Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2016

01.12.2016 | Original Article

Exploiting abused trending topics to identify spam campaigns in Twitter

verfasst von: Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Paraskevi Fragopoulou

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Twitter is an online social network (OSN) with approximately 650 million users. It has been fairly characterized as one of the most influential OSNs since it includes public figures, organizations, news media and official authorities. Twitter has an inherent simple philosophy with short messages, friendship relations, hashtags and support for media sharing such as photos and short videos. Popular hashtags that emerge from users’ activity are displayed prominently in the platform as Popular Trends. Unfortunately, the capabilities of the platform can be also abused and exploited for distributing illicit content or boosting false information, and the consequences of such actions can be really severe: one false tweet was enough for making the stock market crash for a short period of time in 2013. In this study, we make an experimental analysis on a large dataset containing 150 million tweets. We delve into the dynamics of the popular trends as well as other Twitter features in regard to deliberate misuse. We investigate traditional spam techniques as well as an obfuscated way of spam campaigns that exploit trending topics and hides malicious URLs within Google search result links. We implement a simple and lightweight classifier for indentifying spam users as well as spam tweets. Finally, we visualize these spam campaigns and investigate their inner properties.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Amleshwaram AA, Reddy A LN, Yadav S, Gu G, Yang C (2013) Cats: characterizing automation of Twitter spammers. In: COMSNETS (2013). IEEE, pp 1–10 Amleshwaram AA, Reddy A LN, Yadav S, Gu G, Yang C (2013) Cats: characterizing automation of Twitter spammers. In: COMSNETS (2013). IEEE, pp 1–10
Zurück zum Zitat Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on Twitter. In: Annual collaboration, electronic messaging, anti-abuse and spam conference (CEAS) Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on Twitter. In: Annual collaboration, electronic messaging, anti-abuse and spam conference (CEAS)
Zurück zum Zitat Flores M, Kuzmanovic A (2013) Searching for spam: detecting fraudulent accounts via web search. In: Passive and active measurement. Springer, Berlin, pp 208–217 Flores M, Kuzmanovic A (2013) Searching for spam: detecting fraudulent accounts via web search. In: Passive and active measurement. Springer, Berlin, pp 208–217
Zurück zum Zitat Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. In: Proceedings of the 10th annual conference on internet measurement (2010). ACM Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. In: Proceedings of the 10th annual conference on internet measurement (2010). ACM
Zurück zum Zitat Gao H, Chen Y, Lee K, Palsetia D, Choudhary A (2012) Toward online spam filtering in social networks. In: Symposium on network and distributed system security (NDSS) (2012) Gao H, Chen Y, Lee K, Palsetia D, Choudhary A (2012) Toward online spam filtering in social networks. In: Symposium on network and distributed system security (NDSS) (2012)
Zurück zum Zitat Ghosh S, Viswanath B, Kooti F, Sharma NK, Korlam G, Benevenuto F, Ganguly N, Gummadi KP (2012) Understanding and combating link farming in the Twitter social network. In: Proceedings of the 21st international conference on world wide web—WWW’12. ACM Press, New York, NY, USA, p 61 Ghosh S, Viswanath B, Kooti F, Sharma NK, Korlam G, Benevenuto F, Ganguly N, Gummadi KP (2012) Understanding and combating link farming in the Twitter social network. In: Proceedings of the 21st international conference on world wide web—WWW’12. ACM Press, New York, NY, USA, p 61
Zurück zum Zitat Grier C, Thomas K, Paxson V, Zhang M (2010) @spam: The underground on 140 characters or less. In: Proceedings of the 17th ACM conference on computer and communications security. CCS’10. ACM, New York, NY, USA, pp 27–37 Grier C, Thomas K, Paxson V, Zhang M (2010) @spam: The underground on 140 characters or less. In: Proceedings of the 17th ACM conference on computer and communications security. CCS’10. ACM, New York, NY, USA, pp 27–37
Zurück zum Zitat Kleineberg K-K, Boguñá M (2014) Evolution of the digital society reveals balance between viral and mass media influence. Phys Rev X 4:031046 Kleineberg K-K, Boguñá M (2014) Evolution of the digital society reveals balance between viral and mass media influence. Phys Rev X 4:031046
Zurück zum Zitat Lee K, Eoff BD, Caverlee J (2011) A long-term study of content polluters on Twitter. In: ICWSM, Seven months with the devils Lee K, Eoff BD, Caverlee J (2011) A long-term study of content polluters on Twitter. In: ICWSM, Seven months with the devils
Zurück zum Zitat Markatos E, Balzarotti D, Almgren M, Athanasopoulos E, Bos H, Cavallaro L, Ioannidis S, Lindorfer M, Maggi F, Minchev Z, Moradi F (2013) The red book Markatos E, Balzarotti D, Almgren M, Athanasopoulos E, Bos H, Cavallaro L, Ioannidis S, Lindorfer M, Maggi F, Minchev Z, Moradi F (2013) The red book
Zurück zum Zitat Martinez-Romo J, Araujo L (2013) Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst Appl 40(8):2992–3000CrossRef Martinez-Romo J, Araujo L (2013) Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst Appl 40(8):2992–3000CrossRef
Zurück zum Zitat Newcombe RG (1998) Interval estimation for the difference between independent proportions: comparison of eleven methods. Stat Med 17(8):873–890CrossRef Newcombe RG (1998) Interval estimation for the difference between independent proportions: comparison of eleven methods. Stat Med 17(8):873–890CrossRef
Zurück zum Zitat O’Donovan J, Kang B, Meyer G, Höllerer T, Adalii, S (2012) An analysis of feature distributions in Twitter. In: SocialCom/PASSAT, Credibility in context, pp 293–301 O’Donovan J, Kang B, Meyer G, Höllerer T, Adalii, S (2012) An analysis of feature distributions in Twitter. In: SocialCom/PASSAT, Credibility in context, pp 293–301
Zurück zum Zitat Ozdikis O, Senkul P, Oguztuzun H (2012) Semantic expansion of hashtags for enhanced event detection in Twitter. In: Proceedings of the 1st international workshop on online social systems Ozdikis O, Senkul P, Oguztuzun H (2012) Semantic expansion of hashtags for enhanced event detection in Twitter. In: Proceedings of the 1st international workshop on online social systems
Zurück zum Zitat Perlroth N (2013) Fake Twitter followers become multimillion-dollar business. The New York Times, New York Perlroth N (2013) Fake Twitter followers become multimillion-dollar business. The New York Times, New York
Zurück zum Zitat Sridharan V, Shankar V, Gupta M (2012) Twitter games: how successful spammers pick targets. In: Proceedings of the 28th annual computer security applications conference. ACSAC’12. ACM, New York, NY, USA, pp 389–398 Sridharan V, Shankar V, Gupta M (2012) Twitter games: how successful spammers pick targets. In: Proceedings of the 28th annual computer security applications conference. ACSAC’12. ACM, New York, NY, USA, pp 389–398
Zurück zum Zitat Stringhini G, Wang G, Egele M, Kruegel C, Vigna G, Zheng H, Zhao BY (2013) Follow the green: growth and dynamics in Twitter follower markets. In: Proceedings of the 2013 conference on Internet measurement conference. ACM, pp 163–176 Stringhini G, Wang G, Egele M, Kruegel C, Vigna G, Zheng H, Zhao BY (2013) Follow the green: growth and dynamics in Twitter follower markets. In: Proceedings of the 2013 conference on Internet measurement conference. ACM, pp 163–176
Zurück zum Zitat Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: an analysis of Twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference. IMC’11. ACM, New York, NY, USA, pp 243–258 Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: an analysis of Twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference. IMC’11. ACM, New York, NY, USA, pp 243–258
Zurück zum Zitat Thomas K, Li F, Grier C, Paxson V (2014) Consequences of connectivity. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security—CCS’14. ACM Press, New York, NY, USA, pp 489–500 Thomas K, Li F, Grier C, Paxson V (2014) Consequences of connectivity. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security—CCS’14. ACM Press, New York, NY, USA, pp 489–500
Zurück zum Zitat Wang AH (2010) Don’t follow me—spam detection in Twitter. In: SECRYPT, pp 142–151 Wang AH (2010) Don’t follow me—spam detection in Twitter. In: SECRYPT, pp 142–151
Metadaten
Titel
Exploiting abused trending topics to identify spam campaigns in Twitter
verfasst von
Despoina Antonakaki
Iasonas Polakis
Elias Athanasopoulos
Sotiris Ioannidis
Paraskevi Fragopoulou
Publikationsdatum
01.12.2016
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2016
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-016-0354-9

Weitere Artikel der Ausgabe 1/2016

Social Network Analysis and Mining 1/2016 Zur Ausgabe