ISSN 1000-1239 CN 11-1777/TP

• Paper •     Next Articles

Research on Countermeasures Against Tag Spam

Wang Yonggang1, Yan Hanbing1, Xu Junfeng1, Hu Jianbin2,3, and Chen Zhong2,3   

  1. 1(National Computer Emergency Response Team and Coordination Center of China, Beijing 100029) 2(Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of Education, Beijing 100871) 3(Software Institute, School of Electronics Engineering and Computer Science, Peking University, Beijing 100871)
  • Online:2013-10-15

Abstract: As one of the most popular Internet applications, it is relatively easy for tagging systems to become the targets of malicious attackers. In a tagging system, malicious users always annotate resources with tag spam for some reason, thereby misleading normal users from searching and sharing those resources. Existing work has already shown that the defense effect of tag spam would directly influence the quality of services provided by tagging systems. Based on this background, through investigating some existing research efforts, this paper gives the formal descriptions of attack styles, and summarizes and extracts the existing three types of methods to defend against tag spam: detection-based method, demotion-based method, and prevention-based method. As to each type of method, this paper further describes corresponding implementing algorithms in detail, and analyzes their advantages and disadvantages, such as efficiency and availability. At the end of this paper, the authors also exhibit the future research directions of defending against tag spam. According to the description of countermeasures against tag spam, this paper can help readers or beginners to get familiar with the situation of this new research field and help researchers to think out more and more novel, practical and effective countermeasures against tag spam.

Key words: tagging system, tag spam, countermeasures, tagging service, social network