Abstract
Online dating sites are experiencing a rise in popularity, with one in five relationships in the United States starting on one of these sites. Online dating sites provide a valuable platform not only for single people trying to meet a life partner, but also for cybercriminals, who see in people looking for love easy victims for scams. Such scams span from schemes similar to traditional advertisement of illicit services or goods (i.e., spam) to advanced schemes, in which the victim starts a long-distance relationship with the scammer and is eventually extorted money.
In this paper we perform the first large-scale study of online dating scams. We analyze the scam accounts detected on a popular online dating site over a period of eleven months, and provide a taxonomy of the different types of scammers that are active in the online dating landscape. We show that different types of scammers target a different demographics on the site, and therefore set up accounts with different characteristics. Our results shed light on the threats associated to online dating scams, and can help researchers and practitioners in developing effective countermeasures to fight them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The data about the users of Jiayuan was collected according to the company’s privacy policy and it was only accessed by two of the authors of this paper, who were Jiayuan employees at the time the research was conducted. The authors external to Jiayuan did not access any personal or sensitive information about any user on the online dating site, but instead worked with aggregated statistics.
- 2.
Note that this number takes into accounts also those accounts that never received a message at all on the site.
References
Jiayuan. http://www.jiayuan.com/
eHarmony (2013). http://www.eharmony.com
OkCupid (2013). http://www.okcupid.com
Online dating sites pricing (2013). http://www.nextadvisor.com/online_dating/compare.php
Online Dating Statistics 2013. http://www.statisticbrain.com/online-dating-statistics/
Afroz, S., Brennan, M., Greenstadt, R.: Detecting hoaxes, frauds, and deception in writing style online. In IEEE Symposium on Security and Privacy (2012)
Baltazar, J., Costoya, J., Flores, R.: KOOBFACE: the largest web 2.0 botnet explained. Trend Micro Threat Research (2009)
Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Conference on Email and Anti-spam (CEAS) (2010)
Cai, Z., Jermaine, C.: The latent community model for detecting sybils in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)
Cao, Y., Yegneswaran, V., Possas, P., Chen, Y.: PathCutter: severing the self-propagation path of XSS javascript worms in social web networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)
Chen, L., Nayak, R.: Social network analysis of an online dating network. In: Proceedings of the 5th International Conference on Communities and Technologies (2011)
Drucker, H., Wu, D., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 988–999 (1999)
Dyrud, M.A.: “I brought you a good news”: an analysis of nigerian 419 letters. In: Association for Business Communication Annual Convention (2005)
Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: Compa: detecting compromised accounts on social networks. In: Symposium on Network and Distributed System Security (NDSS) (2013)
Fiore, A., Tresolini, R.: Romantic regressions: an analysis of behavior in online dating systems. Ph.D. thesis, Massachusetts Institute of Technology (2004)
Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards Online spam filtering in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)
Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.: Detecting and characterizing social spam campaigns. In: Internet Measurement Conference (IMC) (2010)
Gao, Y., Zhao, G.: Knowledge-based information extraction: a case study of recognizing emails of nigerian frauds. In: Montoyo, A., Muńoz, R., Métais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 161–172. Springer, Heidelberg (2005)
Glickman, H.: The nigerian "419" advance fee scams: prank or peril? Can. J. Afr. Stud. 39(3), 460–89 (2005)
Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: ACM Conference on Computer and Communications Security (CCS) (2010)
Hao, S., Syed, N.A., Feamster, N., Gray, A.G., Krasser, S.: Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. In: USENIX Security Symposium (2009)
Herley, C.: Why do Nigerian scammers say they are from Nigeria? In: Workshop on the Economics of Information Security (WEIS) (2012)
Hitsch, G.J., Hortacsu, A., Ariely, D.: What makes you click: an empirical analysis of online dating. Society for Economic Dynamics Meeting Papers (2005)
Isacenkova, J., Thonnard, O., Costin, A., Balzarotti, D., Francillon, A.: Inside the SCAM jungle: a closer look at 419 scam email operations. In: International Workshop on Cyber Crime (IWCC) (2013)
Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: International ACM SIGIR Conference on Research and Development in Information Retrieval (2010)
Park, Y., Jones, J., McCoy, D., Shi, E., Jakobsson, M.: Scambaiter: understanding targeted nigerian scams on craigslist. In: Symposium on Network and Distributed System Security (NDSS) (2014)
Pitsillidis, A., Levchenko, K., Kreibich, C., Kanich, C., Voelker, G.M., Paxson, V., Weaver, N., Savage, S.: Botnet judo: fighting spam with itself. In: Symposium on Network and Distributed System Security (NDSS) (2010)
Pizzato, L.A., Akehurst, J., Silvestrini, C., Yacef, K., Koprinska, I., Kay, J.: The effect of suspicious profiles on people recommenders. In: Masthoff, J., Mobasher, B., Desmarais, M.C., Nkambou, R. (eds.) UMAP 2012. LNCS, vol. 7379, pp. 225–236. Springer, Heidelberg (2012)
Rege, A.: What’s love got to do with it? Exploring online dating scams and identity fraud. Int. J. Cyber Criminol. 3(2), 494–512 (2009)
Sahami, M., Dumais, S., Heckermann, D., Horvitz, E.: A Bayesian approach to filtering junk e-mail. Learning for Text Categorization (1998)
Stringhini, G., Holz, T., Stone-Gross, B., Kruegel, C., Vigna, G.: BotMagnifier: locating spambots on the Internet. In: USENIX Security Symposium (2011)
Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Annual Computer Security Applications Conference (ACSAC) (2010)
Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y.: Follow the green: growth and dynamics in twitter follower markets. In: ACM SIGCOMM Conference on Internet Measurement (2013)
Symantec Corp. Symantec intelligence report (2013). http://www.symanteccloud.com/mlireport/SYMCINT_2013_01_January.pdf
Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., Zhao, B.Y.: Social turing tests: crowdsourcing sybil detection. In: Symposium on Network and Distributed System Security (NDSS) (2013)
Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf: crowdturfing for fun and profit. In: Wold Wide Web Conference (WWW) (2012)
Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychology Behav. Soc. Netw. 15(3), 181–183 (2012)
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. SIGCOMM Comput. Commun. Rev. 38, 171–182 (2008)
Xu, W., Zhang, F., Zhu, S.: Toward worm detection in online social networks. In: Annual Computer Security Applications Conference (ACSAC) (2010)
Yang, B., Gu, F., Niu, X.: Block mean value based image perceptual hashing. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2006)
Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318–337. Springer, Heidelberg (2011)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 40(4), 363–374 (2006)
Zhang, C.M., Paxson, V.: Detecting and analyzing automated activity on twitter. In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol. 6579, pp. 102–111. Springer, Heidelberg (2011)
Acknowledgments
We thank the anonymous reviewers for their comments. We would also like to thank Ali Zand, Adam Doupé, Alexandros Kapravelos, Ben Y. Zhao, and Christo Wilson for reviewing an early draft of this paper. Your feedback was highly appreciated.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Huang, J., Stringhini, G., Yong, P. (2015). Quit Playing Games with My Heart: Understanding Online Dating Scams. In: Almgren, M., Gulisano, V., Maggi, F. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2015. Lecture Notes in Computer Science(), vol 9148. Springer, Cham. https://doi.org/10.1007/978-3-319-20550-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-20550-2_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-20549-6
Online ISBN: 978-3-319-20550-2
eBook Packages: Computer ScienceComputer Science (R0)