Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.

Slides:



Advertisements
Similar presentations
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
Advertisements

An Analysis of Social Network-Based Sybil Defenses Sybil Defender
ABUSING BROWSER ADDRESS BAR FOR FUN AND PROFIT - AN EMPIRICAL INVESTIGATION OF ADD-ON CROSS SITE SCRIPTING ATTACKS Presenter: Jialong Zhang.
Fighting Fire With Fire: Crowdsourcing Security Solutions on the Social Web Christo Wilson Northeastern University
DSPIN: Detecting Automatically Spun Content on the Web Qing Zhang, David Y. Wang, Geoffrey M. Voelker University of California, San Diego 1.
Asking Questions on the Internet
Hongyu Gao, Tuo Huang, Jun Hu, Jingnan Wang.  Boyd et al. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication,
You Are How You Click Clickstream Analysis for Sybil Detection Gang Wang, Tristan Konolige, Christo Wilson †, Xiao Wang ‡ Haitao Zheng and Ben Y. Zhao.
UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
1 BotGraph: Large Scale Spamming Botnet Detection Yao Zhao EECS Department Northwestern University.
Software Testing and Quality Assurance Testing Web Applications.
Inbound Statistics Slides Attract. 1 Blogging There are 31% more bloggers today than there were three years ago 46% of people read blogs more than once.
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
GAYATRI SWAMYNATHAN, CHRISTO WILSON, BRYCE BOE, KEVIN ALMEROTH AND BEN Y. ZHAO UC SANTA BARBARA Do Social Networks Improve e-Commerce? A Study on Social.
Fighting Fire With Fire: Crowdsourcing Security Threats and Solutions on the Social Web Gang Wang, Christo Wilson, Manish Mohanlal, Ben Y. Zhao Computer.
Why Crowdsourcing Software automation replaces the role of human in many areas Store and retrieve large volumes of information Perform calculation Human.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
What does the course cover:  The course is a practical guide to use digital marketing to effectively reach out to internet audience while building your.
Zifei Shan, Haowen Cao, Jason Lv, Cong Yan, Annie Liu Peking University, China 1.
Norman SecureSurf Protect your users when surfing the Internet.
© 2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Web 2.0 for Businesses How You Can Use Social Media to Bring in Money & Promote Your Brand Kimberly L. Sanberg Director of Online Strategy, Ignitus presentation.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng and Ben Y. Zhao Computer Science Department, UC Santa Barbara Serf and.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Suspended Accounts in Retrospect: An Analysis of Twitter Spam Kurt Thomas, Chris Grier, Vern Paxson, Dawn Song University of California, Berkeley International.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
Cloak and Dagger: Dynamics of Web Search Cloaking David Y. Wang, Stefan Savage, and Geoffrey M. Voelker University of California, San Diego 左昌國 Seminar.
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
Collusion-Resistance Misbehaving User Detection Schemes Speaker: Jing-Kai Lou 2015/10/131.
To Blog or Not to Blog: Characterizing and Predicting Retention in Community Blogs Imrul Kayes 1, Xiang Zuo 1, Da Wang 2, Jacob Chakareski 3 1 University.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
ONLINE COMMUNICATION 2 Lesson 5. Starter  How has online communication changed the way in which we communicate?  How has online communication affected.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Social Media 101 An Overview of Social Media Basics.
Evaluation of Spam Detection and Prevention Frameworks for and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and.
Leveraging Asset Reputation Systems to Detect and Prevent Fraud and Abuse at LinkedIn Jenelle Bray Staff Data Scientist Strata + Hadoop World New York,
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum Speaker: 林佳宜.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Computer Science Department, Peking University
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Group 4 1.Maithili Gokhale 2.Swati Sisodia 3.Aman Chanana 4.Piyush Agade “Uncovering Social Network Sybils in the Wild” - Zhi Yang, Christo Wilson, Xio.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
Detecting and Characterizing Social Spam Campaigns Yan Chen Lab for Internet and Security Technology (LIST) Northwestern Univ.
Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang Miriam Metzger, Haitao Zheng and Ben Y. Zhao Computer.
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
By Toby Reed.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
How Social Media Changed The World Of Event Planning By Olivia Burke.
Chapter 8: Web Analytics, Web Mining, and Social Analytics
Internet Marketing Company How To Find Diamond From Clutter Internet marketing is the usage of the World Wide Web to provide online shopping or advertisement.
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks Jenny (Bom Yi) Lee.
Uncovering Social Spammers: Social Honeypots + Machine Learning
By : Namesh Kher Big Data Insights – INFM 750
Written by Qiang Cao, Xiaowei Yang, Jieqi Yu and Christopher Palow
Discover How Your Business Can Benefit from a Facebook Fanpage
Dieudo Mulamba November 2017
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
New Mexico Broadband Program Internet Tools for Small Business
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Cybersecurity Simplified: Phishing
Presentation transcript:

Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei Dai Renren Inc.UC Santa BarbaraPeking University Presented by: MinHee Kwon 2011 ACM SIGCOMM conference on Internet measurement conference (IMC 2011)

Online Network Service(OSN)

Sybil, fake account Sybil, s ɪ b ə l, Nouns ɪ b ə l : a book of which content is a case study of a woman diagnosed with multiple personality disorder “a fake account that attempts to create many friendships with honest users”

Renren is the oldest and largest OSN in China  Started in 2005, serviced for college students  To open public in 2009  Now,160M users  Facebook’s Chinese twin Renren Company

Previous detector on Renren Using orthogonal techniques to find sybil accounts  Spamming & Scanning content for suspect keywords and blacklisted URLS  Crowdsourced account flagging Detect Results  560K Sybils banned as of August 2010 Limitations : ad-hoc based, requiring human effort, operating after posting spam content

Improved Detector Developed improved Sybil detector for Renren  Analyzed ground-truth data on existing Sybils find behavioral attributes to identify sybil accounts examining a wide range of attributes found four potential identifiers.

Four Reliable Sybil indicators 1. Friend Request Frequency (Invitation Frequency) - The number of friend requests a user has sent within a fixed time period

2. Outgoing Friend Requests Accepted - Requests confirmed by the recipient Four Reliable Sybil indicators average

3. Incoming Friend Requests Accepted - The fraction of incoming friend requests they accept 20% 80% Four Reliable Sybil indicators

Clustering coefficient # of real edges between neighbors of Node total # of possible edges between neighbors of Node

Clustering Coefficient 4. Clustering Coefficient - a graph metric that measures the mutual connectivity of a user’s friends. average

Verify Sybil Detector Evaluated threshold and SVM detectors  Data set: 1000 normal user and 1000 sybils  Value of threshold: outgoing requests accepted ratio 20 ^ cc<0.01  Similar accuracy for both  Deployed threshold, less CPU intensive, real-time  Adaptive feedback scheme is used to dynamically tune threshold parameters SVMThreshold SybilNon-SybilSybilNon-Sybil 98.99%99.34%98.68%99.5%

Detection Results Caught 100K Sybils in the first six months (August 2010~February 2011)  Vast majority(67%) are spammers Low false positive rate  Use customer complaint rate as signal  Complaints evaluated by humans  25 real complaints per 3000 bans (<1%) ] Spammers attempted to recover banned Sybils by complaining to Renren customer support!

Community-based Sybil Detectors Attack Edges Edges Between Sybils Prior work on decentralized OSN Sybil detectors [Key Assumption]

Can Sybil Components be Detected?  Sybil components are internally sparse  Not amenable to community detection Not amenable to community detection

 Sybil components are internally sparse  Not amenable to community detection SybilsSybil EdgesAttack EdgesAudience 63,541134,9419,848,8816,497, ,07421, ,7617, ,34915, ,43113,886 Five Largest Sybil components

Sybil Edge Formation Are edges between Sybils formed intentionally?  Temporal analysis indicates random formation

Sybil Edge Formation How are random edges between Sybils formed?  Surveyed Sybil management tools  Two factors: 1) Sending out numerous friend request 2) Target to popular users

Conclusion First look at Sybils in the wild  Ground-truth from inside a large OSN  Deployed detector is still active Analysis of Sybil Topology  Limitation of Community-based detector : Sybil edge no. < Attack edge no. What’s next!  Results may not generalize beyond Renren  Evaluation on other large OSNs

Thanks you

Serf and Turf: Crowdturfing for Run and Profit SungJae Hwang Graduate School of Information Security Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng and Ben Y. Zhao 21 st International Conference on World Wide Web (WWW 2012) Slide borrowed from :

Facebook profile Complete information Lots of friends Even married Online Spam Today 22 FAKE

Variety of CAPTCHA tests Read fuzzy text, solve logic questions Rotate images to natural orientation Defending Automated Spam Rotate below images But what if the enemy is a real human being? 23 CAPTCHA: Completely Automated Public Test to tell Computers and Humans Apart

What is Crowdturfing? 24 Crowdturfing = Crowdsourcing + Astroturfing Crowdsourcing Is a process that involves outsourcing tasks to a distributed group of people(wikipedia) Astroturfing Spreading Information

Luis von Ahn? 25

What is Crowd Sourcing? Online crowdsourcing (Amazon Mechanical Turk) Admins remove spammy jobs NEW: Black market crowdsourcing sites Malicious content generated/spread by real-users Fake reviews, false ad., rumors, etc. 26

Worker Y ZBJ/SDH Crowdturfing Workflow Customers  Initiate campaigns  May be legitimate businesses Agents  Manage campaigns and workers  Verify completed tasks Workers  Complete tasks for money  Control Sybils on other websites Campaign Tasks Reports 27 Company X

Outline of this paper Motivation & Introduction Crowdturfing in China End-to-end Experiments Future Work Conclusion 28

Crowdturfing Sites Focus on the two largest sites Zhubajie (ZBJ) Sandaha (SDH) Crawling ZBJ and SDH Details are completely open Complete campaign history since going online ZBJ 5-year history SDH 2-year history 29

30 Report generated by workers Campaign Information Get the Job Submit Repo rt Check Deta ils Campaign I D Input Mone y Rewards 100 tasks, each ¥ submissions accepted Still need 23 more Promote our product using your blog CategoryBlog Promtion StatusOngoing (177 reports submitted) URL Screenshot WorkerID Experienc e Reputation Report ID Report Cheatin g Accepted!

Site Active Since Total Campaigns WorkersTasksReportsAccepted $ Total$ for Workers $ for Site ZBJNov K169K17.4M6.3M3.5M$3.0M$2.4M$595K SDHMar.20103K11K1.1M1.4M751K$161K$129K$32K Jan. 08Jan. 09Jan. 10Jan. 11 ZBJ SDH Campaigns $ $ High Level Statistics 31 1,000, ,000 10,000 1,000 10,000 1,000

Are Workers Real People? 32 Late Night/Early Morning Work Day/Evening Lunch Dinner ZBJ SDH

Campaign Target # of Campaigns $ per Campaign $ per Task Monthly Growth Account Registration29,413$71$0.3516% Forums17,753$16$0.2719% Instant Message Groups12,969$15$0.7017% Microblogs ( e.g. Twitter/Weibo ) 4061$12$0.1847% Blogs3067$12$0.2320% Top 5 Campaign Types on ZBJ Most campaigns are spam generation Highest growth category is microblogging Weibo: increased by 300% (200 million users) in a single year (2011) Campaign Types 33

Outline of this paper Motivation & Introduction Crowdturfing in China End-to-end Experiments Future Work Conclusion 34

How Effective Is Crowdturfing? What is missing? Understanding end-to-end impact of Crowdturfing Initiate campaigns as customer 4 benign ad campaigns iPhone Store, Travel Agent, Raffle, Ocean Park Ask workers to promote products 35 Clicks?

Weibo (microblog) End-to-end Experiment Measurement Server Create Spam 36 Travel Agent Redirection Campaign1: promote a Travel Agent New Job Her e! ZBJ (Crowdturfing Site) Workers Task Info Trip Info Great deal! Trip to Maldives! Check Details Weibo Users

Campaign Results CampaignAboutTargetInput $ Task/ Report ClicksResp. Time TripAdvertise for a trip organized by travel agen t Weibo$15100/108283hr QQ$15100/ hr Forum$15100/12334hr 37 Settings: One-week Campaigns $45 per Campaign ($15 per target) Benefit? Generate 218 click-backs Only cost $45 each 80% of reports are generated in the first few hours Averaged 2 sales/month before campaign 11 sales in 24 hours after campaign Each trip sells for $1500

Outline of this paper Motivation & Introduction Crowdturfing in China End-to-end Experiments Future Work Conclusion 38

Crowdturfing in US Growing problem in US More black market sites popping up Sites% Crowdturfing MinuteWorkers70% MyEasyTasks83% Microworkers89% ShortTasks95% 39

Where Is Crowdturfing Going? Growing awareness and pressure on crowdturfing Government intervention in China Researchers and media following our study Paper does not talked about defensive techniques It is future work…. 40 Defending against Crowdturfing will be very challenging!!

Outline of this paper Motivation & Introduction Crowdturfing in China End-to-end Experiments Future Work Conclusion 41

Conclusion Identified a new threat: Crowdturfing Growing exponentially in both size and revenue in China Start to grow in US and other countries Detailed measurements of Crowdturfing systems End-to-end measurements from campaign to click-throughs Gained knowledge of social spams from the inside Ongoing research focused on defense 42

Thank you! Questions?

Biggest dairy company in China (Mengniu) Defame its competitors Hire Internet users to spread false stories Impact Victim company (Shengyuan) Stock fell by 35.44% Revenue loss: $300 million 44 “Dairy giant Mengniu in smear scandal” Real-world Crowdturfing Warning: Company Y’s baby formula contains dangerous hormones! M