Skip to main content

Leveraging Behavior Diversity to Detect Spammers in Online Social Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9530))

Abstract

Online social networks have become very popular and convenient for communication. However, spammers often take control of accounts to create and propagate attacks using messages and URLs. Most existing studies to detect spammers are based on machine learning methods. Features are the key factors considered in these methods, and most documented features in existing studies can be evaded by spammers. In this study, we propose behavior features, which are based on behavior diversity when sending messages, combined with existing effective features, to build a detection system. We leverage entropy to present differences in behavior diversity between spammers and normal accounts. In the cases of evasion by periodically changing a behavior model in the sending of messages by spammers, we also introduce conditional entropy, which is calculated based on the Markov model. To achieve our goal, we have collected information from approximately 489,451 accounts including 108,168,675 corresponding messages from Sina Weibo. Through evaluation of our detection methods, the accuracy rate of this system is approximately 91.5 %, and the false positive rate is approximately 3.4 %.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ciw team: Weibo had 167m monthly active users in q3 (2014). http://www.chinainternetwatch.com/10735/weibo-q3-2014

  2. Yang, C., Harkreader, R., Guofei, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280–1293 (2013)

    Article  Google Scholar 

  3. Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1–9. ACM (2010)

    Google Scholar 

  4. Grier, C., Thomas, K., Paxson, V., Zhang, M.: @ spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 27–37. ACM (2010)

    Google Scholar 

  5. Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 243–258. ACM (2011)

    Google Scholar 

  6. Almaatouq, A., Alabdulkareem, A., Nouh, M., Shmueli, E., Alsaleh, M., Singh, V.K., Alarifi, A., Alfaris, A., Pentland, A.S.: Twitter: who gets caught? observed trends in social micro-blogging spam. In: Proceedings of the 2014 ACM Conference on Web Science, pp. 33–41. ACM (2014)

    Google Scholar 

  7. Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st International Conference on World Wide Web, pp. 71–80. ACM (2012)

    Google Scholar 

  8. Zhang, Y., Ruan, X., Wang, H., Wang, H.: What scale of audience a campaign can reach in what price on twitter? In: INFOCOM, 2014 Proceedings IEEE, pp. 1168–1176. IEEE (2014)

    Google Scholar 

  9. Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: COMPA: detecting compromised accounts on social networks. In: NDSS (2013)

    Google Scholar 

  10. Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Secure Comput. 9(6), 811–824 (2012)

    Article  Google Scholar 

  11. Gao, H., Hu, J., J., Wilson, J., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35–47. ACM (2010)

    Google Scholar 

  12. Tan, E., Guo, L., Chen, S., Zhang, X., Zhao, Y.: Unik: unsupervised social network spam detection. In: Proceedings of the 22nd ACM International Conference on Conference on Information and Knowledge Management, pp. 479–488. ACM (2013)

    Google Scholar 

  13. Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.N.: Towards online spam filtering in social networks. In: NDSS (2012)

    Google Scholar 

  14. Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992–3000 (2013)

    Article  Google Scholar 

  15. Sina weibo api. http://open.weibo.com/

  16. Google safe browsing api. https://developers.google.com/safe-browsing/?hl=zh-CN

  17. Virustotal. https://www.virustotal.com/

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grant No. 61170265 and Grant No.61472162.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiang Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Cao, J., Fu, Q., Li, Q., Guo, D. (2015). Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27137-8_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27136-1

  • Online ISBN: 978-3-319-27137-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics