Skip to main content

2015 | OriginalPaper | Buchkapitel

Quit Playing Games with My Heart: Understanding Online Dating Scams

verfasst von : JingMin Huang, Gianluca Stringhini, Peng Yong

Erschienen in: Detection of Intrusions and Malware, and Vulnerability Assessment

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online dating sites are experiencing a rise in popularity, with one in five relationships in the United States starting on one of these sites. Online dating sites provide a valuable platform not only for single people trying to meet a life partner, but also for cybercriminals, who see in people looking for love easy victims for scams. Such scams span from schemes similar to traditional advertisement of illicit services or goods (i.e., spam) to advanced schemes, in which the victim starts a long-distance relationship with the scammer and is eventually extorted money.
In this paper we perform the first large-scale study of online dating scams. We analyze the scam accounts detected on a popular online dating site over a period of eleven months, and provide a taxonomy of the different types of scammers that are active in the online dating landscape. We show that different types of scammers target a different demographics on the site, and therefore set up accounts with different characteristics. Our results shed light on the threats associated to online dating scams, and can help researchers and practitioners in developing effective countermeasures to fight them.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The data about the users of Jiayuan was collected according to the company’s privacy policy and it was only accessed by two of the authors of this paper, who were Jiayuan employees at the time the research was conducted. The authors external to Jiayuan did not access any personal or sensitive information about any user on the online dating site, but instead worked with aggregated statistics.
 
2
Note that this number takes into accounts also those accounts that never received a message at all on the site.
 
Literatur
6.
Zurück zum Zitat Afroz, S., Brennan, M., Greenstadt, R.: Detecting hoaxes, frauds, and deception in writing style online. In IEEE Symposium on Security and Privacy (2012) Afroz, S., Brennan, M., Greenstadt, R.: Detecting hoaxes, frauds, and deception in writing style online. In IEEE Symposium on Security and Privacy (2012)
7.
Zurück zum Zitat Baltazar, J., Costoya, J., Flores, R.: KOOBFACE: the largest web 2.0 botnet explained. Trend Micro Threat Research (2009) Baltazar, J., Costoya, J., Flores, R.: KOOBFACE: the largest web 2.0 botnet explained. Trend Micro Threat Research (2009)
8.
Zurück zum Zitat Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Conference on Email and Anti-spam (CEAS) (2010) Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Conference on Email and Anti-spam (CEAS) (2010)
9.
Zurück zum Zitat Cai, Z., Jermaine, C.: The latent community model for detecting sybils in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012) Cai, Z., Jermaine, C.: The latent community model for detecting sybils in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)
10.
Zurück zum Zitat Cao, Y., Yegneswaran, V., Possas, P., Chen, Y.: PathCutter: severing the self-propagation path of XSS javascript worms in social web networks. In: Symposium on Network and Distributed System Security (NDSS) (2012) Cao, Y., Yegneswaran, V., Possas, P., Chen, Y.: PathCutter: severing the self-propagation path of XSS javascript worms in social web networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)
11.
Zurück zum Zitat Chen, L., Nayak, R.: Social network analysis of an online dating network. In: Proceedings of the 5th International Conference on Communities and Technologies (2011) Chen, L., Nayak, R.: Social network analysis of an online dating network. In: Proceedings of the 5th International Conference on Communities and Technologies (2011)
12.
Zurück zum Zitat Drucker, H., Wu, D., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 988–999 (1999)CrossRef Drucker, H., Wu, D., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 988–999 (1999)CrossRef
13.
Zurück zum Zitat Dyrud, M.A.: “I brought you a good news”: an analysis of nigerian 419 letters. In: Association for Business Communication Annual Convention (2005) Dyrud, M.A.: “I brought you a good news”: an analysis of nigerian 419 letters. In: Association for Business Communication Annual Convention (2005)
14.
Zurück zum Zitat Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: Compa: detecting compromised accounts on social networks. In: Symposium on Network and Distributed System Security (NDSS) (2013) Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: Compa: detecting compromised accounts on social networks. In: Symposium on Network and Distributed System Security (NDSS) (2013)
15.
Zurück zum Zitat Fiore, A., Tresolini, R.: Romantic regressions: an analysis of behavior in online dating systems. Ph.D. thesis, Massachusetts Institute of Technology (2004) Fiore, A., Tresolini, R.: Romantic regressions: an analysis of behavior in online dating systems. Ph.D. thesis, Massachusetts Institute of Technology (2004)
16.
Zurück zum Zitat Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards Online spam filtering in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012) Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards Online spam filtering in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)
17.
Zurück zum Zitat Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.: Detecting and characterizing social spam campaigns. In: Internet Measurement Conference (IMC) (2010) Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.: Detecting and characterizing social spam campaigns. In: Internet Measurement Conference (IMC) (2010)
18.
Zurück zum Zitat Gao, Y., Zhao, G.: Knowledge-based information extraction: a case study of recognizing emails of nigerian frauds. In: Montoyo, A., Muńoz, R., Métais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 161–172. Springer, Heidelberg (2005) CrossRef Gao, Y., Zhao, G.: Knowledge-based information extraction: a case study of recognizing emails of nigerian frauds. In: Montoyo, A., Muńoz, R., Métais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 161–172. Springer, Heidelberg (2005) CrossRef
19.
Zurück zum Zitat Glickman, H.: The nigerian "419" advance fee scams: prank or peril? Can. J. Afr. Stud. 39(3), 460–89 (2005) Glickman, H.: The nigerian "419" advance fee scams: prank or peril? Can. J. Afr. Stud. 39(3), 460–89 (2005)
20.
Zurück zum Zitat Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: ACM Conference on Computer and Communications Security (CCS) (2010) Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: ACM Conference on Computer and Communications Security (CCS) (2010)
21.
Zurück zum Zitat Hao, S., Syed, N.A., Feamster, N., Gray, A.G., Krasser, S.: Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. In: USENIX Security Symposium (2009) Hao, S., Syed, N.A., Feamster, N., Gray, A.G., Krasser, S.: Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. In: USENIX Security Symposium (2009)
22.
Zurück zum Zitat Herley, C.: Why do Nigerian scammers say they are from Nigeria? In: Workshop on the Economics of Information Security (WEIS) (2012) Herley, C.: Why do Nigerian scammers say they are from Nigeria? In: Workshop on the Economics of Information Security (WEIS) (2012)
23.
Zurück zum Zitat Hitsch, G.J., Hortacsu, A., Ariely, D.: What makes you click: an empirical analysis of online dating. Society for Economic Dynamics Meeting Papers (2005) Hitsch, G.J., Hortacsu, A., Ariely, D.: What makes you click: an empirical analysis of online dating. Society for Economic Dynamics Meeting Papers (2005)
24.
Zurück zum Zitat Isacenkova, J., Thonnard, O., Costin, A., Balzarotti, D., Francillon, A.: Inside the SCAM jungle: a closer look at 419 scam email operations. In: International Workshop on Cyber Crime (IWCC) (2013) Isacenkova, J., Thonnard, O., Costin, A., Balzarotti, D., Francillon, A.: Inside the SCAM jungle: a closer look at 419 scam email operations. In: International Workshop on Cyber Crime (IWCC) (2013)
25.
Zurück zum Zitat Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: International ACM SIGIR Conference on Research and Development in Information Retrieval (2010) Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: International ACM SIGIR Conference on Research and Development in Information Retrieval (2010)
26.
Zurück zum Zitat Park, Y., Jones, J., McCoy, D., Shi, E., Jakobsson, M.: Scambaiter: understanding targeted nigerian scams on craigslist. In: Symposium on Network and Distributed System Security (NDSS) (2014) Park, Y., Jones, J., McCoy, D., Shi, E., Jakobsson, M.: Scambaiter: understanding targeted nigerian scams on craigslist. In: Symposium on Network and Distributed System Security (NDSS) (2014)
27.
Zurück zum Zitat Pitsillidis, A., Levchenko, K., Kreibich, C., Kanich, C., Voelker, G.M., Paxson, V., Weaver, N., Savage, S.: Botnet judo: fighting spam with itself. In: Symposium on Network and Distributed System Security (NDSS) (2010) Pitsillidis, A., Levchenko, K., Kreibich, C., Kanich, C., Voelker, G.M., Paxson, V., Weaver, N., Savage, S.: Botnet judo: fighting spam with itself. In: Symposium on Network and Distributed System Security (NDSS) (2010)
28.
Zurück zum Zitat Pizzato, L.A., Akehurst, J., Silvestrini, C., Yacef, K., Koprinska, I., Kay, J.: The effect of suspicious profiles on people recommenders. In: Masthoff, J., Mobasher, B., Desmarais, M.C., Nkambou, R. (eds.) UMAP 2012. LNCS, vol. 7379, pp. 225–236. Springer, Heidelberg (2012) CrossRef Pizzato, L.A., Akehurst, J., Silvestrini, C., Yacef, K., Koprinska, I., Kay, J.: The effect of suspicious profiles on people recommenders. In: Masthoff, J., Mobasher, B., Desmarais, M.C., Nkambou, R. (eds.) UMAP 2012. LNCS, vol. 7379, pp. 225–236. Springer, Heidelberg (2012) CrossRef
29.
Zurück zum Zitat Rege, A.: What’s love got to do with it? Exploring online dating scams and identity fraud. Int. J. Cyber Criminol. 3(2), 494–512 (2009) Rege, A.: What’s love got to do with it? Exploring online dating scams and identity fraud. Int. J. Cyber Criminol. 3(2), 494–512 (2009)
30.
Zurück zum Zitat Sahami, M., Dumais, S., Heckermann, D., Horvitz, E.: A Bayesian approach to filtering junk e-mail. Learning for Text Categorization (1998) Sahami, M., Dumais, S., Heckermann, D., Horvitz, E.: A Bayesian approach to filtering junk e-mail. Learning for Text Categorization (1998)
31.
Zurück zum Zitat Stringhini, G., Holz, T., Stone-Gross, B., Kruegel, C., Vigna, G.: BotMagnifier: locating spambots on the Internet. In: USENIX Security Symposium (2011) Stringhini, G., Holz, T., Stone-Gross, B., Kruegel, C., Vigna, G.: BotMagnifier: locating spambots on the Internet. In: USENIX Security Symposium (2011)
32.
Zurück zum Zitat Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Annual Computer Security Applications Conference (ACSAC) (2010) Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Annual Computer Security Applications Conference (ACSAC) (2010)
33.
Zurück zum Zitat Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y.: Follow the green: growth and dynamics in twitter follower markets. In: ACM SIGCOMM Conference on Internet Measurement (2013) Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y.: Follow the green: growth and dynamics in twitter follower markets. In: ACM SIGCOMM Conference on Internet Measurement (2013)
35.
Zurück zum Zitat Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., Zhao, B.Y.: Social turing tests: crowdsourcing sybil detection. In: Symposium on Network and Distributed System Security (NDSS) (2013) Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., Zhao, B.Y.: Social turing tests: crowdsourcing sybil detection. In: Symposium on Network and Distributed System Security (NDSS) (2013)
36.
Zurück zum Zitat Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf: crowdturfing for fun and profit. In: Wold Wide Web Conference (WWW) (2012) Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf: crowdturfing for fun and profit. In: Wold Wide Web Conference (WWW) (2012)
37.
Zurück zum Zitat Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychology Behav. Soc. Netw. 15(3), 181–183 (2012)CrossRef Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychology Behav. Soc. Netw. 15(3), 181–183 (2012)CrossRef
38.
Zurück zum Zitat Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. SIGCOMM Comput. Commun. Rev. 38, 171–182 (2008)CrossRef Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. SIGCOMM Comput. Commun. Rev. 38, 171–182 (2008)CrossRef
39.
Zurück zum Zitat Xu, W., Zhang, F., Zhu, S.: Toward worm detection in online social networks. In: Annual Computer Security Applications Conference (ACSAC) (2010) Xu, W., Zhang, F., Zhu, S.: Toward worm detection in online social networks. In: Annual Computer Security Applications Conference (ACSAC) (2010)
40.
Zurück zum Zitat Yang, B., Gu, F., Niu, X.: Block mean value based image perceptual hashing. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2006) Yang, B., Gu, F., Niu, X.: Block mean value based image perceptual hashing. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2006)
41.
Zurück zum Zitat Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318–337. Springer, Heidelberg (2011) CrossRef Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318–337. Springer, Heidelberg (2011) CrossRef
42.
Zurück zum Zitat Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 40(4), 363–374 (2006) Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 40(4), 363–374 (2006)
43.
Zurück zum Zitat Zhang, C.M., Paxson, V.: Detecting and analyzing automated activity on twitter. In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol. 6579, pp. 102–111. Springer, Heidelberg (2011) CrossRef Zhang, C.M., Paxson, V.: Detecting and analyzing automated activity on twitter. In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol. 6579, pp. 102–111. Springer, Heidelberg (2011) CrossRef
Metadaten
Titel
Quit Playing Games with My Heart: Understanding Online Dating Scams
verfasst von
JingMin Huang
Gianluca Stringhini
Peng Yong
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-20550-2_12

Premium Partner