Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2309996.2310010acmconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

Short links under attack: geographical analysis of spam in a URL shortener network

Published: 25 June 2012 Publication History

Abstract

URL shortener services today have come to play an important role in our social media landscape. They direct user attention and disseminate information in online social media such as Twitter or Facebook. Shortener services typically provide short URLs in exchange for long URLs. These short URLs can then be shared and diffused by users via online social media, e-mail or other forms of electronic communication. When another user clicks on the shortened URL, she will be redirected to the underlying long URL. Shortened URLs can serve many legitimate purposes, such as click tracking, but can also serve illicit behavior such as fraud, deceit and spam. Although usage of URL shortener services today is ubiquituous, our research community knows little about how exactly these services are used and what purposes they serve. In this paper, we study usage logs of a URL shortener service that has been operated by our group for more than a year. We expose the extent of spamming taking place in our logs, and provide first insights into the planetary-scale of this problem. Our results are relevant for researchers and engineers interested in understanding the emerging phenomenon and dangers of spamming via URL shortener services.

References

[1]
We want 'em shorter. http://www.metafilter.com/8916/, 2001.
[2]
TinyURL Shortener. http://tinyurl.com/, 2002.
[3]
rcdn data. http://rcdn.info/data.html - rcdn dataset, 2011.
[4]
qr.cx usage time analysis video. http://qr.cx/8Ctq or http://youtu.be/06Mhn0L23Tk, 2012.
[5]
The Coral Content Distribution Network. http://www.coralCDN.org/, 2012.
[6]
D. Antoniades, I. Polakis, G. Kontaxis, E. Athanasopoulos, S. Ioannidis, E. P. Markatos, and T. Karagiannis. we.b: the web of short urls. In Proceedings of the 20th international conference on World wide web, WWW '11, pages 715--724, New York, NY, USA, 2011. ACM.
[7]
D. G. Bonett. Pearson chi-square estimator and test for log-linear models with expected frequencies subject to linear constraints. Statistics & Probability Letters, 8(2):175--177, June 1989.
[8]
S. Chhabra, A. Aggarwal, F. Benevenuto, and P. Kumaraguru. Phi.sh/$ocial: the phishing landscape through short urls. In Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS '11, pages 92--101, New York, NY, USA, 2011. ACM.
[9]
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: the underground on 140 characters or less. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 27--37, New York, NY, USA, 2010.
[10]
T. Inoue, F. Toriumi, Y. Shirai, and S.-i. Minato. Great east japan earthquake viewed from a url shortener. In Proceedings of the Special Workshop on Internet and Disasters, SWID '11, pages 8:1--8:8, New York, NY, USA, 2011. ACM.
[11]
J. Leskovec and E. Horvitz. Planetary-scale views on a large instant-messaging network. Proceeding of the 17th international conference on World Wide Web WWW 08, 393:915, 2008.
[12]
C. Wagner, S. Mitter, C. Koerner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW'12 Workshop on 'Making Sense of Microposts' (MSM2012), 2012.
[13]
S. Wasserman and K. Faust. Social Network Analysis: Methods and Applications. Number 8 in Structural analysis in the social sciences. Cambridge University Press, 1994.

Cited By

View all
  • (2022)Spammer Detection Approaches in Online Social Network (OSNs): A SurveySustainable Management of Manufacturing Systems in Industry 4.010.1007/978-3-030-90462-3_11(159-180)Online publication date: 1-Feb-2022
  • (2021)Robust Ensemble Machine Learning Model for Filtering Phishing URLs: Expandable Random Gradient Stacked Voting Classifier (ERG-SVC)IEEE Access10.1109/ACCESS.2021.31246289(150142-150161)Online publication date: 2021
  • (2020)Finding Automated (Bot, Sensor) or Semi-Automated (Cyborg) Social Media Accounts Using Network Analysis and NodeXL BasicRobotic Systems10.4018/978-1-7998-1754-3.ch060(1250-1289)Online publication date: 2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HT '12: Proceedings of the 23rd ACM conference on Hypertext and social media
June 2012
340 pages
ISBN:9781450313353
DOI:10.1145/2309996
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. link analysis
  2. spam
  3. url shortener

Qualifiers

  • Research-article

Conference

HT '12
Sponsor:
HT '12: 23rd ACM Conference on Hypertext and Social Media
June 25 - 28, 2012
Wisconsin, Milwaukee, USA

Acceptance Rates

HT '12 Paper Acceptance Rate 33 of 120 submissions, 28%;
Overall Acceptance Rate 378 of 1,158 submissions, 33%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Spammer Detection Approaches in Online Social Network (OSNs): A SurveySustainable Management of Manufacturing Systems in Industry 4.010.1007/978-3-030-90462-3_11(159-180)Online publication date: 1-Feb-2022
  • (2021)Robust Ensemble Machine Learning Model for Filtering Phishing URLs: Expandable Random Gradient Stacked Voting Classifier (ERG-SVC)IEEE Access10.1109/ACCESS.2021.31246289(150142-150161)Online publication date: 2021
  • (2020)Finding Automated (Bot, Sensor) or Semi-Automated (Cyborg) Social Media Accounts Using Network Analysis and NodeXL BasicRobotic Systems10.4018/978-1-7998-1754-3.ch060(1250-1289)Online publication date: 2020
  • (2020)Spam Detection in Link Shortening Web Services Through Social Network Data AnalysisData Engineering and Communication Technology10.1007/978-981-15-1097-7_9(103-118)Online publication date: 9-Jan-2020
  • (2019)Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising AutoencoderTrusted Computing and Information Security10.1007/978-981-13-5913-2_23(372-388)Online publication date: 9-Jan-2019
  • (2018)Using URL shorteners to compare phishing and malware attacks2018 APWG Symposium on Electronic Crime Research (eCrime)10.1109/ECRIME.2018.8376215(1-13)Online publication date: May-2018
  • (2018)Bit.ly/practice: Uncovering content publishing and sharing through URL shortening servicesTelematics and Informatics10.1016/j.tele.2018.03.00335:5(1310-1323)Online publication date: Aug-2018
  • (2017)Finding Automated (Bot, Sensor) or Semi-Automated (Cyborg) Social Media Accounts Using Network Analysis and NodeXL BasicSocial Media Listening and Monitoring for Business Applications10.4018/978-1-5225-0846-5.ch014(383-424)Online publication date: 2017
  • (2017)Using supervised machine learning algorithms to detect suspicious URLs in online social networksProceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201710.1145/3110025.3116201(1104-1111)Online publication date: 31-Jul-2017
  • (2017)Phishing environments, techniques, and countermeasuresComputers and Security10.1016/j.cose.2017.04.00668:C(160-196)Online publication date: 1-Jul-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media