skip to main content
10.1145/2382196.2382235acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Innocent by association: early recognition of legitimate users

Authors Info & Claims
Published:16 October 2012Publication History

ABSTRACT

This paper presents the design and implementation of Souche, a system that recognizes legitimate users early in online services. This early recognition contributes to both usability and security. Souche leverages social connections established over time. Legitimate users help identify other legitimate users through an implicit vouching process, strategically controlled within vouching trees. Souche is lightweight and fully transparent to users. In our evaluation on a real dataset of several hundred million users, Souche can efficiently identify 85% of legitimate users early, while reducing the percentage of falsely admitted malicious users from 44% to 2.4%. Our evaluation further indicates that Souche is robust in the presence of compromised accounts. It is generally applicable to enhance usability and security for a wide class of online services.

References

  1. Cyber-Criminals Shift to Compromised Web Mail Accounts for Spam Delivery. http://www.eweek.com/c/a/Messaging-and-Collaboration/CyberCriminals-Shift-to-Compromised-Web-Mail-Accounts-for-Spam-Delivery-808933/.Google ScholarGoogle Scholar
  2. Inside India's CAPTCHA-Solving Economy. http://blogs.zdnet.com/security/?p=1835.Google ScholarGoogle Scholar
  3. Message Bounced Due to Sending Limit. http://mail.google.com/support/bin/answer.py?hl=en&answer=22839.Google ScholarGoogle Scholar
  4. New Spammer Tactics--Compromised Accounts Now Favored. http://blog.commtouch.com/cafe/dataand-research/new-spammer-tactics.Google ScholarGoogle Scholar
  5. Rise in Hacked Gmail, Hotmail, and Yahoo Email. http://www.boxaid.com/word/viruses-and-malware/rise-in-hacked-gmail-hotmailand-yahoo-email.Google ScholarGoogle Scholar
  6. Spammers Using Porn to Break Captchas. http://www.schneier.com/blog/archives/2007/11/spammers_using.html.Google ScholarGoogle Scholar
  7. Twitter User Reputation Computed from Tweets. http://blog.tagwalk.com/2009/11/twitter-user-reputation-computed-from-tweets.Google ScholarGoogle Scholar
  8. Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong. Analysis of Topological Characteristics of Huge Online Social Networking Services. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Bonato, J. Janssen, and P. Pralat. A Geometric Model for On-line Social Networks. In Workshop on Online Social Networks (WOSN), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The Socialbot Network: When Bots Socialize for Fame and Money. In Proc. of the 27th Annual Computer Security Applications Conference (ACSAC'11), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Boykin and V. P. Roychowdhury. Leveraging Social Networks to Fight Spam. IEEE Computer, 38, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Bursztein, S. Bethard, C. Fabry, J. C. Mitchell, and D. Jurafsky. How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation. In IEEE Syposium of Security and Privacy, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Chirita, J. Diederich, and W. Nejdl. MailRank: Global Attack-Resistant Whitelists for Spam Detection. In Conference on Information and Knowledge Management (CIKM), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.Google ScholarGoogle Scholar
  16. J. Douceur. The Sybil Attack. In IPTPS, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Golbeck. Computing with Social Trust. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Grier, , K. Thomas, V. Paxson, and M. Zhang. @spam: The Underground on 140 Characters or Less. In CCS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Kleinberg. The Small-World Phenomenon: An Algorithmic Perspective. In Proc. 32nd ACM Symposium on Theory of Computing, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and Analysis of Online Social Networks. In IMC, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Mohaisen, A. Yun, and Y. Kim. Measuring the Mixing Time of Social Graphs. In IMC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re: CAPTCHAs--Understanding CAPTCHA-Solving Services in an Economic Context. In Usenix Security, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. P. V. Shah and A. Mislove. Bazaar: Strengthening User Reputations in Online Marketplaces. In NSDI, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. N. Tran, J. Li, L. Subramanian, and S. S. Chow. Optimal Sybil-resilient Node Admission Control. In Infocom, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  26. N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-Resilient Online Content Voting. In NSDI, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. Viswanath, K. P. Gummadi, A. Post, and A. Mislove. An Analysis of Social Network-Based Sybil Defenses. In SIGCOMM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and B. Y. Zhao. User Interactions in Social Networks and their Implications. In EuroSys, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. In SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering Social Network Sybils in the Wild. In IMC, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In IEEE Symposium on Security and Privacy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Y. Yu, M. Isard, D. Fetterly, M. Budiu, U. Erlingsson, P. K. Gunda, and J. Currey. DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. In OSDI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. BotGraph: Large Scale Spamming Botnet Detection. In NSDI, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Innocent by association: early recognition of legitimate users

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
      October 2012
      1088 pages
      ISBN:9781450316514
      DOI:10.1145/2382196

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 October 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader