Combating spam in tagging systems: An evaluation
G Koutrika, FA Effendi, Z Gyöngyi, P Heymann… - ACM Transactions on …, 2008 - dl.acm.org
ACM Transactions on the Web (TWEB), 2008•dl.acm.org
Tagging systems allow users to interactively annotate a pool of shared resources using
descriptive strings called tags. Tags are used to guide users to interesting resources and
help them build communities that share their expertise and resources. As tagging systems
are gaining in popularity, they become more susceptible to tag spam: misleading tags that
are generated in order to increase the visibility of some resources or simply to confuse
users. Our goal is to understand this problem better. In particular, we are interested in …
descriptive strings called tags. Tags are used to guide users to interesting resources and
help them build communities that share their expertise and resources. As tagging systems
are gaining in popularity, they become more susceptible to tag spam: misleading tags that
are generated in order to increase the visibility of some resources or simply to confuse
users. Our goal is to understand this problem better. In particular, we are interested in …
Tagging systems allow users to interactively annotate a pool of shared resources using descriptive strings called tags. Tags are used to guide users to interesting resources and help them build communities that share their expertise and resources. As tagging systems are gaining in popularity, they become more susceptible to tag spam: misleading tags that are generated in order to increase the visibility of some resources or simply to confuse users. Our goal is to understand this problem better. In particular, we are interested in answers to questions such as: How many malicious users can a tagging system tolerate before results significantly degrade? What types of tagging systems are more vulnerable to malicious attacks? What would be the effort and the impact of employing a trusted moderator to find bad postings? Can a system automatically protect itself from spam, for instance, by exploiting user tag patterns? In a quest for answers to these questions, we introduce a framework for modeling tagging systems and user tagging behavior. We also describe a method for ranking documents matching a tag based on taggers' reliability. Using our framework, we study the behavior of existing approaches under malicious attacks and the impact of a moderator and our ranking method.
ACM Digital Library