Click Trajectories: End-to-end analysis of the spam value chain
interesting analysis of the world of spam
Click Trajectories: End-to-end analysis of the spam value chain – Levchenko et al. IEEE Symposium on Security and Privacy, 2011
This week we’re going to be looking at some of the less desirable corners of the internet: spam, malvertisements, click-jacking, typosquatting, and friends. To kick things off, today’s paper gives an insight into the end-to-end spam value chain. If we really want to stop spam it turns out, talk to the banks…
As an advertising medium, spam ultimately shares the underlying business model of all advertising. So long as the revenue driven by spam campaigns exceeds their cost, spam remains a profitable enterprise. This glib description belies the complexity of the modern spam business…
How does spam work?
There’s much more to spam than just the email! There are three key stages – advertising, click support, and realization – supported by a whole value chain.
Advertising concerns how…
View original post 1,531 more words