Skip to main content
Log in

Towards fast and lightweight spam account detection in mobile social networks through fog computing

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Now, mobile devices play an increasingly important role in social networks by sharing information quickly, such as mobile phones and wearable health surveillance devices. Mobile social networks are vulnerable to spammers because of the fragile security policies of mobile operating systems. Especially, social networks on mobile devices face many difficulties in defending against spammers due to their low computing power, poor network quality and long response time. Since graph-based algorithms require huge computing power, machine-learning classifiers require very short response time, and existing PC-based research is not suitable for mobile devices, we need a lightweight and fast response method for mobile devices to detect spammers in mobile social networks. Regarded as the extension of cloud computing, fog computing puts the data, data processing and applications in the devices that are at the edge of the Internet (without storing all of them in the cloud), which leads to a better real-time performance, adapts to the wide geographical distribution and the high mobility of mobile devices. In this paper, we propose COLOR + , a method based on fog computing that performs most computations at terminal (mobile devices). It only uses the interaction between the account and its neighbors, which makes it easy to store and calculate a local graph on a mobile device. Each interaction value can be applied to any request. COLOR + detects spammers based on a threshold of the suspicion degree. We collect 50 million normal accounts and about 40,000 spammers from Twitter. Experiments show that the accuracy of COLOR + is about 85.95%, whose average time to detect an account is 0.01s. Therefore, COLOR + is an effective detection method that can be quickly applied.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Dong M, Ota K, Rmer AL (2016) Reliable and energy-efficient data collection for large-scale wireless sensor networks. IEEE Int Things J 3(4):511–519

    Article  Google Scholar 

  2. (2016). Digital, social and mobile worldwide in 2015. http://wearesocial.com/uk/special-reports/digital-social-mobile-worldwide-2015

  3. (2016). Mobile twitter: 164m+ (75%) access from handheld devices monthly, 65% of ad sales come from mobile. http://techcrunch.com/2013/10/03/mobile-twitter-161m-access-from-handheld-devices-each-month-65-of-ad-revenues-coming-from-mobile/

  4. Lee S, Warningbird JK (2012) Detecting suspicious urls in twitter stream NDSS

    Google Scholar 

  5. (2016). Fighting spam with botmaker. https://blog.twitter.com/2014/fighting-spam-with-botmaker

  6. Ghosh S, Viswanath B, Kooti F, Sharma NK, Korlam G, Benevenuto F, Ganguly N, Gummadi KP (2012) Understanding and combating link farming in the twitter social network Proceedings of the 21st international conference on world wide web, pp 61–70

    Chapter  Google Scholar 

  7. Cao Q, Sirivianos M, Yang X, Pregueiro T (2012) Aiding the detection of fake accounts in large scale social online services Presented as part of the 9th USENIX symposium on networked systems design and implementation (NSDI 12), pp 197–210

    Google Scholar 

  8. Boshmaf Y, Logothetis D, Siganos G, Jorge L, Lorenzo J, Ripeanu M, Beznosov K (2015) Integro: Leveraging victim prediction for robust fake account detection in osns NDSS, vol 15. Citeseer, pp 8–11

  9. Wei W, Fengyuan X, Tan CC, Sybildefender QL (2012) Defend against sybil attacks in large social networks INFOCOM, 2012 Proceedings IEEE, pp 1951–1959

    Chapter  Google Scholar 

  10. Haifeng Y, Kaminsky M, Gibbons PB, Flaxman A (2006) Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267–278

    Article  Google Scholar 

  11. Haifeng Y, Gibbons PB, Kaminsky M, Sybillimit FX (2008) A near-optimal social network defense against sybil attacks Security and privacy, 2008. SP 2008. IEEE symposium on, pp 3–17

    Google Scholar 

  12. Danezis G, Mittal P Sybilinfer: Detecting sybil nodes using social networks NDSS. San Diego, CA, p 2009

  13. Tran N, Li J, Subramanian L, Chow SSM (2011) Optimal sybil-resilient node admission control INFOCOM, 2011 Proceedings IEEE, pp 3218–3226

    Chapter  Google Scholar 

  14. Cao Qiang, Yang Xiaowei, Jieqi Y u, Palow Christopher (2014) Uncovering large groups of active Malicious accounts in online social networks Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 477–488

  15. Huang J, Xie Y, Fang Y, Ke Q, Abadi M, Gillum E, Morley Mao Z (2013) Socialwatch: detection of online service abuse via large-scale social graphs Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, pp 143–148

    Google Scholar 

  16. Wang G, Konolige T, Wilson C, Wang X, Zheng H, Zhao BY (2013) You are how you click: Clickstream analysis for sybil detection Proc. USENIX security. Citeseer, pp 1–15

  17. Viswanath B, Ahmad Bashir M, Crovella M, Guha S, Gummadi KP, Krishnamurthy B, Mislove A (2014) Towards detecting anomalous user behavior in online social networks 23Rd USENIX security symposium (USENIX security 14), pp 223–238

    Google Scholar 

  18. Gao H, Chen Y, Lee K, Palsetia D, Choudhary AN (2012) Towards online spam filtering in social networks NDSS

  19. Zhang Y, Ruan X, Wang H, Wang H (2014) What scale of audience a campaign can reach in what price on twitter? INFOCOM, 2014 Proceedings IEEE, pp 1168–1176

    Google Scholar 

  20. Stein T, Chen E, Mangla K (2011) Facebook immune system Proceedings of the 4th workshop on social network systems, p 8

    Google Scholar 

  21. Yang C, Harkreader R, Gu G (2013) Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans Inf Forensics Secur 8(8):1280–1293

    Article  Google Scholar 

  22. Lee S, Jong K (2012) Warningbird: Detecting suspicious urls in twitter stream NDSS

    Google Scholar 

  23. Egele M, Stringhini G, Kruegel C, Giovanni V (2013) Compa: Detecting compromised accounts on social networks NDSS

    Google Scholar 

  24. De W, Navathe SB, Liu L, Irani D, Tamersoy A, Calton P u (2013) Click traffic analysis of short url spam on twitter Collaborative computing: networking, Applications and Worksharing (Collaboratecom), 2013 9th International Conference Conference on, pp 250–259

    Google Scholar 

  25. Thomas K, Grier C, Ma J, Paxson V, Song D (2011) Design and evaluation of a real-time url spam filtering service Security and privacy (SP), 2011 IEEE symposium on, pp 447–462

    Chapter  Google Scholar 

  26. Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y (2014) Uncovering social network sybils in the wild. ACM Trans Knowl Discov Data (TKDD) 8(1):2

    Google Scholar 

  27. Yang C, Zhang J, Guofei G (2014) A taste of tweets: reverse engineering twitter spammers Proceedings of the 30th annual computer security applications conference, pp 86–95

    Google Scholar 

  28. Cha M, Haddadi H, Benevenuto F, Gummadi PK (2010) Measuring user influence in twitter The million follower fallacy. ICWSM 10(10–17):30

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grant No.61472162.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong Guo.

Additional information

This article is part of the Topical Collection: Special Issue on Fog Computing on Wheels

Guest Editors: Hongzi Zhu, Tom H. Luan, Mianxiong Dong, and Peng Cheng

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, J., Li, Q., Wang, X. et al. Towards fast and lightweight spam account detection in mobile social networks through fog computing. Peer-to-Peer Netw. Appl. 11, 778–792 (2018). https://doi.org/10.1007/s12083-017-0559-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0559-3

Keywords

Navigation