Suspended Accounts in Retrospect: An Analysis of Twitter Spam Kurt Thomas, Chris Grier, Vern Paxson, Dawn Song University of California, Berkeley International.

Slides:



Advertisements
Similar presentations
Presented by Amanda Groover Oct. 16 th, MBA- Marketing from Ashford University BBA- Management from University of North GA Previous Work Experience:
Advertisements

Influence and Passivity in Social Media Daniel M. Romero, Wojciech Galuba, Sitaram Asur, and Bernardo A. Huberman Social Computing Lab, HP Labs.
SOCIAL MEDIA & PHYSICAL ACTIVITY PROMOTION: MAKING THE CONNECTIONS Presented by: Sandra De Freitas
@ SPAM : T HE U NDERGROUND ON 140 C HARACTERS OR L ESS Chris Grier, Vern Paxson, Michael Zhang University of California, Berkeley Kurt Thomas University.
By Lee Betancourt Director of Communications and Public Relations Jane Myers Public Relations, Communications and Social Media Coordinator Social Media.
Twitter The Basics. What is Twitter? Tweets are: 140 characters or less Quick to follow and view updates Used to share links, photos, videos, music,hot.
Design and Evaluation of a Real-Time URL Spam Filtering Service
ABUSING BROWSER ADDRESS BAR FOR FUN AND PROFIT - AN EMPIRICAL INVESTIGATION OF ADD-ON CROSS SITE SCRIPTING ATTACKS Presenter: Jialong Zhang.
DSPIN: Detecting Automatically Spun Content on the Web Qing Zhang, David Y. Wang, Geoffrey M. Voelker University of California, San Diego 1.
Social Media Intro to Business & Marketing. The most three most trusted forms of advertising are: Recommendations from people I know - 90% Consumer opinions.
Design and Evaluation of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song University of California,
ACMI Social Media Strategy Introduction How can Facebook & Twitter be used for improving business? How can Facebook & Twitter be integ- rated into the.
Victor Ivanov. Introduction  Definition  Unsolicited bulk messages  Concerns  Server load  Garbage content.
Towards Online Spam Filtering in Social Networks Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology.
Cloud and Big Data Summer School, Stockholm, Aug., 2015 Jeffrey D. Ullman.
July 30th – August 1st, 2013 McCormick Place, Chicago, IL Integrating Social Media at Live Events David Brull July 30,
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
Detecting Spammers on Social Networks Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna (University of California) Annual Computer Security Applications.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Affordable Tools Social Media, Conversion & Best Picks By Patricia Hughes ePlus Marketing, LLC.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Media Relations in a Social Media World By Julie DeBardelaben Deputy Director of Public Affairs CAP National Headquarters.
Adotomi.com | Copyright Adotomi 2013 Scaling Up While Maintaining Quality: Life After the Like Nadav Weinberg | Director of Business Development.
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,
CF-LINKS Pumping Up Your Twitter Feed Anne-Marie McElrone & Marlowe Filippov, CFC’s IT Steering Committee.
11 CANTINA: A Content- Based Approach to Detecting Phishing Web Sites Reporter: Gia-Nan Gao Advisor: Chin-Laung Lei 2010/6/7.
Twitter for Beginners. What is Social Media? : forms of electronic communication (as Web sites for social networking and microblogging) through which.
Cloak and Dagger: Dynamics of Web Search Cloaking David Y. Wang, Stefan Savage, and Geoffrey M. Voelker University of California, San Diego 左昌國 Seminar.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
Evaluation of Spam Detection and Prevention Frameworks for and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and.
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
Social Media for Nonprofits – Making an Impact
Leveraging Asset Reputation Systems to Detect and Prevent Fraud and Abuse at LinkedIn Jenelle Bray Staff Data Scientist Strata + Hadoop World New York,
How Videos and Social Media Work Together. Social media and videos are two of the most powerful outlets that companies have online for gaining new business.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
What Is Big Data? And What Does It Mean to Marketers? Frank Cotignola October 17, 2013.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Spam ain’t as Diverse as It Seems: Throttling OSN Spam with Templates Underneath Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok Choudhary.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
Social Media Training for CBT College
Exploiting Network Structure for Proactive Spam Mitigation Shobha Venkataraman * Joint work with Subhabrata Sen §, Oliver Spatscheck §, Patrick Haffner.
Social Media 201 Beyond The Basics. What is Social Media? Social media are media for social interaction using highly accessible publishing techniques.
Detecting and Characterizing Social Spam Campaigns Yan Chen Lab for Internet and Security Technology (LIST) Northwestern Univ.
On TWITTER on TWITTER.   Regular tweets with the added bonus of reaching both current and potential followers  Can Appear in:  User Timelines and.
 Definition of Social Media - forms of electronic communication (as Web sites for social networking and microblogging) through which users create online.
Twitter for Business 140 Character Advertising and Customer Engagement.
#GoingViral giulia_bonelli, formicablu Using social media to promote research CAGLIARI,
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida Universidade Federal de Minas Gerais Belo Horizonte, Brazil ACSAC 2010 Fabricio.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Social Media Monitoring Keeping an eye on your efforts and what’s trending.
Measuring User Influence in Twitter: The Million Follower Fallacy Meeyoung Cha Hamed Haddadi Fabricio Benevenuto Krishna P. Gummadi.
How Social Media Changed The World Of Event Planning By Olivia Burke.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or coputers. However we do not realize how fast is internet getting bigger.
Dec 14, 2014, Harvard University
Facts About Twitter Twitter is an online social networking service that enables users to send and read short 140-character messages called "tweets". Registered.
Hashtags #TEretail March 20, 2013 Day-long Twitter chat Students and grads Employers TJX Canada RBC Starbucks Target Canadian Tire 95 different participants.
Job Search and Marketing Yourself through Social Media
Lab for Internet and Security Technology Yan Chen
Dieudo Mulamba November 2017
A Network Science Approach to Fake News Detection on Social Media
Presentation transcript:

Suspended Accounts in Retrospect: An Analysis of Twitter Spam Kurt Thomas, Chris Grier, Vern Paxson, Dawn Song University of California, Berkeley International Computer Science Institute

Motivation Social networks are regular targets for abuse – 26% of URLs on Twitter lead to spam – 10% of URLs on Facebook Underground economy targeting social networks remains obscure – Account behavior – Challenges faced by spammers

Our Study We examine 7 months of Twitter spam: – Accounts, techniques used to distribute spam – Emerging support infrastructure – Sophistication of campaigns Characterize performance of existing defenses – Hostile environment for spammers – Low barriers, persistent attacks

Outline Dataset Accounts, URLs, Tools Spam as a service Campaigns

DATASET

Sample Size Daily sample from Twitter, 12M tweets/day – Limit to tweets with URLs – Some days missing: network outages, crashes 1.8 billion 32.8 million Tweets: Accounts:

Sample Rate Fraction of all tweets with URLs:

Identifying Spam Which of 1.8 billion tweets are spam? Previous approaches: – Blacklisting [ Grier et al, CCS 2010 ] – Heuristics (bursty, distributed) [ Gao et al. IMC 2010 ] Our approach: – Identify accounts suspended by Twitter – Only 8% of their URLs appear in blacklists

Suspended Accounts

Suspended.equals(Spam)? True positives: 93% of suspended accounts were spammers – Remaining 7% aggressive marketing, following – None were false positives False negatives: 6% of active accounts were uncaught spammers Twitter catches 37% of spam accounts

Spam Dataset 1.1 million 80 million 37 million Spam Accounts: Spam Tweets: Spam URLs:

TOOLS OF THE SPAM TRADE

Taxonomy of Social Spam Three components to social network

Taxonomy of Social Spam Three components to social network spam: –

Taxonomy of Social Spam Three components to social network spam: – Accounts – Engagement Social

Taxonomy of Social Spam Three components to social network spam: – Accounts – Engagement Social graph

Taxonomy of Social Spam Three components to social network spam: – Accounts – Engagement Social graph Mention

Taxonomy of Social Spam Three components to social network spam: – Accounts – Engagement Social graph Mention Hashtag – Monetizable

Accounts Of 1.1 million spam accounts, median stats: 1 day Lifetime: From first sampled tweet to last tweet 2 Followers: Users receiving a spammers content 13 Tweets: Total tweets sent; not just those sampled

Tweets Two strategies for tweeting: – Short-lived, bursty posting – Long-lived, low daily posting

Engagement Spam accounts forgo social graph for distribution – 89% of accounts < 10 followers 52% of accounts #Hashtags, trends: 17% of accounts Alternatives: – Direct messages – Search

Social Activity Regular Twitter UserSpam Account Following

Spam URLs Of 37 million URLs, two strategies:

URLs – Shorteners 60% of spam tweets contain shortened URLs – Over 317 shorteners Shortening ServiceFraction of Tweets Bit.ly35% Tinyurl.com7% Is.gd2% Goo.gl2% Ow.ly2%

SPAM AS A SERVICE

Centralized Distribution Spammer URL Generation Tweeting Spam Content Twitter Account

Spam-as-a-Service Content Controller Account Controller

$$$$ Spam-as-a-Service Affiliate Service Content Controller Account Controller Job Posting $$ Job Accepted

Affiliate Programs Examples: – Clickbank.com – affiliate paid per click – Amazon.com – affiliate paid per purchase Identify mapping between affiliates, Twitter accounts

Affiliate Programs Clickbank affiliate – Median: 565 tweets – Max: 217,686 tweets ProgramTweetsTwitter Accounts Affiliates Clickbank.com3 million16, Amazon.com1 million8, Amazon affiliate – Median: 2 tweets – Max: 324,613 tweets

Alternative Services Account sellers, controllers – Ex: spn.tw, Assetize – Mediate access to accounts – 200,000 tweets, 1600 accounts Ad-based URL shorteners – Ex: vur.me, eca.sh – Embed shortened URL in iFrame, surround by ads – 360,000 tweets, 400 accounts

SPAM CAMPAIGNS

All Together Now – Campaigns Cluster accounts, tweets into campaigns – Automated heuristics – Manual validation Identify 5 of the largest Twitter spam campaigns – 145,000 accounts (13% of dataset) – 18 million tweets (22% of dataset)

Campaign: Amazon Abuse Duration: 1 month Accounts: 848 Tweets: 129,600 Engagement: Mentions

Campaign: Clickbank Abuse Duration: 7 months Accounts: 16,000 Tweets: 3 million Engagement: Mentions, hashtags

Campaign: Pharmacy Duration: 1 day Accounts: 2,200 Tweets: 130,000 Engagement: Trend hijacking

Conclusion Variety of spam strategies Fledgling spam-as-a-service market – Affiliate programs – Account providers Complex spam campaigns – Low barrier to creating accounts – Weak defenses, slow response Solutions must target both social networks and the support infrastructure