Skip to main content
Erschienen in: World Wide Web 6/2019

27.06.2018

Analysis of and defense against crowd-retweeting based spam in social networks

verfasst von: Bo Liu, Zeyang Ni, Junzhou Luo, Jiuxin Cao, Xudong Ni, Benyuan Liu, Xinwen Fu

Erschienen in: World Wide Web | Ausgabe 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Social networking websites with microblogging functionality, such as Twitter or Sina Weibo, have emerged as popular platforms for discovering real-time information on the Web. Like most Internet services, these websites have become the targets of spam campaigns, which contaminate Web contents and damage user experiences. Spam campaigns have become a great threat to social network services. In this paper, we investigate crowd-retweeting spam in Sina Weibo, the counterpart of Twitter in China. We carefully analyze the characteristics of crowd-retweeting spammers in terms of their profile features, social relationships and retweeting behaviors. We find that although these spammers are likely to connect more closely than legitimate users, the underlying social connections of crowd-retweeting campaigns are different from those of other existing spam campaigns because of the unique features of retweets that are spread in a cascade. Based on these findings, we propose retweeting-aware link-based ranking algorithms to infer more suspicious accounts by using identified spammers as seeds. Our evaluation results show that our algorithms are more effective than other link-based strategies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Becchetti, L., Castillo, C., Donato, D., Baeza-YATES, R., Leonardi, S.: Link analysis for Web spam detection. ACM Trans. Web 2(1), 2:1–2:42 (2008)CrossRef Becchetti, L., Castillo, C., Donato, D., Baeza-YATES, R., Leonardi, S.: Link analysis for Web spam detection. ACM Trans. Web 2(1), 2:1–2:42 (2008)CrossRef
2.
Zurück zum Zitat Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS) (2010) Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS) (2010)
3.
Zurück zum Zitat Chen, C., Wen, S., Zhang, J., Xiang, Y., Oliver, J., Alelaiwi, A., Hassan, M.M.: Investigating the deceptive information in twitter spam. Futur. Gener. Comput. Syst. 72, 319–326 (2017)CrossRef Chen, C., Wen, S., Zhang, J., Xiang, Y., Oliver, J., Alelaiwi, A., Hassan, M.M.: Investigating the deceptive information in twitter spam. Futur. Gener. Comput. Syst. 72, 319–326 (2017)CrossRef
4.
Zurück zum Zitat Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: Detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining, ASONAM ’13, pp. 116–120 (2013) Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: Detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining, ASONAM ’13, pp. 116–120 (2013)
6.
Zurück zum Zitat Danezis, G., Mittal, P.: Sybilinfer: Detecting sybil nodes using social networks. In: Proceedings of the network and distributed system security symposium(NDSS), San Diego, 8th February - 11th February (2009) Danezis, G., Mittal, P.: Sybilinfer: Detecting sybil nodes using social networks. In: Proceedings of the network and distributed system security symposium(NDSS), San Diego, 8th February - 11th February (2009)
7.
Zurück zum Zitat Fayazi, A., Lee, K., Caverlee, J., Squicciarini, A.: Uncovering crowdsourced manipulation of online reviews. In: Proceedings of the 38th international ACM SIGIR conference on research and development in information retrieval, pp. 233–242. ACM (2015) Fayazi, A., Lee, K., Caverlee, J., Squicciarini, A.: Uncovering crowdsourced manipulation of online reviews. In: Proceedings of the 38th international ACM SIGIR conference on research and development in information retrieval, pp. 233–242. ACM (2015)
10.
Zurück zum Zitat Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st international conference on World Wide Web, WWW ’12, pp. 61–70 (2012) Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st international conference on World Wide Web, WWW ’12, pp. 61–70 (2012)
11.
Zurück zum Zitat Gyöngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating Web spam with trustrank In: Proceedings of the Thirtieth international conference on very large data bases, vol. 30, VLDB ’04, pp. 576–587 (2004)CrossRef Gyöngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating Web spam with trustrank In: Proceedings of the Thirtieth international conference on very large data bases, vol. 30, VLDB ’04, pp. 576–587 (2004)CrossRef
12.
Zurück zum Zitat Kittur, A., Chi, E.H., Suh, B.: Crowdsourcing user studies with mechanical turk. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI ’08, pp. 453–456 (2008) Kittur, A., Chi, E.H., Suh, B.: Crowdsourcing user studies with mechanical turk. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI ’08, pp. 453–456 (2008)
13.
14.
Zurück zum Zitat Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media?. In: Proceedings of the 19th international conference on World Wide Web, WWW ’10, pp. 591–600 (2010) Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media?. In: Proceedings of the 19th international conference on World Wide Web, WWW ’10, pp. 591–600 (2010)
15.
Zurück zum Zitat Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval, SIGIR ’10, pp. 435–442 (2010) Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval, SIGIR ’10, pp. 435–442 (2010)
16.
Zurück zum Zitat Li, H., Chen, Z., Mukherjee, A., Liu, B., Shao, J.: Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In: ICWSM, pp. 634–637 (2015) Li, H., Chen, Z., Mukherjee, A., Liu, B., Shao, J.: Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In: ICWSM, pp. 634–637 (2015)
17.
Zurück zum Zitat Liu, B., Luo, J., Cao, J., Ni, X., Liu, B., Fu, X.: On crowd-retweeting spamming campaign in social networks. In: IEEE international conference on communications (ICC), 2016., pp. 1–6. IEEE (2016) Liu, B., Luo, J., Cao, J., Ni, X., Liu, B., Fu, X.: On crowd-retweeting spamming campaign in social networks. In: IEEE international conference on communications (ICC), 2016., pp. 1–6. IEEE (2016)
18.
Zurück zum Zitat Liu, Y., Liu, Y., Zhang, M., Ma, S.: Pay Me and I’ll follow you: detection of crowdturfing following activities in microblog environment. In: International joint conference on artificial intelligence (IJCAI) (2016) Liu, Y., Liu, Y., Zhang, M., Ma, S.: Pay Me and I’ll follow you: detection of crowdturfing following activities in microblog environment. In: International joint conference on artificial intelligence (IJCAI) (2016)
20.
Zurück zum Zitat Matthias, H., Tobias, H., Tran-Gia, P.: Anatomy of a crowdsourcing platform - using the example of microworkers.com. In: Proceedings of the 2011 Fifth international conference on innovative mobile and internet services in ubiquitous computing, IMIS ’11, pp. 322–329 (2011) Matthias, H., Tobias, H., Tran-Gia, P.: Anatomy of a crowdsourcing platform - using the example of microworkers.com. In: Proceedings of the 2011 Fifth international conference on innovative mobile and internet services in ubiquitous computing, IMIS ’11, pp. 322–329 (2011)
22.
Zurück zum Zitat Motoyama, M., McCoy, D., Levchenko, K., Savage, S., Voelker, G.M.: Dirty jobs: the role of freelance labor in Web service abuse. In: Proceedings of the 20th USENIX conference on security, SEC’11, pp. 14–14 (2011) Motoyama, M., McCoy, D., Levchenko, K., Savage, S., Voelker, G.M.: Dirty jobs: the role of freelance labor in Web service abuse. In: Proceedings of the 20th USENIX conference on security, SEC’11, pp. 14–14 (2011)
27.
Zurück zum Zitat Sparks, D.: How many users does twitter have? The Motley Fool (2017) Sparks, D.: How many users does twitter have? The Motley Fool (2017)
28.
Zurück zum Zitat Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC ’11, pp. 243–258 (2011) Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC ’11, pp. 243–258 (2011)
29.
Zurück zum Zitat Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: Proceedings of the 6th USENIX symposium on networked systems design and implementation, NSDI’09, pp. 15–28 (2009) Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: Proceedings of the 6th USENIX symposium on networked systems design and implementation, NSDI’09, pp. 15–28 (2009)
32.
Zurück zum Zitat Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based sybil defenses. SIGCOMM Comput. Commun. Rev 41(4), 363–374 (2010)CrossRef Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based sybil defenses. SIGCOMM Comput. Commun. Rev 41(4), 363–374 (2010)CrossRef
33.
Zurück zum Zitat Wang, A.H.: Don’T follow me - spam detection in twitter. In: Proc. of IEEE SECRYPT, pp. 142–151 (2010) Wang, A.H.: Don’T follow me - spam detection in twitter. In: Proc. of IEEE SECRYPT, pp. 142–151 (2010)
34.
Zurück zum Zitat Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf: Crowdturfing for fun and profit. In: Proceedings of the 21st International conference on World Wide Web, WWW ’12, pp. 679–688 (2012) Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf: Crowdturfing for fun and profit. In: Proceedings of the 21st International conference on World Wide Web, WWW ’12, pp. 679–688 (2012)
37.
Zurück zum Zitat Xue, J., Yang, Z., Yang, X., Wang, X., Chen, L., Dai, Y.: Votetrust: leveraging friend invitation graph to defend against social network sybils. In: Proceeding of the 32Nd IEEE international conference on computer communications, INFOCOM ’2013 (2013) Xue, J., Yang, Z., Yang, X., Wang, X., Chen, L., Dai, Y.: Votetrust: leveraging friend invitation graph to defend against social network sybils. In: Proceeding of the 32Nd IEEE international conference on computer communications, INFOCOM ’2013 (2013)
38.
Zurück zum Zitat Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st international conference on World Wide Web, WWW ’12, pp. 71–80 (2012) Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st international conference on World Wide Web, WWW ’12, pp. 71–80 (2012)
39.
Zurück zum Zitat Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In: Proceedings of the 14th international conference on recent advances in intrusion detection, RAID’11, pp. 318–337 (2011) Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In: Proceedings of the 14th international conference on recent advances in intrusion detection, RAID’11, pp. 318–337 (2011)
40.
Zurück zum Zitat Yang, X., Yang, Q., Wilson, C.: Penny for your thoughts: searching for the 50 cent party on Sina Weibo. In: ICWSM, pp. 694–697 (2015) Yang, X., Yang, Q., Wilson, C.: Penny for your thoughts: searching for the 50 cent party on Sina Weibo. In: ICWSM, pp. 694–697 (2015)
41.
Zurück zum Zitat Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network sybils in the wild. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC ’11, pp. 259–268 (2011) Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network sybils in the wild. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC ’11, pp. 259–268 (2011)
42.
Zurück zum Zitat Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010)CrossRef Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010)CrossRef
43.
Zurück zum Zitat Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM ’06, pp. 267–278 (2006) Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM ’06, pp. 267–278 (2006)
Metadaten
Titel
Analysis of and defense against crowd-retweeting based spam in social networks
verfasst von
Bo Liu
Zeyang Ni
Junzhou Luo
Jiuxin Cao
Xudong Ni
Benyuan Liu
Xinwen Fu
Publikationsdatum
27.06.2018
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 6/2019
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-018-0613-y

Weitere Artikel der Ausgabe 6/2019

World Wide Web 6/2019 Zur Ausgabe

Premium Partner