Anti-spam interventions lack the proper mechanism and framework to undertake their campaigns. The understanding of spam advertising lacks proper structure. There are a lot of benefits with the use of spam advertising. Many enterprises are seen to come out of this industry.
This presentation will give a full process and the resources that are used to monetize spam email. This will act to show the extent to which spam email creation has been beneficial in the advertising and the fact that it takes into consideration the enterprise process of starting a business. All the requirements to start a business are considered.
Please go to the next slide.
Most spam mail receivers detest spam mail as they think it is a nuisance to their communication and to their inboxes. This is not the case with the perpetrators of these mails. This is a channel that can be used to market various products and services to the masses. It has been untapped in the past because of the detest and the negative attitude that many people have towards the use of spam advertising.
In many circumstances, the attention is focused on the delivery of the email itself. Less is given and channeled to the whole multi-faceted business empire that exists with the email itself.
There is a business empire that exists with the email itself. In most circumstances, the email is discarded without going into deeper detail of the content of the email. On most circumstances, then the content of the mail is not dealt with in detail.
There are many proofs that show that there is value chain in the spam advertising. There are merchant accounts that have been used to make payments, hosting and proxy services that have been paid for and also the need to have botnet services being secured. All these show that spam chain value is a long process and there is a lot of business activities that are included in the business. These are important elements in eth value chain.
There are a lot of activities which have been taken for granted while analyzing the business that spam-advertising have come with in the internet world. This is the main focus of this paper.
There is limited knowledge on the relationships that exist between the various elements of value chain. The domain name registration, the merchant payments, the payment processors and the legal obligations of these elements leaves a lot of desires.
The analysis of this relationship will give the entrepreneurial activity that exist in the spam advertising industry. The structural dependencies that exist in the industry is not fully looked into because the analysis is a biased one. The weaknesses that exist in the industry is not known and understood.
The path through which the chain take shows the entrepreneurial activity that the perpetrators have mustered capital investments. The chain through which the perpetrators have gone through include registration using name servers, the registrar of the domain names they use, the processing of payments and hosting.
There is a lack of understanding of the value chain and the points that are shared and look valuable in spam advertising. Most organizations lack the knowledge that can be used to learn and understand the operations of the spam advertisement process.
The need to address these issues and concerns in the spam advertisement chain value forms the main objective of this paper. There are many challenges and issues that need to be addressed.
The research make use of the end-to-end dependencies of resources that are used. A methodology will be developed that will characterize the relationships will be developed in order to have a good relationship and development. The research will make use of a methodology that will get data from spam-advertised URLs so that real information and the real value of this spam process can be achieved.
The working of the spam industry is just like any other advertising business. They strive to have their costs less than the revenue to gain profits. Long time ago, they dealt with distribution of emails and designing of websites which could be used in determining the value chain of the spam advertising industry.
The users have experienced the mail part of the spam advertising. This is a small part of the whole process of spam chain. There are many processes that are undertaken in the whole process. There is a need to understand the requirements in this whole process. There are three categories in which the whole process of spam advertising have been shown. These three stages include advertising, click support and realization.
There have been research about the online illegal pharmaceuticals. These are the scholarly work which have been undertaken before to show the extent and the far that spam advertising have been known to operate. Initially, there was research that was undertaken by journalists on the operations of these pharmaceuticals.
Please go to the next slide.
Advertising can be defined as the effort to reach all the potential clients by enticing them to buy a product. This is undertaken by enticing them to click a particular link. After clicking the link, they will be in a position to buy the specified product.
The advertising spam has been researched because users directly experience this type of spam. There are various researches that are being undertaken in email filtering using some tools. This is because email spam is the most common type of spam advertising.
For this reason, there is a lot of ongoing research that is being undertaken that tries to give the strategies and ways of undertaking email spam filtering. The features of the networks that are used by network senders have also been extensively studied. This has been to find out the behavior of these networks. These studies have been undertaken to look for information about botnet memberships.
Spammers wait for someone to click on the URL which has been embedded on the website. When the receiver clicks on a link, they will be directed to the website which the spammer is interested in making profits out of it. For a spammer to make profit out of spamming, they will have to send a lot of spam mails to receivers.
With the domain registrations and security measures which have been put to spamming, there are defense measures which spammers have put in place to prevent these measures. One of the defense mechanisms include redirecting the clicks to some sites. The sites could be owned by the spammers or could be for third-party organizations which are advertising their products.
There will be the need to have name servers when they are undertaking registration. Domain names are required to have name servers which are used to undertake registration.
Modern advertisers work advertisers and no longer manage what takes place behind the value chain. They work as affiliates of online store or other businesses operating online. They usually earn commissions from this.
Realization takes place after the spammer realizes the profits and gets what they wanted from the client. At this stage, they have won the client and made them to purchase the product that they wanted to advertise and sell. This process is a long one as there is a need to have proper measures to realize the profits.
During this stage, the payment processors are aligned so that they serve many clients. After the client has paid for the foods, the spammer and their stores will have to fulfill the request upon the client payment. They will have to physically get the item that the client paid for and ship this item to the client.
In the VIAGRA example, the users get the advertisement of VIAGRA product. When the users click on the link that is embedded, the link resolves and directs it to medicshopnerx.ru. This is the site that is selling the product that is being advertised. The domain of this site was registered by REGRU-REG-RIPN which was still active by the time the analysis was undertaken. The machine that does the hosting is in Brazil while that one which resolves the names is in China.
The browser of the user then starts a request for HTTP and gets the contents that renders the storefront to Pharmacy Express. This brand has close associations with Mailien pharmaceuticals which is an affiliate program that is based in Russia.
After the client clicks on the item they want to purchase, they will click on checkout and will be directed to payment portal payquickonline.com which will be used by the user to make the payments. This is the process that takes place.
Initially, studies were based on the tools that are used to undertake cybercrime. This is changing as many researches that are undertaken currently are done in order to get the cybercrimes economic tools. This is order to understand cybercrime. This is undertaken with the objective to have better ways to undertake intervention of cybercrime.
Some of the earliest work which have been undertaken have wanted to understand the working of underground markets which have been found on stolen credit information which have been stolen.
The research will be undertaken by using message feeds which are full. There will be a need to have URLs which have been embedded so that further research will be undertaken on these harvested URLs.
There is a farm of web crawlers which will be used to assess the interactions of HTTP-levels sessions. Landing pages will also be assessed and enumerated. There will be the use of a clustering tool which will be used to cluster pages basing on eth similarity of their contents.
In the research the data from the feeds that have been specified were from the dates of August 1 2010 to October 31 2010. The embedded URLs during this period is estimated to be around one billion.
Crawler data is important in getting information about the DNS infrastructure that the spammers use. To get this, it would be simple process but complications come in because of complicated fast flux techniques which are used so that they minimize the central points of weaknesses.
The crawler developed in this research would extract both the fully qualified domain names (FQDN) and the suffix of the domain name which has been registered. After all this information has been collected, there will be recursive querying of the domains. The crawler will undertake recursive queries in the quest to get full information regarding the
There is web crawler which is used to capture the experience of the user. The user experience information is captured.
The data that are provided by the crawler tools are low-level. This means that they do not show any business relationships at all. There is a need to process this information so that better results and meaning is obtained from the data. It is important to understand the business value and the result that come from the business.
This study made use of information that was got from three kinds of businesses which include pharmaceuticals, replica and the software industry. These categories were chosen because they are known to be popular with spam-related advertisements.
The classifications of websites is done by comparing the content which are closely and lexically related to each other. Category tagging, on the other hand is used to label sites which have been clustered in order to get the category of the goods which they sell. Program tagging is used to label the clusters and the affiliate program with which they are associated.
In content clustering the grouping of web sites which have similar content is undertaken. This will result in getting websites which have similar information and content. This will use HTML to get the similar data and information which has already been recorded by the crawlers.
There is a need to understand the real operation of the spammers. For this reason, there was a need to have purchases from the different brands and companies which were offering the products. This would help to get the details of the processes that were followed. This resulted in seven sites delivering the goods. Most of the failures to deliver the goods were because of logistical problems. It was not the concern of the sellers but the problem was with the delivery address of the researcher.
There is a need to understand the real operation of the spammers. For this reason, there was a need to have purchases from the different brands and companies which were offering the products. This would help to get the details of the processes that were followed. This resulted in seven sites delivering the goods. Most of the failures to deliver the goods were because of logistical problems. It was not the concern of the sellers but the problem was with the delivery address of the researcher.
In the analysis of the data, it is important to understand the bottlenecks and the challenges that are met in undertaking the process. The infrastructure is also an important aspect that should be assessed to find out if the infrastructure of shared.
Most of the embedded URLs will redirect website users to other sites which will then sell the products. The final domain will be resolved. In the research, 32% of the URLs which were crawled redirected at least once. Such URLs redirected with the use of URL shorteners like bit.ly. Another 9% of the URLs did the redirection using services which are free hosting like angelfire.com.
More focus was given to the final websites and domains instead of the intermediate URLs. This is because a better infrastructure is obtained in the final URL that is arrived.
A site which has spam in it which requires advertising will have to resolve the URL in order to sell the product that is required by the internet users.
The realization pipeline entails many procedures which have to be undertaken. These include the need to have post-communication with the client, the need to have customer feedback. There is also a need to have settlement of credit card transactions and the fulfillment of orders.
Payment makes use of affiliate programs and is the most widely used process when compared to free actors methods. It is a common phenomenon to share the network infrastructure of the network.
Intervention will have to be undertaken in the standpoint of the defender. One of the factors that will be considered when undertaking intervention is the overhead while undertaking intervention.
Another factor is the impact it has on the spam value chain. This means that the spam value chain will be interrupted. This is something which will be affected in the long run.
There is the replacement of the cost and the value that has been foregone. Although it is hard to estimate the cost and the resources which have been interrupted, the research used the data that was obtained to estimate and get the best measurements as much as possible.
In order to calculate and evaluate the extent and the cost of interruptions that have been caused in the spam value chain, it is important to understand the relative volume that they were in the volume that the researcher had. After this, the fraction of these trajectories that would be blocked from operations will be computed.
The effects of the registrars suspending their domains that were used in hosting the spam advertisements is also calculated.
It is also important to look at the Ass which would be contacted and would be willing to shut down the hosts that had spam trajectories in their networks. In this research, both the name server and the website server were considered.
The most critical element of the spam value chain is the bank. This is the least studied in researches. This is, however, the most critical when undertaking payments. There was a need to have purchases from the different brands and companies which were offering the products. This would help to get the details of the processes that were followed. This resulted in seven sites delivering the goods.