Abstract
Facebook is the world’s largest Online Social Network, having more than one billion users. Like most social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this chapter, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We revisit the scope and definition of what is deemed as “malicious” in the modern day Internet, and identify 627 pages publishing untrustworthy information, misleading content, adult and child unsafe content, scams, etc. We perform in-depth characterization of pages through spatial and temporal analysis. Upon analyzing these pages, our findings reveal dominant presence of politically polarized entities engaging in spreading content from untrustworthy web domains. Studying the temporal posting activity of pages reveals that malicious pages are 1.4 times more active daily than benign pages. We further identify collusive behavior within a set of malicious pages spreading adult and pornographic content. Finally, we attempt to automate the process of detecting malicious Facebook pages by extensively experimenting with multiple supervised learning algorithms and multiple feature sets. Artificial neural networks trained on a fixed sized bag-of-words perform the best and achieve a maximum ROC area under curve value of 0.931.
This chapter is an extended version of the paper titled “Hiding in Plain Sight: Characterizing and Detecting Malicious Facebook Pages” previously accepted at ASONAM 2016.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
Exact description for each of these attributes can be found at https://developers.facebook.com/docs/graph-api/reference/page/.
- 10.
- 11.
References
Aggarwal, A., Rajadesingan, A., Kumaraguru, P.: PhishAri: automatic realtime phishing detection on twitter. In: eCrime Researchers Summit (eCrime), 2012, pp. 1–12. IEEE, Piscataway (2012)
Ahmed, F., Abulaish, M.: An MCL-based approach for spam profile detection in online social networks. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 602–608. IEEE, Piscataway (2012)
Akoglu, L., Chandy, R., Faloutsos, C.: Opinion fraud detection in online reviews by network effects. In: Proceedings of the seventh International AAAI Conference on Weblogs and Social Media, pp. 2–11 (2013)
Carlisle, J.E., Patton, R.C.: Is social media changing how we understand political engagement? An analysis of Facebook and the 2008 presidential election. Polit. Res. Q. 66(4), 883–895 (2013)
Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of the 20th International Conference on World Wide Web, pp. 675–684. ACM, New York (2011)
Cha, M., Haddadi, H., Benevenuto, F., Gummadi, P.K.: Measuring user influence in twitter: the million follower fallacy. In: Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media, pp. 10–17 (2010)
De Choudhury, M., Monroy-Hernandez, A., Mark, G.: Narco emotions: affect and desensitization in social media during the Mexican drug war. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 3563–3572. ACM, New York (2014)
Dewan, P., Kumaraguru, P.: Towards automatic real time identification of malicious posts on Facebook. In: 13th Annual Conference on Privacy, Security and Trust (PST), pp. 85–92. IEEE, Piscataway (2015)
Dewan, P., Bagroy, S., Kumaraguru, P.: Hiding in plain sight: characterizing and detecting malicious Facebook pages. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 193–196. IEEE, Los Alamitos (2016)
Douceur, J.R.: The Sybil attack. In: Peer-to-Peer Systems, pp. 251–260. Springer, Berlin (2002)
Douglas, S., Maruyama, M., Semaan, B., Robertson, S.P.: Politics and young adults: the effects of Facebook on candidate evaluation. In: Proceedings of the 15th Annual International Conference on Digital Government Research, pp. 196–204. ACM, New York (2014). http://doi.acm.org/10.1145/2612733.2612754
Facebook: what is page spam?. https://www.facebook.com/help/116053525145846 (2015). Accessed 18 Sept 2015
Facebook.com: Facebook community standards. https://www.facebook.com/communitystandards (2015). Accessed 12 July 2017
Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection. In: Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media, pp. 175–184 (2013)
Friggeri, A., Adamic, L.A., Eckles, D., Cheng, J.: Rumor cascades. In: Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media (2014)
Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Internet Measurement Conference, pp. 35–47. ACM, New York (2010)
Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.N.: Towards online spam filtering in social networks. In: NDSS (2012)
Guardian, T.: Facebook’s failure: did fake news and polarized politics get trump elected?. https://www.theguardian.com/technology/2016/nov/10/facebook-fake-news-election-conspiracy-theories (2016). Accessed 12 July 2017
Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, p. 2. ACM, New York (2012)
Gupta, M., Zhao, P., Han, J.: Evaluating event credibility on twitter. In: Proceedings of the 2012 SIAM International Conference on Data Mining, pp. 153–164. SIAM, Philadelphia (2012)
Gupta, A., Kumaraguru, P., Castillo, C., Meier, P.: TweetCred: real-time credibility assessment of content on twitter. In: Social Informatics, pp. 228–243. Springer, Cham (2014)
Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Catching synchronized behaviors in large networks: a graph mining approach. ACM Trans. Knowl. Discov. Data 10(4), 35:1–35:27 (2016). Article No. 35
Jiang, M., Cui, P., Faloutsos, C.: Suspicious behavior detection: current trends and future directions. IEEE Intell. Syst. 31, 31–39 (2016)
Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219–230. ACM, New York (2008)
Karma, F.: Study: average growth of Facebook fan pages. http://blog.fanpagekarma.com/2013/03/20/infographic-average-growths-facebook-fan-pages/ (2013). Accessed 12 July 2017
Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 435–442. ACM, New York (2010)
Lim, E.P., Nguyen, V.A., Jindal, N., Liu, B., Lauw, H.W.: Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, pp. 939–948. ACM, New York (2010)
Mann, H.B., Whitney, D.R.: On a test of whether one of two random variables is stochastically larger than the other. Ann. Math. Stat. 18(1), 50–60 (1947)
Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we RT? In: Proceedings of the First Workshop on Social Media Analytics, pp. 71–79. ACM, New York (2010)
Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st International Conference on World Wide Web, pp. 191–200. ACM, New York (2012)
Mukherjee, A., Kumar, A., Liu, B., Wang, J., Hsu, M., Castellanos, M., Ghosh, R.: Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 632–640. ACM, New York (2013)
Pennebaker, J.W., Chung, C.K., Ireland, M., Gonzales, A., Booth, R.J.: The development and psychometric properties of LIWC2007, Austin, TX: LIWC.net (2007)
Rahman, M.S., Huang, T.K., Madhyastha, H.V., Faloutsos, M.: Efficient and scalable socware detection in online social networks. In: USENIX Security Symposium, pp. 663–678 (2012)
Ratkiewicz, J., Conover, M., Meiss, M., Gonçalves, B., Patil, S., Flammini, A., Menczer, F.: Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp. 249–252. ACM, New York (2011)
Ratkiewicz, J., Conover, M., Meiss, M.R., Gonçalves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, pp. 297–304 (2011)
Sheng, S., Wardman, B., Warner, G., Cranor, L., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: Sixth Conference on Email and Anti-Spam (CEAS) (2009)
Stieglitz, S., Dang-Xuan, L.: Political communication and influence through microblogging – an empirical analysis of sentiment in twitter messages and retweet behavior. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 3500–3509. IEEE, Los Alamitos (2012)
Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1–9. ACM, New York (2010)
Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Election forecasts with twitter: How 140 characters reflect the political landscape. Soc. Sci. Comput. Rev. 29, 402–418 (2010). https://doi.org/10.1177/0894439310386557
Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Predicting elections with twitter: What 140 characters reveal about political sentiment. In: Proceedings of the fourth International AAAI Conference on Weblogs and Social Media, pp. 178–185 (2010)
Vitak, J., Zube, P., Smock, A., Carr, C.T., Ellison, N., Lampe, C.: It’s complicated: Facebook users’ political participation in the 2008 election. CyberPsychol. Behav. Soc. Netw. 14(3), 107–114 (2011)
Wang, Y., Leon, P.G., Scott, K., Chen, X., Acquisti, A., Cranor, L.F.: Privacy nudges for social media: an exploratory facebook study. In: Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 763–770. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva (2013)
WOT: Web of trust api. https://www.mywot.com/en/api (2014). Accessed 12 July 2017
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network Sybils in the wild. ACM Trans. Knowl. Discov. Data 8(1), 2 (2014)
Zhang, X., Zhu, S., Liang, W.: Detecting spam and promoting campaigns in the twitter social network. In: IEEE 12th International Conference on Data Mining (ICDM), pp. 1194–1199. IEEE, Piscataway (2012)
Acknowledgements
We would like to thank all the members of Precog Research Group and Cybersecurity Education and Research Centre (CERC) at IIIT Delhi for their constant support and feedback for this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Dewan, P., Bagroy, S., Kumaraguru, P. (2018). Hiding in Plain Sight: The Anatomy of Malicious Pages on Facebook. In: Kaya, M., Kawash, J., Khoury, S., Day, MY. (eds) Social Network Based Big Data Analysis and Applications. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-78196-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-78196-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78195-2
Online ISBN: 978-3-319-78196-9
eBook Packages: Social SciencesSocial Sciences (R0)