
slurs, hate speech and violent messages.
12. SPAM TARGETING VIDEO SHARING
SITES
• In actual video spam, the uploaded movie is given a name and description
with a popular figure or event likely to attract attention, or within the
video a certain image is programmed to appear as the video thumbnail
image to fool the user. viewer, such as a still image from a feature film,
pretending to be part by part of a pirated movie, eg. Big Buck Bunny Full
Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO file
for a video game or something similar. The actual content of the video
ends up being totally alien, a Rickroll, offensive, or just a text on the
screen of a link to the site that is being promoted. In some cases, the link
in question may lead to an online survey site, a password-protected
archive file with instructions leading to the aforementioned survey
(although the survey, and the archive file itself, have no value and do not
contain the file in question), or in extreme cases, malware. Others may
upload videos presented in an infomercial-like format selling their product
featuring paid actors and testimonials, although the promoted product or
service is of questionable quality and would likely not pass the scrutiny of
a standards and practices department at a television station. or cable.
network
13. Screenshot from a spam video on
YouTube claiming that the film in
question has been deleted from the site,
and can only be accessed on the link
posted by the spambot in the video
description (if the video were actually
removed by YouTube, the description
would be inaccessible and the deletion
notification would look different)
14. ACADEMIC SEARCH
• Spam dexing refers to a World Wide Web practice of
modifying HTML pages to increase your chances of ranking
high in search engine relevance lists.
• These sites use “black hat” search engine optimization
techniques to deliberately manipulate their search engine
rankings. Many modern search engines have changed their
search algorithms to try to exclude the web pages that use
spam indexing tactics.
• For example, search bots will detect repeated keywords as
spam using grammar analysis. If it turns out that a website
owner spammed the website to falsely increase their page
ranking, the website may be penalized by the search
engines.
15. Mobile Apps
• Mobile Application Store spam includes
I. applications that have been generated
automatically and therefore have no specific
functionality or meaningful description.
II. the publication of several instances of the same
application to obtain greater visibility on the
application market.
III. applications that make excessive use of
unrelated keywords to attract users through
unwanted searches
16. SOLUTION
• There are different solutions to SPAM that you
can use, such as:
– Self solution
– White List Solutions
– Black List Solutions
– Software Solutions
– Heuristic Filters
– Content Filters
17. • Self solution
– The automatic solution implies that the user sees and eliminates
the SPAM in their mailbox.
– While it can be effective, it is time consuming and frustrating.
• Whitelist solution:
– Whitelists allow you to receive mail from senders in your
address book.
– Mail from senders who are not in your address book will be
stored in the spam folder.
– In some cases, mail from senders who are not in the address
book will be deleted.
• Blacklist solutions
– A blacklist contains domain names or email addresses of
companies called spammers.
– There is software available that helps you list known SPAM
domains or email addresses; these will be spammed or deleted.
18. • Software solution
– Software solutions have rules or are linked to Internet blacklists
– the software is usually installed on a computer or server.
– Examples of SPAM software solutions include BitDefender, Imail
or Mailwasher, ADWCleaner, ETC.
• Heuristic filters:
– A heuristic filter searches for characteristics, links, words and
phrases commonly used in SPAM.
– There are certain rules which are used in the program to
indicate whether the email is SPAM or not.
• Content Filters
– SPAM can also be indicated by the content of the email or web
page.
– Rules are used to decide whether the content is SPAM or not.
– The subject, attachments, headers, size and body content are
displayed to help decide if it is classified as SPAM
19. LAW AGAINST SPAMMING IN INDIA
PRESENTLY
• the Indian government has not yet enacted a
law that directly addresses the problem of
spam. The existing law in the form of the
Information Technology Act 2000 does not
contain any provision regarding the regulation
of spam, although it does regulate obscenity
covering the publication, transmission or
electronic publication of anything. material
that is obscene or that attracts obscene
people. to interest
20. CONCULSION
• SPAM is a long, frustrating and potentially
harmful Internet plug-in for your computer.
Take note of the ways to prevent SPAM from
cluttering your mailbox. At the same time,
make sure that your site is not seen as spam.