[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3227696.3227712acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmisncConference Proceedingsconference-collections
research-article

Supervised Classification of Social Spammers using a Similarity-based Markov Random Field Approach

Published: 16 July 2018 Publication History

Abstract

Social spam has been plaguing online social networks for years. Being the sites where online users spend most of their time, the battle to capitalize and monetize users' attention is actively fought by both spammers and legitimate sites operators. Social spam detection systems have been proposed as early as 2010. They commonly exploit users' content and behavioral characteristics to build supervised classifiers. Yet spam is an evolving concept, and developed supervised classifiers often become obsolete with the spam community continuously trying to evade detection. In this paper, we use similarity between users to correct evasion-induced errors in the predictions of spam filters. Specifically, we link similar accounts based on their shared applications and build a Markov Random Field model on top of the resulting similarity graph. We use this graphical model in conjunction with traditional supervised classifiers and test the proposed model on a dataset that we recently collected from Twitter. Results show that the proposed model improves the accuracy of classical classifiers by increasing both the precision and the recall of state-of-the-art systems.

References

[1]
Anupama Aggarwal, Ashwin Rajadesingan, and Ponnurangam Kumaraguru. 2012. PhishAri: Automatic realtime phishing detection on twitter. In eCrime Researchers Summit (eCrime), 2012. IEEE, 1--12.
[2]
Faraz Ahmed and Muhammad Abulaish. 2012. An MCL-based approach for spam profile detection in online social networks. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom- 2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 (2012), 602--608.
[3]
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. 2010. Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), Vol. 6. 12.
[4]
Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, and Christos Faloutsos. 2013. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. In Proceedings of the 22nd international conference on World WideWeb. InternationalWorld WideWeb Conferences Steering Committee, 119--130.
[5]
Sajid Yousuf Bhat and Muhammad Abulaish. 2013. Community-based features for identifying spammers in online social networks. Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining - ASONAM '13 (2013), 100--107.
[6]
Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14. ACM Press, New York, New York, USA, 477--488.
[7]
Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia. 2010. Who is tweeting on Twitter: human, bot, or cyborg?. In Proceedings of the 26th annual computer security applications conference. ACM, 21--30.
[8]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2015. Fame for sale: Efficient detection of fake Twitter followers. arXiv preprint 80, July 2012 (2015), 1--34. http://arxiv.org/abs/1509.04098
[9]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2016. DNA-inspired online behavioral modeling and its application to spambot detection. IEEE Intelligent Systems 31, 5 (2016), 58--64.
[10]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. arXiv preprint arXiv:1701.03017 (2017).
[11]
Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2013. COMPA: Detecting Compromised Accounts on Social Networks. In NDSS. arXiv:1509.03531
[12]
Nour El-Mawass and Saad Alaboodi. 2016. Detecting Arabic Spammers and Content Polluters on Twitter. In 6th International Conference on Digital Information Processing and Communications (ICDIPC'16). IEEE, Beirut, Lebanon.
[13]
Nour El-Mawass and Saad Alaboodi. 2017. Data Quality Challenges in Social Spam Research. ACM Journal on Data and Information Qulaity (2017).
[14]
David Mandell Freeman. 2017. Can You Spot the Fakes?: On the Limitations of User Feedback in Online Social Networks. In Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 1093--1102.
[15]
Peng Gao, Neil Zhenqiang Gong, Sanjeev Kulkarni, Kurt Thomas, and Prateek Mittal. 2015. Sybilframe: A defense-in-depth framework for structure-based sybil detection. arXiv preprint arXiv:1503.02985 (2015), 17. arXiv:1503.02985 http://arxiv.org/abs/1503.02985
[16]
Saptarshi Ghosh, Bimal Viswanath, Farshad Kooti, Naveen Kumar Sharma, Gautam Korlam, Fabricio Benevenuto, Niloy Ganguly, and Krishna Phani Gummadi. 2012. Understanding and combating link farming in the twitter social network. In Proceedings of the 21st international conference on World Wide Web - WWW 12. ACM Press, New York, New York, USA, 61.
[17]
Neil Zhenqiang Gong, Mario Frank, and Prateek Mittal. 2014. SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection. IEEE Transactions on Information Forensics and Security 9, 6 (jun 2014), 976--987.
[18]
Meng Jiang, Bryan Hooi, Alex Beutel, Shiqiang Yang, Peng Cui, and Christos Faloutsos. 2015. A general suspiciousness metric for dense blocks in multimodal data. In Proceedings of IEEE international conference on data mining. IEEE.
[19]
Kyumin Lee, James Caverlee, Krishna Y. Kamath, and Zhiyuan Cheng. 2012. Detecting collective attention spam. In Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality - WebQuality '12. ACM Press, New York, New York, USA, 48.
[20]
Kyumin Lee, James Caverlee, and SteveWebb. 2010. Uncovering social spammers: social honeypots+ machine learning. In Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval. ACM, 435--442.
[21]
Sangho Lee and Jong Kim. 2012. WarningBird: Detecting Suspicious URLs in Twitter Stream. In NDSS.
[22]
Mathew Ingram. 2016. Disney, Salesforce Dropped Twitter Bids Because of Trolls | Fortune. (2016). http://fortune.com/2016/10/18/twitter-disney-salesforce/
[23]
M. McCord and M. Chuah. 2011. Spam detection on twitter using traditional classifiers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6906 LNCS (2011), 175--186.
[24]
Fred Morstatter, Liang Wu, Tahora H Nazer, Kathleen M Carley, and Huan Liu. 2016. A new approach to bot detection: striking the balance between precision and recall. In Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE, 533--540.
[25]
F Pedregosa, G Varoquaux, A Gramfort, V Michel, B Thirion, O Grisel, M Blondel, P Prettenhofer, R Weiss, V Dubourg, J Vanderplas, A Passos, D Cournapeau, M Brucher, M Perrot, and E Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825--2830.
[26]
Jacob Ratkiewicz, Michael D Conover, Mark Meiss, B Gonc, Alessandro Flammini, Filippo Menczer, Bruno Gonçalves, Alessandro Flammini, and Filippo Menczer. 2011. Detecting and Tracking Political Abuse in Social Media. In ICWSM. 297--304. arXiv:1011.3768 http://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/ paper/viewFile/2850/3274
[27]
M. Schmidt. 2007. UGM: A Matlab toolbox for probabilistic undirected graphical models. (2007). http://www.cs.ubc.ca/{~}schmidtm/Software/UGM.html
[28]
Gianluca Stringhini, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2012. Poultry markets: on the underground economy of twitter followers. In Proceedings of WOSN'12. 1--6.
[29]
Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2010. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 1--9.
[30]
Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, and Ben Y Zhao. 2013. Follow the green: growth and dynamics in twitter follower markets. In Proceedings of the 2013 conference on Internet measurement conference. 163--176.
[31]
Kurt Thomas, Chris Grier, and Vern Paxson. 2012. Adapting Social Spam Infrastructure for Political Censorship. In 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats. https://www.usenix.org/conference/leet12/ workshop-program/presentation/thomas
[32]
Kurt Thomas, Chris Grier, Dawn Song, and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (2011), 243--258.
[33]
Kurt Thomas, Vern Paxson, Damon Mccoy, and Chris Grier. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. USENIX Security Symposium (2013), 195--210.
[34]
Chao Yang, Robert Chandler Harkreader, and Guofei Gu. 2011. Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In Recent Advances in Intrusion Detection. Springer, 318--337.
[35]
Sarita Yardi, Daniel Romero, Grant Schoenebeck, and Others. 2009. Detecting spam in a twitter network. First Monday 15, 1 (2009).
[36]
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao. 2008. Sybil- Limit: A Near-Optimal Social Network Defense against Sybil Attacks. In 2008 IEEE Symposium on Security and Privacy (sp 2008). IEEE, 3--17.
[37]
Haifeng Yu, Michael Kaminsky, Philip B. Gibbons, and Abraham D. Flaxman. 2008. SybilGuard: Defending against sybil attacks via social networks. IEEE/ACM Transactions on Networking 16, 3 (2008), 576--589.
[38]
Yubao Zhang, Xin Ruan, Haining Wang, and Hui Wang. 2014. What scale of audience a campaign can reach in what price on Twitter? INFOCOM, 2014 Proceedings IEEE (2014), 1168--1176.

Cited By

View all
  • (2024)Markov enhanced graph attention network for spammer detection in online social networkKnowledge and Information Systems10.1007/s10115-024-02137-z66:9(5561-5580)Online publication date: 29-May-2024
  • (2023)Quantum-based Detection of Higly Semantically Similar Social botFrontiers in Computing and Intelligent Systems10.54097/fcis.v3i3.79913:3(38-42)Online publication date: 4-May-2023
  • (2023)Research on the Classification Methods of Social BotsElectronics10.3390/electronics1214303012:14(3030)Online publication date: 10-Jul-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MISNC '18: Proceedings of the 5th Multidisciplinary International Social Networks Conference
July 2018
177 pages
ISBN:9781450364652
DOI:10.1145/3227696
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 July 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cybersecurity
  2. Markov Random Field
  3. Online Social Networks
  4. Social Spam detection
  5. Supervised Learning
  6. Twitter

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

MISNC '18

Acceptance Rates

Overall Acceptance Rate 57 of 97 submissions, 59%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Markov enhanced graph attention network for spammer detection in online social networkKnowledge and Information Systems10.1007/s10115-024-02137-z66:9(5561-5580)Online publication date: 29-May-2024
  • (2023)Quantum-based Detection of Higly Semantically Similar Social botFrontiers in Computing and Intelligent Systems10.54097/fcis.v3i3.79913:3(38-42)Online publication date: 4-May-2023
  • (2023)Research on the Classification Methods of Social BotsElectronics10.3390/electronics1214303012:14(3030)Online publication date: 10-Jul-2023
  • (2023)Systematic Literature Review of Social Media Bots Detection SystemsJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.04.00435:5(101551)Online publication date: May-2023
  • (2021)A Survey of Spam Bots Detection in Online Social Networks2021 International Conference on Digital Age & Technological Advances for Sustainable Development (ICDATA)10.1109/ICDATA52997.2021.00021(58-65)Online publication date: Jun-2021
  • (2021)Binary Bat Algorithm for text feature selection in news events detection model using Markov clusteringCogent Engineering10.1080/23311916.2021.20109239:1Online publication date: 27-Dec-2021
  • (2020)An Attention-Based Graph Neural Network for Spam Bot Detection in Social NetworksApplied Sciences10.3390/app1022816010:22(8160)Online publication date: 18-Nov-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media