skip to main content
10.1145/3033288.3033349acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicnccConference Proceedingsconference-collections
research-article

Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks

Published: 17 December 2016 Publication History

Abstract

The huge popularity of online social networks and the potential financial gain have led to the creation and proliferation of zombie accounts, i.e., fake user accounts. For considerable amount of payment, zombie accounts can be directed by their managers to provide pre-arranged biased reactions to different social events or the quality of a commercial product. It is thus critical to detect and screen these accounts. Prior arts are either inaccurate or relying heavily on complex posting/tweeting behaviors in the classification process of normal/zombie accounts. In this work, we propose to use a bi-level penalized logistic classifier, an efficient high-dimensional data analysis technique, to detect zombie accounts based on their publicly available profile information and the statistics of their followers' registration locations. Our approach, termed (B)i-level (P)enalized (LO)gistic (C)lassifier (BPLOC), is data adaptive and can be extended to mount more accurate detections. Our experimental results are based on a small number of SINA WeiBo accounts and have demonstrated that BPLOC can classify zombie accounts accurately.

References

[1]
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network sybils in the wild. ACM Transactions on Knowledge Discovery from Data, 8(1):2:1--2:29, Feb. 2014.
[2]
J. Lu, X. Yu, and W. Wan. Analysis of topology and properties on localized microblog network. Journal of Information and Computational Science, 11(10):3503--3512, October 2014.
[3]
J. Liu, W. Yu, and S. Li. A framework to extract keywords from sina weibo data for tracking user trail. Journal of Information and Computational Science, 12(1):51--58, January 2015.
[4]
H. Jiang, Y. Wang, and M. Zhu. Discrimination of zombie fans on weibo based on features extraction and businessdriven analysis. In Proceedings of the 17th International Conference on Electronic Commerce 2015, ICEC '15, pages 13:1--13:5, New York, NY, USA, 2015. ACM.
[5]
K. Thomas, C. Grier, D. Song, and V. Paxson. Suspended accounts in retrospect: An analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC '11, pages 243--258, New York, NY, USA, 2011. ACM.
[6]
Z. Chu, I. Widjaja, and H. Wang. Detecting social spam campaigns on twitter. In F. Bao, P. Samarati, and J. Zhou, editors, Applied Cryptography and Network Security, volume 7341 of Lecture Notes in Computer Science, pages 455--472. Springer Berlin Heidelberg, 2012.
[7]
S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twitter social network. In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages 61--70, New York, NY, USA, 2012. ACM.
[8]
Y. Shen, J. Yu, K. Dong, and K. Nan. Automatic fake followers detection in chinese micro-blogging system. In V. Tseng, T. Ho, Z.-H. Zhou, A. Chen, and H.-Y. Kao, editors, Advances in Knowledge Discovery and Data Mining, volume 8444 of Lecture Notes in Computer Science, pages 596--607. Springer International Publishing, 2014.
[9]
Z. Guo, Z. Li, H. Tu, and L. Li. Characterizing user behavior in weibo. In Mobile, Ubiquitous, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference on, pages 60--65, June 2012.
[10]
X. Hu, J. Tang, Y. Zhang, and H. Liu. Social spammer detection in microblogging. In 23rd International Joint Conference on Artificial Intelligence (IJCAI '13), August 3-9 2013.
[11]
H. Wang, K. Lei, and K. Xu. Profiling the followers of the most influential and verified users on sina weibo. In Communications (ICC), 2015 IEEE International Conference on, pages 1158--1163, June 2015.
[12]
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. Detecting suspicious following behavior in multimillionnode social networks. In Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion, WWW Companion '14, pages 305--306, Republic and Canton of Geneva, Switzerland, 2014. International World Wide Web Conferences Steering Committee.
[13]
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), volume 6, pages 1--9, 2010.
[14]
H. Liu, Y. Zhang, H. Lin, J. Wu, Z. Wu, and X. Zhang. How many zombies around you? In Proc. on Data Mining (ICDM), IEEE 13th International Conference on, pages 1133--1138, Dec 2013.
[15]
A. Beutel, L. Akoglu, and C. Faloutsos. Fraud detection through graph-based user behavior modeling. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pages 1696--1697, New York, NY, USA, 2015. ACM.
[16]
J. Deng, L. Fu, and Y. Yang. ZLOC: Detection of zombie users in online social networks using location information. In Proc. of the third IARIA International Conference on Building and Exploring Web Based Environments (WEB 2015), pages 24--28, Rome, Italy, May 24-29 2015.
[17]
T. Hastie, R. Tibshirani, and J. H. Friedman. Elements of Statistical Learning: Data Mining, Inference and Prediction (Second Edition). Springer-Verlag, New York, 2009.
[18]
M. Y. Park and T. Hastie. L1-regularization path algorithm for generalized linear models. Journal of the Royal Statistical Society, Series B: Statistical Methodology, 69:659--677, 2007.
[19]
L. Meier, S. van de Geer, and P. Buhlmann. The group lasso for logistic regression. Journal of the Royal Statistical Society, Series B: Statistical Methodology, 70(1):53--71, 2008.
[20]
C.-H. Zhang. Nearly unbiased variable selection under minimax concave penalty. Annals of Statistics, 38(2):894--942, 2010.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICNCC '16: Proceedings of the Fifth International Conference on Network, Communication and Computing
December 2016
343 pages
ISBN:9781450347938
DOI:10.1145/3033288
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 December 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Online social networks
  2. classfier
  3. zombie detection

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICNCC '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 57
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media