Skip to main content
Top
Published in: Social Network Analysis and Mining 1/2016

01-12-2016 | Original Article

Exploiting abused trending topics to identify spam campaigns in Twitter

Authors: Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Paraskevi Fragopoulou

Published in: Social Network Analysis and Mining | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Twitter is an online social network (OSN) with approximately 650 million users. It has been fairly characterized as one of the most influential OSNs since it includes public figures, organizations, news media and official authorities. Twitter has an inherent simple philosophy with short messages, friendship relations, hashtags and support for media sharing such as photos and short videos. Popular hashtags that emerge from users’ activity are displayed prominently in the platform as Popular Trends. Unfortunately, the capabilities of the platform can be also abused and exploited for distributing illicit content or boosting false information, and the consequences of such actions can be really severe: one false tweet was enough for making the stock market crash for a short period of time in 2013. In this study, we make an experimental analysis on a large dataset containing 150 million tweets. We delve into the dynamics of the popular trends as well as other Twitter features in regard to deliberate misuse. We investigate traditional spam techniques as well as an obfuscated way of spam campaigns that exploit trending topics and hides malicious URLs within Google search result links. We implement a simple and lightweight classifier for indentifying spam users as well as spam tweets. Finally, we visualize these spam campaigns and investigate their inner properties.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Amleshwaram AA, Reddy A LN, Yadav S, Gu G, Yang C (2013) Cats: characterizing automation of Twitter spammers. In: COMSNETS (2013). IEEE, pp 1–10 Amleshwaram AA, Reddy A LN, Yadav S, Gu G, Yang C (2013) Cats: characterizing automation of Twitter spammers. In: COMSNETS (2013). IEEE, pp 1–10
go back to reference Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on Twitter. In: Annual collaboration, electronic messaging, anti-abuse and spam conference (CEAS) Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on Twitter. In: Annual collaboration, electronic messaging, anti-abuse and spam conference (CEAS)
go back to reference Flores M, Kuzmanovic A (2013) Searching for spam: detecting fraudulent accounts via web search. In: Passive and active measurement. Springer, Berlin, pp 208–217 Flores M, Kuzmanovic A (2013) Searching for spam: detecting fraudulent accounts via web search. In: Passive and active measurement. Springer, Berlin, pp 208–217
go back to reference Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. In: Proceedings of the 10th annual conference on internet measurement (2010). ACM Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. In: Proceedings of the 10th annual conference on internet measurement (2010). ACM
go back to reference Gao H, Chen Y, Lee K, Palsetia D, Choudhary A (2012) Toward online spam filtering in social networks. In: Symposium on network and distributed system security (NDSS) (2012) Gao H, Chen Y, Lee K, Palsetia D, Choudhary A (2012) Toward online spam filtering in social networks. In: Symposium on network and distributed system security (NDSS) (2012)
go back to reference Ghosh S, Viswanath B, Kooti F, Sharma NK, Korlam G, Benevenuto F, Ganguly N, Gummadi KP (2012) Understanding and combating link farming in the Twitter social network. In: Proceedings of the 21st international conference on world wide web—WWW’12. ACM Press, New York, NY, USA, p 61 Ghosh S, Viswanath B, Kooti F, Sharma NK, Korlam G, Benevenuto F, Ganguly N, Gummadi KP (2012) Understanding and combating link farming in the Twitter social network. In: Proceedings of the 21st international conference on world wide web—WWW’12. ACM Press, New York, NY, USA, p 61
go back to reference Grier C, Thomas K, Paxson V, Zhang M (2010) @spam: The underground on 140 characters or less. In: Proceedings of the 17th ACM conference on computer and communications security. CCS’10. ACM, New York, NY, USA, pp 27–37 Grier C, Thomas K, Paxson V, Zhang M (2010) @spam: The underground on 140 characters or less. In: Proceedings of the 17th ACM conference on computer and communications security. CCS’10. ACM, New York, NY, USA, pp 27–37
go back to reference Kleineberg K-K, Boguñá M (2014) Evolution of the digital society reveals balance between viral and mass media influence. Phys Rev X 4:031046 Kleineberg K-K, Boguñá M (2014) Evolution of the digital society reveals balance between viral and mass media influence. Phys Rev X 4:031046
go back to reference Lee K, Eoff BD, Caverlee J (2011) A long-term study of content polluters on Twitter. In: ICWSM, Seven months with the devils Lee K, Eoff BD, Caverlee J (2011) A long-term study of content polluters on Twitter. In: ICWSM, Seven months with the devils
go back to reference Markatos E, Balzarotti D, Almgren M, Athanasopoulos E, Bos H, Cavallaro L, Ioannidis S, Lindorfer M, Maggi F, Minchev Z, Moradi F (2013) The red book Markatos E, Balzarotti D, Almgren M, Athanasopoulos E, Bos H, Cavallaro L, Ioannidis S, Lindorfer M, Maggi F, Minchev Z, Moradi F (2013) The red book
go back to reference Martinez-Romo J, Araujo L (2013) Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst Appl 40(8):2992–3000CrossRef Martinez-Romo J, Araujo L (2013) Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst Appl 40(8):2992–3000CrossRef
go back to reference Newcombe RG (1998) Interval estimation for the difference between independent proportions: comparison of eleven methods. Stat Med 17(8):873–890CrossRef Newcombe RG (1998) Interval estimation for the difference between independent proportions: comparison of eleven methods. Stat Med 17(8):873–890CrossRef
go back to reference O’Donovan J, Kang B, Meyer G, Höllerer T, Adalii, S (2012) An analysis of feature distributions in Twitter. In: SocialCom/PASSAT, Credibility in context, pp 293–301 O’Donovan J, Kang B, Meyer G, Höllerer T, Adalii, S (2012) An analysis of feature distributions in Twitter. In: SocialCom/PASSAT, Credibility in context, pp 293–301
go back to reference Ozdikis O, Senkul P, Oguztuzun H (2012) Semantic expansion of hashtags for enhanced event detection in Twitter. In: Proceedings of the 1st international workshop on online social systems Ozdikis O, Senkul P, Oguztuzun H (2012) Semantic expansion of hashtags for enhanced event detection in Twitter. In: Proceedings of the 1st international workshop on online social systems
go back to reference Perlroth N (2013) Fake Twitter followers become multimillion-dollar business. The New York Times, New York Perlroth N (2013) Fake Twitter followers become multimillion-dollar business. The New York Times, New York
go back to reference Sridharan V, Shankar V, Gupta M (2012) Twitter games: how successful spammers pick targets. In: Proceedings of the 28th annual computer security applications conference. ACSAC’12. ACM, New York, NY, USA, pp 389–398 Sridharan V, Shankar V, Gupta M (2012) Twitter games: how successful spammers pick targets. In: Proceedings of the 28th annual computer security applications conference. ACSAC’12. ACM, New York, NY, USA, pp 389–398
go back to reference Stringhini G, Wang G, Egele M, Kruegel C, Vigna G, Zheng H, Zhao BY (2013) Follow the green: growth and dynamics in Twitter follower markets. In: Proceedings of the 2013 conference on Internet measurement conference. ACM, pp 163–176 Stringhini G, Wang G, Egele M, Kruegel C, Vigna G, Zheng H, Zhao BY (2013) Follow the green: growth and dynamics in Twitter follower markets. In: Proceedings of the 2013 conference on Internet measurement conference. ACM, pp 163–176
go back to reference Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: an analysis of Twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference. IMC’11. ACM, New York, NY, USA, pp 243–258 Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: an analysis of Twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference. IMC’11. ACM, New York, NY, USA, pp 243–258
go back to reference Thomas K, Li F, Grier C, Paxson V (2014) Consequences of connectivity. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security—CCS’14. ACM Press, New York, NY, USA, pp 489–500 Thomas K, Li F, Grier C, Paxson V (2014) Consequences of connectivity. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security—CCS’14. ACM Press, New York, NY, USA, pp 489–500
go back to reference Wang AH (2010) Don’t follow me—spam detection in Twitter. In: SECRYPT, pp 142–151 Wang AH (2010) Don’t follow me—spam detection in Twitter. In: SECRYPT, pp 142–151
Metadata
Title
Exploiting abused trending topics to identify spam campaigns in Twitter
Authors
Despoina Antonakaki
Iasonas Polakis
Elias Athanasopoulos
Sotiris Ioannidis
Paraskevi Fragopoulou
Publication date
01-12-2016
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2016
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-016-0354-9

Other articles of this Issue 1/2016

Social Network Analysis and Mining 1/2016 Go to the issue

Premium Partner