skip to main content
10.1145/3543507.3583475acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

RICC: Robust Collective Classification of Sybil Accounts

Published:30 April 2023Publication History

ABSTRACT

A Sybil attack is a critical threat that undermines the trust and integrity of web services by creating and exploiting a large number of fake (i.e., Sybil) accounts. To mitigate this threat, previous studies have proposed leveraging collective classification to detect Sybil accounts. Recently, researchers have demonstrated that state-of-the-art adversarial attacks are able to bypass existing collective classification methods, posing a new security threat. To this end, we propose RICC, the first robust collective classification framework, designed to identify adversarial Sybil accounts created by adversarial attacks. RICC leverages the novel observation that these adversarial attacks are highly tailored to a target collective classification model to optimize the attack budget. Owing to this adversarial strategy, the classification results for adversarial Sybil accounts often significantly change when deploying a new training set different from the original training set used for assigning prior reputation scores to user accounts. Leveraging this observation, RICC achieves robustness in collective classification by stabilizing classification results across different training sets randomly sampled in each round. RICC achieves false negative rates of 0.01, 0.11, 0.00, and 0.01 in detecting adversarial Sybil accounts for the Enron, Facebook, Twitter_S, and Twitter_L datasets, respectively. It also attains respective AUCs of 0.99, 1.00, 0.89, and 0.74 for these datasets, achieving high performance on the original task of detecting Sybil accounts. RICC significantly outperforms all existing Sybil detection methods, demonstrating superior robustness and efficacy in the collective classification of Sybil accounts.

References

  1. Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. 2009. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In Proceedings of the International Conference on World Wide Web. 551–560.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, Jose Lorenzo, Matei Ripeanu, and Konstantin Beznosov. 2015. Íntegro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs. In Proceedings of the Network and Distributed System Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  3. Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. 2011. The Socialbot Network: When Bots Socialize for Fame and Money. In Proceedings of the Annual Computer Security Applications Conference. 93–102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Adam Breuer, Roee Eilat, and Udi Weinsberg. 2020. Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks. In Proceedings of the Web Conference. 1287–1297.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In Proceedings of the USENIX Conference on Networked Systems Design and Implementation. 197–210.Google ScholarGoogle Scholar
  6. Duen Horng “Polo” Chau, Carey Nachenberg, Jeffrey Wilhelm, Adam Wright, and Christos Faloutsos. 2011. Polonium: Tera-Scale Graph Mining and Inference for Malware Detection. In Proceedings of the SIAM International Conference on Data Mining. 131–142.Google ScholarGoogle Scholar
  7. Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial Attack on Graph Structured Data. In Proceedings of the International Conference on Machine Learning. 1115–1124.Google ScholarGoogle Scholar
  8. George Danezis and Prateek Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks. In Proceedings of the Network and Distributed System Security Symposium.Google ScholarGoogle Scholar
  9. Zhijie Deng, Yinpeng Dong, and Jun Zhu. 2019. Batch Virtual Adversarial Training for Graph Convolutional Networks. CoRR abs/1902.09192 (2019).Google ScholarGoogle Scholar
  10. Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben Y. Zhao. 2010. Detecting and Characterizing Social Spam Campaigns. In Proceedings of the ACM SIGCOMM Conference. 35–47.Google ScholarGoogle Scholar
  11. Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, and Prateek Mittal. 2018. SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection. In Proceedings of the IEEE Conference on Communications and Network Security.Google ScholarGoogle ScholarCross RefCross Ref
  12. Simon Geisler, Tobias Schmidt, Hakan Şirin, Daniel Zügner, Aleksandar Bojchevski, and Stephan Günnemann. 2021. Robustness of Graph Neural Networks at Scale. In Proceedings of the Advances in Neural Information Processing Systems. 7637–7649.Google ScholarGoogle Scholar
  13. Neil Zhenqiang Gong, Mario Frank, and Prateek Mittal. 2014. SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection. IEEE Transactions on Information Forensics and Security 9, 6 (2014), 976–987.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jinyuan Jia, Binghui Wang, and Neil Zhenqiang Gong. 2017. Random Walk Based Fake Account Detection in Online Social Networks. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks. 273–284.Google ScholarGoogle ScholarCross RefCross Ref
  15. Jinyuan Jia, Binghui Wang, Le Zhang, and Neil Zhenqiang Gong. 2017. AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields. In Proceedings of the International Conference on World Wide Web. 1561–1569.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, and Jiliang Tang. 2020. Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies. ACM SIGKDD Explanations Newsletter 22, 2 (2020), 19–34.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Wei Jin, Yao Ma, Xiaorui Liu, Xianfeng Tang, Suhang Wang, and Jiliang Tang. 2020. Graph Structure Learning for Robust Graph Neural Networks. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 66–74.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Zhou Li, Sumayah Alrwais, Yinglian Xie, Fang Yu, and XiaoFeng Wang. 2013. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures. In Proceedings of the IEEE Symposium on Security and Privacy. 112–126.Google ScholarGoogle Scholar
  19. Xiao Liang, Zheng Yang, Binghui Wang, Shaofeng Hu, Zijie Yang, Dong Yuan, Neil Zhenqiang Gong, Qi Li, and Fang He. 2021. Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 3240–3250.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Yushan Liu, Shouling Ji, and Prateek Mittal. 2016. SmartWalk: Enhancing Social Network Security via Adaptive Random Walks. In Proceedings of the ACM Conference on Computer and Communications Security. 492–503.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Annie Palmer. 2022. Amazon sues two companies that allegedly help fill the site with fake reviews. https://www.cnbc.com/2022/02/22/amazon-sues-alleged-fake-reviews-brokers-appsally-rebatest.html.Google ScholarGoogle Scholar
  22. Shashank Pandit, Duen Horng Chau, Samuel Wang, and Christos Faloutsos. 2007. NetProbe: A Fast and Scalable System for Fraud Detection in Online Auction Networks. In Proceedings of the International Conference on World Wide Web. 201–210.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Feliz Solomon. 2016. Alibaba Takes On Fake Reviews in Its Latest Push For More Credibility. https://fortune.com/2016/12/20/alibaba-jack-ma-china-fake-reviews/.Google ScholarGoogle Scholar
  24. Acar Tamersoy, Kevin Roundy, and Duen Horng Chau. 2014. Guilt by Association: Large Scale Malware Detection by Mining File-relation Graphs. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1524–1533.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Binghui Wang and Neil Zhenqiang Gong. 2019. Attacking Graph-based Classification via Manipulating the Graph Structure. In Proceedings of the ACM Conference on Computer and Communications Security. 2023–2040.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Binghui Wang, Neil Zhenqiang Gong, and Hao Fu. 2017. GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs. In Proceedings of the IEEE International Conference on Data Mining. 465–474.Google ScholarGoogle ScholarCross RefCross Ref
  27. Binghui Wang, Jinyuan Jia, and Neil Zhenqiang Gong. 2019. Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation. In Proceedings of the Network and Distributed System Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  28. Binghui Wang, Le Zhang, and Neil Zhenqiang Gong. 2017. SybilSCAR: Sybil Detection in Online Social Networks via Local Rule based Propagation. In Proceedings of the IEEE Conference on Computer Communications.Google ScholarGoogle ScholarCross RefCross Ref
  29. Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. 2019. Adversarial Examples for Graph Data: Deep Insights into Attack and Defense. In Proceedings of the International Joint Conference on Artificial Intelligence. 4816–4823.Google ScholarGoogle ScholarCross RefCross Ref
  30. Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, and Xue Lin. 2019. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. CoRR abs/1906.04214 (2019).Google ScholarGoogle Scholar
  31. Xuening Xu, Xiaojiang Du, and Qiang Zeng. 2020. Attacking Graph-Based Classification without Changing Existing Connections. In Proceedings of the Annual Computer Security Applications Conference. 951–962.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu. 2012. Analyzing Spammers’ Social Networks for Fun and Profit: A Case Study of Cyber Criminal Ecosystem on Twitter. In Proceedings of the International Conference on World Wide Web. 71–80.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao. 2008. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In Proceedings of the IEEE Symposium on Security and Privacy. 3–17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. 2006. SybilGuard: Defending against Sybil Attacks via Social Networks. In Proceedings of the ACM SIGCOMM Conference. 267–278.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Ao Zhang and Jinwen Ma. 2020. DefenseVGAE: Defending against Adversarial Attacks on Graph Data via a Variational Graph Autoencoder. CoRR abs/2006.08900 (2020).Google ScholarGoogle Scholar
  36. Xiaoying Zhang, Hong Xie, Pei Yi, and John C.S. Lui. 2022. Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach. IEEE Transactions on Dependable and Secure Computing (2022).Google ScholarGoogle Scholar
  37. Xiang Zhang and Marinka Zitnik. 2020. GNNGuard: Defending Graph Neural Networks against Adversarial Attacks. Proceedings of the Advances in Neural Information Processing Systems 33 (2020), 9263–9275.Google ScholarGoogle Scholar
  38. Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, and Keith Ross. 2018. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. In Proceedings of the Network and Distributed System Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  39. Dingyuan Zhu, Ziwei Zhang, Peng Cui, and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1399–1407.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. RICC: Robust Collective Classification of Sybil Accounts

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WWW '23: Proceedings of the ACM Web Conference 2023
        April 2023
        4293 pages
        ISBN:9781450394161
        DOI:10.1145/3543507

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 April 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate1,899of8,196submissions,23%

        Upcoming Conference

        WWW '24
        The ACM Web Conference 2024
        May 13 - 17, 2024
        Singapore , Singapore
      • Article Metrics

        • Downloads (Last 12 months)127
        • Downloads (Last 6 weeks)2

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format