Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter

@inproceedings{Yang2012AnalyzingSS,
  title={Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter},
  author={Chao Yang and Robert Chandler Harkreader and Jialong Zhang and Seungwon Shin and Guofei Gu},
  booktitle={WWW},
  year={2012}
}
In this paper, we perform an empirical analysis of the cyber criminal ecosystem on Twitter. Essentially, through analyzing inner social relationships in the criminal account community, we find that criminal accounts tend to be socially connected, forming a small-world network. We also find that criminal hubs, sitting in the center of the social graph, are more inclined to follow criminal accounts. Through analyzing outer social relationships between criminal accounts and their social friends… Expand
Constructing and Analyzing Criminal Networks
TLDR
A large scale social graph is constructed from a smaller set of leaked data that included only the criminal's email addresses to identify profiles of high rank criminals, criminal organizations and large scale communities of criminals. Expand
Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit
  • G. Gu
  • Computer Science
  • AISec '12
  • 2012
TLDR
This talk will empirically study the cyber criminal ecosystem on Twitter, show several interesting observations about the malicious social networks, and discuss how to design new inference algorithms to defend against criminal accounts using the information the authors have learned from them. Expand
The Role of the Underground Economy in Social Network Spam and Abuse
Online social networks have emerged as real-time communication platforms connecting billions of users around the globe. Implicit to the interactions within an online social network is the notion ofExpand
A Survey on the Spam Issue in Twitter
TLDR
This study can be considered as an essential step for the design of a unified spam detection framework and discusses the approaches to the detection of spam communities, compromized accounts, collective attention spam, and the extraction of cybercrime knowledge. Expand
Analysis of and defense against crowd-retweeting based spam in social networks
TLDR
This paper investigates crowd-retweeting spam in Sina Weibo, the counterpart of Twitter in China, and proposes retweeting-aware link-based ranking algorithms to infer more suspicious accounts by using identified spammers as seeds. Expand
SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective Classification
  • A. Dorri, M. Abadi, M. Dadfarnia
  • Computer Science
  • 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
  • 2018
TLDR
SocialBotHunter is a semi-supervised collective classification technique that combines the structural information of the social graph with the information on the social behavior of users in a unified manner, in order to detect social botnets in a Twitter-like SNS. Expand
On the impact of social botnets for spam distribution and digital-influence manipulation
TLDR
The effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation are demonstrated through real experiments on Twitter and also trace-driven simulations to help understand the potentially detrimental effects of social botnets and help OSNs improve their bot(net) detection systems. Expand
Combating Fraud in Online Social Networks: Characterizing and Detecting Facebook Like Farms
TLDR
This paper presents a comprehensive analysis and evaluation of existing graph-based fraud detection algorithms for detecting like farm accounts, and shows that more sophisticated and stealthy farms can successfully evade detection by spreading likes over longer timespans and by liking many popular pages to mimic normal users. Expand
Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content
TLDR
A simple and flexible unified framework called SocialKB for modeling social media posts and reasoning about them to ascertain their veracity, a first step towards discovering emerging cyber threats. Expand
Twitter: who gets caught? observed trends in social micro-blogging spam
TLDR
It is shown that there exist two behaviorally distinct categories of twitter spammers and that they employ different spamming strategies, and the users in these two categories demonstrate different individual properties as well as social interaction patterns. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 39 REFERENCES
Detecting spammers on social networks
TLDR
The results show that it is possible to automatically identify the accounts used by spammers, and the analysis was used for take-down efforts in a real-world social network. Expand
Detecting and characterizing social spam campaigns
TLDR
An initial study to detect and quantitatively analyze the coordinated spam campaigns on online social networks in the wild finds that more than 70% of all malicious wall posts are advertising phishing sites. Expand
Uncovering social spammers: social honeypots + machine learning
TLDR
It is found that the deployed social honeypots identify social spammers with low false positive rates and that the harvested spam data contains signals that are strongly correlated with observable profile features (e.g., content, friend information, posting patterns, etc.). Expand
Don't follow me: Spam detection in Twitter
  • A. Wang
  • Computer Science
  • 2010 International Conference on Security and Cryptography (SECRYPT)
  • 2010
TLDR
A spam detection prototype system to identify suspicious users on Twitter and a directed social graph model is proposed to explore the “follower” and “friend” relationships among Twitter to facilitate spam detection. Expand
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers
TLDR
This work makes the first empirical study and evaluation of the effect of evasion tactics utilized by Twitter spammers and is a valuable supplement to this line of research. Expand
Measuring User Influence in Twitter: The Million Follower Fallacy
TLDR
An in-depth comparison of three measures of influence, using a large amount of data collected from Twitter, is presented, suggesting that topological measures such as indegree alone reveals very little about the influence of a user. Expand
Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams
TLDR
An extensible framework that will enable the real-time analysis of meme diffusion in social media by mining, visualizing, mapping, classifying, and modeling massive streams of public microblogging events is introduced. Expand
Outtweeting the Twitterers - Predicting Information Cascades in Microblogs
TLDR
A propagation model is proposed that predicts which users are likely to mention which URLs in the social network of Twitter, a popular microblogging site, and correctly accounts for more than half of the URL mentions in the data set. Expand
Truthy: mapping the spread of astroturf in microblog streams
TLDR
A web service that tracks political memes in Twitter and helps detect astroturfing, smear campaigns, and other misinformation in the context of U.S. political elections is demonstrated. Expand
What is Twitter, a social network or a news media?
TLDR
This work is the first quantitative study on the entire Twittersphere and information diffusion on it and finds a non-power-law follower distribution, a short effective diameter, and low reciprocity, which all mark a deviation from known characteristics of human social networks. Expand
...
1
2
3
4
...