Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2615569.2615688acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Twitter: who gets caught? observed trends in social micro-blogging spam

Published: 23 June 2014 Publication History

Abstract

Spam in Online Social Networks (OSNs) is a systemic problem that imposes a threat to these services in terms of undermining their value to advertisers and potential investors, as well as negatively affecting users' engagement. In this work, we present a unique analysis of spam accounts in OSNs viewed through the lens of their behavioral characteristics (i.e., profile properties and social interactions). Our analysis includes over 100 million tweets collected over the course of one month, generated by approximately 30 million distinct user accounts, of which over 7% are suspended or removed due to abusive behaviors and other violations. We show that there exist two behaviorally distinct categories of twitter spammers and that they employ different spamming strategies. The users in these two categories demonstrate different individual properties as well as social interaction patterns. As the Twitter spammers continuously keep creating newer accounts upon being caught, a behavioral understanding of their spamming behavior will be vital in the design of future social media defense mechanisms.

References

[1]
A. Almaatouq, F. Alhasoun, R. Campari, and A. Alfaris. The influence of social norms on synchronous versus asynchronous communication technologies. In Proceedings of the 1st ACM International Workshop on Personal Data Meets Distributed Multimedia, PDM '13, pages 39-42, New York, NY, USA, 2013. ACM.
[2]
Y. Altshuler, N. Aharony, A. Pentland, Y. Elovici, and M. Cebrian. Stealing reality: When criminals become data scientists (or vice versa). IEEE Intelligent Systems, 26(6):22--30, 2011.
[3]
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on Twitter. In Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), July 2010.
[4]
J. Borondo, A. J. Morales, J. C. Losada, and R. M. Benito. Characterizing and modeling an electoral campaign in the context of Twitter: 2011 Spanish Presidential election as a case study. Chaos: An Interdisciplinary Journal of Nonlinear Science, 22(2), 2012.
[5]
U. Brandes. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology, 25:163--177, 2001.
[6]
S. Chhabra, A. Aggarwal, F. Benevenuto, and P. Kumaraguru. Phi.sh/$ocial: The phishing landscape through short urls. In Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS '11, pages 92--101, New York, NY, USA, 2011. ACM.
[7]
A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. SIAM Rev., 51(4):661--703, Nov. 2009.
[8]
M. Conover, J. Ratkiewicz, M. Francisco, B. Gonçalves, A. Flammini, and F. Menczer. Political polarization on twitter. In Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM), 2011.
[9]
M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. COMPA: Detecting Compromised Accounts on Social Networks. In ISOC Network and Distributed System Security Symposium (NDSS), 2013.
[10]
L. C. Freeman. A Set of Measures of Centrality Based on Betweenness. Sociometry, 40(1):35--41, Mar. 1977.
[11]
S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twitter social network. In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages 61--70, New York, NY, USA, 2012. ACM.
[12]
GlobalWebIndex. Global web index: Q4 2012, 2013.
[13]
S. González-Bailón, J. Borge-Holthoefer, A. Rivero, and Y. Moreno. The dynamics of protest recruitment through an online network.
[14]
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The underground on 140 characters or less. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pages 27--37, New York, NY, USA, 2010. ACM.
[15]
S. Kato, A. Koide, T. Fushimi, K. Saito, and H. Motoda. Network analysis of three twitter functions: Favorite, follow and mention. In D. Richards and B. Kang, editors, Knowledge Management and Acquisition for Intelligent Systems, volume 7457 of Lecture Notes in Computer Science, pages 298--312. Springer Berlin Heidelberg, 2012.
[16]
C. Lumezanu, N. Feamster, and H. Klein. bias: Measuring the tweeting behavior of propagandists. In ICWSM, 2012.
[17]
A. Marcus, M. S. Bernstein, O. Badar, D. R. Karger, S. Madden, and R. C. Miller. Twitinfo: Aggregating and visualizing microblogs for event exploration. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, pages 227--236, New York, NY, USA, 2011. ACM.
[18]
M. McCord and M. Chuah. Spam detection on twitter using traditional classifiers. In Proceedings of the 8th international conference on Autonomic and trusted computing, ATC'11, pages 175--186, Berlin, Heidelberg, 2011. Springer-Verlag.
[19]
F. Morstatter, J. Pfeffer, H. Liu, and K. M. Carley. Is the sample good enough? comparing data from Twitter's streaming API with Twitter's Firehose. Proceedings of ICWSM, 2013.
[20]
M. E. J. Newman. Power laws, pareto distributions and zipf's law. Contemporary Physics, 46:323--351, December 2005.
[21]
H. Nguyen. 2013 state of social media spam. Technical report, Nexgate, 2013.
[22]
A. Sanzgiri, A. Hughes, and S. Upadhyaya. Analysis of malware propagation in twitter. Reliable Distributed Systems, IEEE Symposium on, 0:195--204, 2013.
[23]
G. Stringhini, M. Egele, C. Kruegel, and G. Vigna. Poultry markets: On the underground economy of twitter followers. In Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks, WOSN '12, pages 1--6, New York, NY, USA, 2012. ACM.
[24]
G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10, page 1, 2010.
[25]
M. Thelwall, K. Buckley, and G. Paltoglou. Sentiment in twitter events. J. Am. Soc. Inf. Sci. Technol., 62(2):406--418, Feb. 2011.
[26]
K. Thomas, C. Grier, and V. Paxson. Adapting Social Spam Infrastructure for Political Censorship. In Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Apr. 2012.
[27]
K. Thomas, C. Grier, D. Song, and V. Paxson. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pages 243--258, New York, NY, USA, 2011. ACM.
[28]
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse. In Proceedings of the 22nd Usenix Security Symposium, 2013.
[29]
Twitter. Following rules and best practices. https://support.twitter.com/articles/68916-following-rules-and-best-practices, 2012. {Online; accessed 22-October-2013}.
[30]
Twitter. Public stream. https://dev.twitter.com/docs/streaming-apis/, 2012. {Online; accessed 1-October-2013}.
[31]
Twitter. Rules. https://support.twitter.com/ articles/18311-the-twitter-rules, 2012. {Online; accessed 1-October-2013}.
[32]
Twitter. Initial public offering of shares of common stock of twitter, inc. http://www.sec.gov/Archives/edgar/ data/1418091/000119312513390321/d564001ds1.htm, 2013. {Online; accessed 5-October-2013}.
[33]
A. H. Wang. Don't follow me: Spam detection in twitter. In Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pages 1--10, 2010.
[34]
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. J. Metzger, H. Zheng, and B. Y. Zhao. Social turing tests: Crowdsourcing sybil detection. In NDSS. The Internet Society, 2013.
[35]
Y. Xie, F. Yu, Q. Ke, M. Abadi, E. Gillum, K. Vitaldevaria, J. Walter, J. Huang, and Z. M. Mao. Innocent by association: Early recognition of legitimate users. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 353--364, New York, NY, USA, 2012. ACM.
[36]
C. Yang, R. Harkreader, and G. Gu. Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In R. Sommer, D. Balzarotti, and G. Maier, editors, Recent Advances in Intrusion Detection, volume 6961 of Lecture Notes in Computer Science, pages 318--337. Springer Berlin Heidelberg, 2011.
[37]
C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web, WWW '12, pages 71--80, New York, NY, USA, 2012. ACM.
[38]
C. M. Zhang and V. Paxson. Detecting and analyzing automated activity on twitter. In Proceedings of the 12th international conference on Passive and active measurement, PAM'11, pages 102--111, Berlin, Heidelberg, 2011. Springer-Verlag.

Cited By

View all
  • (2025)Signed Latent Factors for Spamming Activity DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657320(651-664)Online publication date: 2025
  • (2024)Scalable Spatio-temporal Top-k Interaction Queries on Dynamic CommunitiesACM Transactions on Spatial Algorithms and Systems10.1145/364837410:1(1-25)Online publication date: 16-Feb-2024
  • (2024)Accuracy and Fairness for Web-Based Content Analysis under Temporal Shifts and Delayed LabelingProceedings of the 16th ACM Web Science Conference10.1145/3614419.3644028(268-278)Online publication date: 21-May-2024
  • Show More Cited By

Index Terms

  1. Twitter: who gets caught? observed trends in social micro-blogging spam

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WebSci '14: Proceedings of the 2014 ACM conference on Web science
    June 2014
    318 pages
    ISBN:9781450326223
    DOI:10.1145/2615569
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 June 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. account abuse
    2. microblogging
    3. online social networks
    4. spam

    Qualifiers

    • Research-article

    Conference

    WebSci '14
    Sponsor:
    WebSci '14: ACM Web Science Conference
    June 23 - 26, 2014
    Indiana, Bloomington, USA

    Acceptance Rates

    WebSci '14 Paper Acceptance Rate 29 of 144 submissions, 20%;
    Overall Acceptance Rate 245 of 933 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Signed Latent Factors for Spamming Activity DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657320(651-664)Online publication date: 2025
    • (2024)Scalable Spatio-temporal Top-k Interaction Queries on Dynamic CommunitiesACM Transactions on Spatial Algorithms and Systems10.1145/364837410:1(1-25)Online publication date: 16-Feb-2024
    • (2024)Accuracy and Fairness for Web-Based Content Analysis under Temporal Shifts and Delayed LabelingProceedings of the 16th ACM Web Science Conference10.1145/3614419.3644028(268-278)Online publication date: 21-May-2024
    • (2024)Identifying Risky Vendors in Cryptocurrency P2P MarketplacesProceedings of the ACM Web Conference 202410.1145/3589334.3645475(99-110)Online publication date: 13-May-2024
    • (2023)Misbehavior and Account Suspension in an Online Financial Communication PlatformProceedings of the ACM Web Conference 202310.1145/3543507.3583385(2686-2697)Online publication date: 30-Apr-2023
    • (2021)A Social Network Analysis of the Oceanographic Community: A Fragmented Digital Community of PracticePreservation, Digital Technology & Culture10.1515/pdtc-2020-003049:4(159-181)Online publication date: 5-Jul-2021
    • (2020)On Twitter Purge: A Retrospective Analysis of Suspended UsersCompanion Proceedings of the Web Conference 202010.1145/3366424.3383298(371-378)Online publication date: 20-Apr-2020
    • (2020)An Evaluation of Low-Quality Content Detection Strategies: Which Attributes Are Still Relevant, Which Are Not?Computational Science and Its Applications – ICCSA 202010.1007/978-3-030-58799-4_42(572-585)Online publication date: 1-Oct-2020
    • (2019)RTbustProceedings of the 10th ACM Conference on Web Science10.1145/3292522.3326015(183-192)Online publication date: 26-Jun-2019
    • (2018)Digital Presence of a Research Center as a Research Dissemination Platform: Reach and Resources (Preprint)JMIR Mental Health10.2196/11686Online publication date: 24-Jul-2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media