skip to main content
10.1145/2615569.2615688acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Twitter: who gets caught? observed trends in social micro-blogging spam

Authors Info & Claims
Published:23 June 2014Publication History

ABSTRACT

Spam in Online Social Networks (OSNs) is a systemic problem that imposes a threat to these services in terms of undermining their value to advertisers and potential investors, as well as negatively affecting users' engagement. In this work, we present a unique analysis of spam accounts in OSNs viewed through the lens of their behavioral characteristics (i.e., profile properties and social interactions). Our analysis includes over 100 million tweets collected over the course of one month, generated by approximately 30 million distinct user accounts, of which over 7% are suspended or removed due to abusive behaviors and other violations. We show that there exist two behaviorally distinct categories of twitter spammers and that they employ different spamming strategies. The users in these two categories demonstrate different individual properties as well as social interaction patterns. As the Twitter spammers continuously keep creating newer accounts upon being caught, a behavioral understanding of their spamming behavior will be vital in the design of future social media defense mechanisms.

References

  1. A. Almaatouq, F. Alhasoun, R. Campari, and A. Alfaris. The influence of social norms on synchronous versus asynchronous communication technologies. In Proceedings of the 1st ACM International Workshop on Personal Data Meets Distributed Multimedia, PDM '13, pages 39-42, New York, NY, USA, 2013. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Y. Altshuler, N. Aharony, A. Pentland, Y. Elovici, and M. Cebrian. Stealing reality: When criminals become data scientists (or vice versa). IEEE Intelligent Systems, 26(6):22--30, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on Twitter. In Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), July 2010.Google ScholarGoogle Scholar
  4. J. Borondo, A. J. Morales, J. C. Losada, and R. M. Benito. Characterizing and modeling an electoral campaign in the context of Twitter: 2011 Spanish Presidential election as a case study. Chaos: An Interdisciplinary Journal of Nonlinear Science, 22(2), 2012.Google ScholarGoogle Scholar
  5. U. Brandes. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology, 25:163--177, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Chhabra, A. Aggarwal, F. Benevenuto, and P. Kumaraguru. Phi.sh/$ocial: The phishing landscape through short urls. In Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS '11, pages 92--101, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. SIAM Rev., 51(4):661--703, Nov. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Conover, J. Ratkiewicz, M. Francisco, B. Gonçalves, A. Flammini, and F. Menczer. Political polarization on twitter. In Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM), 2011.Google ScholarGoogle Scholar
  9. M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. COMPA: Detecting Compromised Accounts on Social Networks. In ISOC Network and Distributed System Security Symposium (NDSS), 2013.Google ScholarGoogle Scholar
  10. L. C. Freeman. A Set of Measures of Centrality Based on Betweenness. Sociometry, 40(1):35--41, Mar. 1977.Google ScholarGoogle ScholarCross RefCross Ref
  11. S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twitter social network. In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages 61--70, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. GlobalWebIndex. Global web index: Q4 2012, 2013.Google ScholarGoogle Scholar
  13. S. González-Bailón, J. Borge-Holthoefer, A. Rivero, and Y. Moreno. The dynamics of protest recruitment through an online network.Google ScholarGoogle Scholar
  14. C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The underground on 140 characters or less. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pages 27--37, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Kato, A. Koide, T. Fushimi, K. Saito, and H. Motoda. Network analysis of three twitter functions: Favorite, follow and mention. In D. Richards and B. Kang, editors, Knowledge Management and Acquisition for Intelligent Systems, volume 7457 of Lecture Notes in Computer Science, pages 298--312. Springer Berlin Heidelberg, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Lumezanu, N. Feamster, and H. Klein. bias: Measuring the tweeting behavior of propagandists. In ICWSM, 2012.Google ScholarGoogle Scholar
  17. A. Marcus, M. S. Bernstein, O. Badar, D. R. Karger, S. Madden, and R. C. Miller. Twitinfo: Aggregating and visualizing microblogs for event exploration. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, pages 227--236, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. McCord and M. Chuah. Spam detection on twitter using traditional classifiers. In Proceedings of the 8th international conference on Autonomic and trusted computing, ATC'11, pages 175--186, Berlin, Heidelberg, 2011. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. F. Morstatter, J. Pfeffer, H. Liu, and K. M. Carley. Is the sample good enough? comparing data from Twitter's streaming API with Twitter's Firehose. Proceedings of ICWSM, 2013.Google ScholarGoogle Scholar
  20. M. E. J. Newman. Power laws, pareto distributions and zipf's law. Contemporary Physics, 46:323--351, December 2005.Google ScholarGoogle ScholarCross RefCross Ref
  21. H. Nguyen. 2013 state of social media spam. Technical report, Nexgate, 2013.Google ScholarGoogle Scholar
  22. A. Sanzgiri, A. Hughes, and S. Upadhyaya. Analysis of malware propagation in twitter. Reliable Distributed Systems, IEEE Symposium on, 0:195--204, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. G. Stringhini, M. Egele, C. Kruegel, and G. Vigna. Poultry markets: On the underground economy of twitter followers. In Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks, WOSN '12, pages 1--6, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10, page 1, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Thelwall, K. Buckley, and G. Paltoglou. Sentiment in twitter events. J. Am. Soc. Inf. Sci. Technol., 62(2):406--418, Feb. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K. Thomas, C. Grier, and V. Paxson. Adapting Social Spam Infrastructure for Political Censorship. In Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Apr. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. K. Thomas, C. Grier, D. Song, and V. Paxson. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pages 243--258, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse. In Proceedings of the 22nd Usenix Security Symposium, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Twitter. Following rules and best practices. https://support.twitter.com/articles/68916-following-rules-and-best-practices, 2012. {Online; accessed 22-October-2013}.Google ScholarGoogle Scholar
  30. Twitter. Public stream. https://dev.twitter.com/docs/streaming-apis/, 2012. {Online; accessed 1-October-2013}.Google ScholarGoogle Scholar
  31. Twitter. Rules. https://support.twitter.com/ articles/18311-the-twitter-rules, 2012. {Online; accessed 1-October-2013}.Google ScholarGoogle Scholar
  32. Twitter. Initial public offering of shares of common stock of twitter, inc. http://www.sec.gov/Archives/edgar/ data/1418091/000119312513390321/d564001ds1.htm, 2013. {Online; accessed 5-October-2013}.Google ScholarGoogle Scholar
  33. A. H. Wang. Don't follow me: Spam detection in twitter. In Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pages 1--10, 2010.Google ScholarGoogle Scholar
  34. G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. J. Metzger, H. Zheng, and B. Y. Zhao. Social turing tests: Crowdsourcing sybil detection. In NDSS. The Internet Society, 2013.Google ScholarGoogle Scholar
  35. Y. Xie, F. Yu, Q. Ke, M. Abadi, E. Gillum, K. Vitaldevaria, J. Walter, J. Huang, and Z. M. Mao. Innocent by association: Early recognition of legitimate users. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 353--364, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. C. Yang, R. Harkreader, and G. Gu. Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In R. Sommer, D. Balzarotti, and G. Maier, editors, Recent Advances in Intrusion Detection, volume 6961 of Lecture Notes in Computer Science, pages 318--337. Springer Berlin Heidelberg, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web, WWW '12, pages 71--80, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. C. M. Zhang and V. Paxson. Detecting and analyzing automated activity on twitter. In Proceedings of the 12th international conference on Passive and active measurement, PAM'11, pages 102--111, Berlin, Heidelberg, 2011. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Twitter: who gets caught? observed trends in social micro-blogging spam

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WebSci '14: Proceedings of the 2014 ACM conference on Web science
      June 2014
      318 pages
      ISBN:9781450326223
      DOI:10.1145/2615569

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 June 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      WebSci '14 Paper Acceptance Rate29of144submissions,20%Overall Acceptance Rate218of875submissions,25%

      Upcoming Conference

      Websci '24
      16th ACM Web Science Conference
      May 21 - 24, 2024
      Stuttgart , Germany

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader