ABSTRACT
Spam in Online Social Networks (OSNs) is a systemic problem that imposes a threat to these services in terms of undermining their value to advertisers and potential investors, as well as negatively affecting users' engagement. In this work, we present a unique analysis of spam accounts in OSNs viewed through the lens of their behavioral characteristics (i.e., profile properties and social interactions). Our analysis includes over 100 million tweets collected over the course of one month, generated by approximately 30 million distinct user accounts, of which over 7% are suspended or removed due to abusive behaviors and other violations. We show that there exist two behaviorally distinct categories of twitter spammers and that they employ different spamming strategies. The users in these two categories demonstrate different individual properties as well as social interaction patterns. As the Twitter spammers continuously keep creating newer accounts upon being caught, a behavioral understanding of their spamming behavior will be vital in the design of future social media defense mechanisms.
- A. Almaatouq, F. Alhasoun, R. Campari, and A. Alfaris. The influence of social norms on synchronous versus asynchronous communication technologies. In Proceedings of the 1st ACM International Workshop on Personal Data Meets Distributed Multimedia, PDM '13, pages 39-42, New York, NY, USA, 2013. ACM. Google ScholarDigital Library
- Y. Altshuler, N. Aharony, A. Pentland, Y. Elovici, and M. Cebrian. Stealing reality: When criminals become data scientists (or vice versa). IEEE Intelligent Systems, 26(6):22--30, 2011. Google ScholarDigital Library
- F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on Twitter. In Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), July 2010.Google Scholar
- J. Borondo, A. J. Morales, J. C. Losada, and R. M. Benito. Characterizing and modeling an electoral campaign in the context of Twitter: 2011 Spanish Presidential election as a case study. Chaos: An Interdisciplinary Journal of Nonlinear Science, 22(2), 2012.Google Scholar
- U. Brandes. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology, 25:163--177, 2001.Google ScholarCross Ref
- S. Chhabra, A. Aggarwal, F. Benevenuto, and P. Kumaraguru. Phi.sh/$ocial: The phishing landscape through short urls. In Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS '11, pages 92--101, New York, NY, USA, 2011. ACM. Google ScholarDigital Library
- A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. SIAM Rev., 51(4):661--703, Nov. 2009. Google ScholarDigital Library
- M. Conover, J. Ratkiewicz, M. Francisco, B. Gonçalves, A. Flammini, and F. Menczer. Political polarization on twitter. In Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM), 2011.Google Scholar
- M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. COMPA: Detecting Compromised Accounts on Social Networks. In ISOC Network and Distributed System Security Symposium (NDSS), 2013.Google Scholar
- L. C. Freeman. A Set of Measures of Centrality Based on Betweenness. Sociometry, 40(1):35--41, Mar. 1977.Google ScholarCross Ref
- S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twitter social network. In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages 61--70, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- GlobalWebIndex. Global web index: Q4 2012, 2013.Google Scholar
- S. González-Bailón, J. Borge-Holthoefer, A. Rivero, and Y. Moreno. The dynamics of protest recruitment through an online network.Google Scholar
- C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The underground on 140 characters or less. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pages 27--37, New York, NY, USA, 2010. ACM. Google ScholarDigital Library
- S. Kato, A. Koide, T. Fushimi, K. Saito, and H. Motoda. Network analysis of three twitter functions: Favorite, follow and mention. In D. Richards and B. Kang, editors, Knowledge Management and Acquisition for Intelligent Systems, volume 7457 of Lecture Notes in Computer Science, pages 298--312. Springer Berlin Heidelberg, 2012. Google ScholarDigital Library
- C. Lumezanu, N. Feamster, and H. Klein. bias: Measuring the tweeting behavior of propagandists. In ICWSM, 2012.Google Scholar
- A. Marcus, M. S. Bernstein, O. Badar, D. R. Karger, S. Madden, and R. C. Miller. Twitinfo: Aggregating and visualizing microblogs for event exploration. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, pages 227--236, New York, NY, USA, 2011. ACM. Google ScholarDigital Library
- M. McCord and M. Chuah. Spam detection on twitter using traditional classifiers. In Proceedings of the 8th international conference on Autonomic and trusted computing, ATC'11, pages 175--186, Berlin, Heidelberg, 2011. Springer-Verlag. Google ScholarDigital Library
- F. Morstatter, J. Pfeffer, H. Liu, and K. M. Carley. Is the sample good enough? comparing data from Twitter's streaming API with Twitter's Firehose. Proceedings of ICWSM, 2013.Google Scholar
- M. E. J. Newman. Power laws, pareto distributions and zipf's law. Contemporary Physics, 46:323--351, December 2005.Google ScholarCross Ref
- H. Nguyen. 2013 state of social media spam. Technical report, Nexgate, 2013.Google Scholar
- A. Sanzgiri, A. Hughes, and S. Upadhyaya. Analysis of malware propagation in twitter. Reliable Distributed Systems, IEEE Symposium on, 0:195--204, 2013. Google ScholarDigital Library
- G. Stringhini, M. Egele, C. Kruegel, and G. Vigna. Poultry markets: On the underground economy of twitter followers. In Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks, WOSN '12, pages 1--6, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10, page 1, 2010. Google ScholarDigital Library
- M. Thelwall, K. Buckley, and G. Paltoglou. Sentiment in twitter events. J. Am. Soc. Inf. Sci. Technol., 62(2):406--418, Feb. 2011. Google ScholarDigital Library
- K. Thomas, C. Grier, and V. Paxson. Adapting Social Spam Infrastructure for Political Censorship. In Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Apr. 2012. Google ScholarDigital Library
- K. Thomas, C. Grier, D. Song, and V. Paxson. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pages 243--258, New York, NY, USA, 2011. ACM. Google ScholarDigital Library
- K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse. In Proceedings of the 22nd Usenix Security Symposium, 2013. Google ScholarDigital Library
- Twitter. Following rules and best practices. https://support.twitter.com/articles/68916-following-rules-and-best-practices, 2012. {Online; accessed 22-October-2013}.Google Scholar
- Twitter. Public stream. https://dev.twitter.com/docs/streaming-apis/, 2012. {Online; accessed 1-October-2013}.Google Scholar
- Twitter. Rules. https://support.twitter.com/ articles/18311-the-twitter-rules, 2012. {Online; accessed 1-October-2013}.Google Scholar
- Twitter. Initial public offering of shares of common stock of twitter, inc. http://www.sec.gov/Archives/edgar/ data/1418091/000119312513390321/d564001ds1.htm, 2013. {Online; accessed 5-October-2013}.Google Scholar
- A. H. Wang. Don't follow me: Spam detection in twitter. In Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pages 1--10, 2010.Google Scholar
- G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. J. Metzger, H. Zheng, and B. Y. Zhao. Social turing tests: Crowdsourcing sybil detection. In NDSS. The Internet Society, 2013.Google Scholar
- Y. Xie, F. Yu, Q. Ke, M. Abadi, E. Gillum, K. Vitaldevaria, J. Walter, J. Huang, and Z. M. Mao. Innocent by association: Early recognition of legitimate users. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 353--364, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- C. Yang, R. Harkreader, and G. Gu. Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In R. Sommer, D. Balzarotti, and G. Maier, editors, Recent Advances in Intrusion Detection, volume 6961 of Lecture Notes in Computer Science, pages 318--337. Springer Berlin Heidelberg, 2011. Google ScholarDigital Library
- C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web, WWW '12, pages 71--80, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- C. M. Zhang and V. Paxson. Detecting and analyzing automated activity on twitter. In Proceedings of the 12th international conference on Passive and active measurement, PAM'11, pages 102--111, Berlin, Heidelberg, 2011. Springer-Verlag. Google ScholarDigital Library
Index Terms
- Twitter: who gets caught? observed trends in social micro-blogging spam
Recommendations
Suspended accounts in retrospect: an analysis of twitter spam
IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conferenceIn this study, we examine the abuse of online social networks at the hands of spammers through the lens of the tools, techniques, and support infrastructure they rely upon. To perform our analysis, we identify over 1.1 million accounts suspended by ...
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
Spam in online social networks (OSNs) is a systemic problem that imposes a threat to these services in terms of undermining their value to advertisers and potential investors, as well as negatively affecting users' engagement. As spammers continuously ...
Think Before RT: An Experimental Study of Abusing Twitter Trends
Social InformaticsAbstractTwitter is one of the most influential Online Social Networks (OSNs), adopted not only by hundreds of millions of users but also by public figures, organizations, news media, and official authorities. One of the factors contributing to this ...
Comments