Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2663716.2663729acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots

Published: 05 November 2014 Publication History

Abstract

Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Recently, the number of likes of a Facebook page has become a measure of its popularity and profitability, and an underground market of services boosting page likes, aka like farms, has emerged. Some reports have suggested that like farms use a network of profiles that also like other pages to elude fraud protection algorithms, however, to the best of our knowledge, there has been no systematic analysis of Facebook pages' promotion methods.
This paper presents a comparative measurement study of page likes garnered via Facebook ads and by a few like farms. We deploy a set of honeypot pages, promote them using both methods, and analyze garnered likes based on likers' demographic, temporal, and social characteristics. We highlight a few interesting findings, including that some farms seem to be operated by bots and do not really try to hide the nature of their operations, while others follow a stealthier approach, mimicking regular users' behavior.

References

[1]
Facebook Ads Optimization. http://weigend.com/files/teaching/stanford/2009/homeworks/ad_optimization_final.pdf.
[2]
Selenium WebDriver: Browser Automation. http://docs.seleniumhq.org/projects/webdriver/.
[3]
C. Arthur. How low-paid workers at "click farms" create appearance of online popularity. http://www.theguardian.com/technology/2013/aug/02/click-farms-appearance-online-popularity, August 2013.
[4]
A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos. CopyCatch: Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks. In WWW, 2013.
[5]
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI, 2012.
[6]
B. Carter. The Like Economy: How Businesses Make Money with Facebook. Que Publishing, 2013.
[7]
R. Cellan-Jones. Who "likes" my Virtual Bagels? http://www.bbc.co.uk/news/technology-18819338, July 2012.
[8]
A. Chaabane, G. Acs, and M.-A. Kaafar. You Are What You Like! Information Leakage Through Users' Interests. In NDSS, 2012.
[9]
T. Chen, A. Chaabane, P. U. Tournoux, M.-A. Kaafar, and R. Boreli. How Much is too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness. In PETS, 2013.
[10]
G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.
[11]
V. Dave, S. Guha, and Y. Zhang. Measuring and Fingerprinting Click-Spam in Ad Networks. In SIGCOMM, 2012.
[12]
eMarketer. Mobile Growth Pushes Facebook to Become No. 2 US Digital Ad Seller. http://preview.tinyurl.com/mq6vu3u, December 2013.
[13]
Facebook. Can I buy likes for my Facebook Page? http://www.facebook.com/help/281084665319172.
[14]
J. Filan. Facebook Ads: What Are You Really Paying For? http://www.searchenginejournal.com/facebook-ads-what-are-you-really-paying-for/46194/, July 2012.
[15]
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. Detecting and Characterizing Social Spam Campaigns. In IMC, 2010.
[16]
J. Lafferty. How Many Pages Does The Average Facebook User Like? http://allfacebook.com/how-many-pages-does-the-average-facebook-user-like_b115098, 2013.
[17]
K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: Social honeypots + machine learning. In SIGIR, 2010.

Cited By

View all
  • (2024)Towards understanding bogus traffic service in online social networks在线社交网络中的虚假流量服务挖掘Frontiers of Information Technology & Electronic Engineering10.1631/FITEE.230006825:3(415-431)Online publication date: 23-Mar-2024
  • (2023)Enlightening the Darknets: Augmenting Darknet Visibility With Active ProbesIEEE Transactions on Network and Service Management10.1109/TNSM.2023.326767120:4(5012-5025)Online publication date: Dec-2023
  • (2023)Stargazer: Long-term and Multiregional Measurement of Timing/Geolocation-based CloakingIEEE Access10.1109/ACCESS.2023.3280815(1-1)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IMC '14: Proceedings of the 2014 Conference on Internet Measurement Conference
November 2014
524 pages
ISBN:9781450332132
DOI:10.1145/2663716
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. honeypots
  2. malicious activities
  3. online social networks

Qualifiers

  • Research-article

Conference

IMC '14
Sponsor:
IMC '14: Internet Measurement Conference
November 5 - 7, 2014
BC, Vancouver, Canada

Acceptance Rates

IMC '14 Paper Acceptance Rate 32 of 103 submissions, 31%;
Overall Acceptance Rate 277 of 1,083 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)58
  • Downloads (Last 6 weeks)7
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Towards understanding bogus traffic service in online social networks在线社交网络中的虚假流量服务挖掘Frontiers of Information Technology & Electronic Engineering10.1631/FITEE.230006825:3(415-431)Online publication date: 23-Mar-2024
  • (2023)Enlightening the Darknets: Augmenting Darknet Visibility With Active ProbesIEEE Transactions on Network and Service Management10.1109/TNSM.2023.326767120:4(5012-5025)Online publication date: Dec-2023
  • (2023)Stargazer: Long-term and Multiregional Measurement of Timing/Geolocation-based CloakingIEEE Access10.1109/ACCESS.2023.3280815(1-1)Online publication date: 2023
  • (2023)An analysis of fake social media engagement servicesComputers & Security10.1016/j.cose.2022.103013124(103013)Online publication date: Jan-2023
  • (2023)Social Honeypot for Humans: Luring People Through Self-managed Instagram PagesApplied Cryptography and Network Security10.1007/978-3-031-33488-7_12(309-336)Online publication date: 29-May-2023
  • (2022)Blackmarket-Driven Collusion on Online Media: A SurveyACM/IMS Transactions on Data Science10.1145/35179312:4(1-37)Online publication date: 17-May-2022
  • (2022)Exploring the security and privacy risks of chatbots in messaging servicesProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561433(581-588)Online publication date: 25-Oct-2022
  • (2022)The Effect of Hiding Dislikes on the Use of YouTube's Like and Dislike FeaturesProceedings of the 14th ACM Web Science Conference 202210.1145/3501247.3531546(202-207)Online publication date: 26-Jun-2022
  • (2022)What Scanners do at L7? Exploring Horizontal Honeypots for Security Monitoring2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW55150.2022.00037(307-313)Online publication date: Jun-2022
  • (2021)Opinion formation systems via deterministic particles approximationKinetic & Related Models10.3934/krm.202004814:1(45)Online publication date: 2021
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media