Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.

Slides:



Advertisements
Similar presentations
An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Advertisements

Analysis and Modeling of Social Networks Foudalis Ilias.
Krishna P. Gummadi Networked Systems Research Group MPI-SWS
Detecting and Characterizing Social Spam Campaigns Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen and Ben Y. Zhao Northwestern University, US.
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
Toward an Optimal Social Network Defense Against Sybil Attacks Haifeng Yu National University of Singapore Phillip B. Gibbons Intel Research Pittsburgh.
Qiang Cao Duke University
ABUSING BROWSER ADDRESS BAR FOR FUN AND PROFIT - AN EMPIRICAL INVESTIGATION OF ADD-ON CROSS SITE SCRIPTING ATTACKS Presenter: Jialong Zhang.
Fighting Fire With Fire: Crowdsourcing Security Solutions on the Social Web Christo Wilson Northeastern University
DSPIN: Detecting Automatically Spun Content on the Web Qing Zhang, David Y. Wang, Geoffrey M. Voelker University of California, San Diego 1.
Enabling the Social Web Krishna P. Gummadi Networked Systems Group Max Planck Institute for Software Systems.
Asking Questions on the Internet
Directional triadic closure and edge deletion mechanism induce asymmetry in directed edge properties.
You Are How You Click Clickstream Analysis for Sybil Detection Gang Wang, Tristan Konolige, Christo Wilson †, Xiao Wang ‡ Haitao Zheng and Ben Y. Zhao.
Sybil Attack Hyeontaek Lim November 12, 2010.
UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
1 BotGraph: Large Scale Spamming Botnet Detection Yao Zhao EECS Department Northwestern University.
Measurement and Analysis of Online Social Networks By Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee Attacked.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao Yinglian Xie *, Fang Yu *, Qifa Ke *, Yuan Yu *, Yan Chen and Eliot Gillum ‡ EECS Department,
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
Towards Online Spam Filtering in Social Networks Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology.
GAYATRI SWAMYNATHAN, CHRISTO WILSON, BRYCE BOE, KEVIN ALMEROTH AND BEN Y. ZHAO UC SANTA BARBARA Do Social Networks Improve e-Commerce? A Study on Social.
Fighting Fire With Fire: Crowdsourcing Security Threats and Solutions on the Social Web Gang Wang, Christo Wilson, Manish Mohanlal, Ben Y. Zhao Computer.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Zifei Shan, Haowen Cao, Jason Lv, Cong Yan, Annie Liu Peking University, China 1.
Models of Influence in Online Social Networks
Using Friendship Ties and Family Circles for Link Prediction Elena Zheleva, Lise Getoor, Jennifer Golbeck, Ugur Kuter (SNAKDD 2008)
Detecting Spammers on Social Networks Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna (University of California) Annual Computer Security Applications.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng and Ben Y. Zhao Computer Science Department, UC Santa Barbara Serf and.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Suspended Accounts in Retrospect: An Analysis of Twitter Spam Kurt Thomas, Chris Grier, Vern Paxson, Dawn Song University of California, Berkeley International.
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Collusion-Resistance Misbehaving User Detection Schemes Speaker: Jing-Kai Lou 2015/10/131.
Leveraging Social Networks to Defend against Sybil attacks Krishna Gummadi Networked Systems Research Group Max Planck Institute for Software Systems Germany.
Security Mechanisms for Distributed Computing Systems A9ID1007, Xu Ling Kobayashi Laboratory GSIS, TOHOKU UNIVERSITY 2011/12/15 1.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum Speaker: 林佳宜.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University SIGCOMM 2010 Presented by Junyao Zhang Many of the.
Computer Science Department, Peking University
The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007.
User Interactions in Social Networks and their Implications Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, Ben Y. Zhao (UC Santa.
Group 4 1.Maithili Gokhale 2.Swati Sisodia 3.Aman Chanana 4.Piyush Agade “Uncovering Social Network Sybils in the Wild” - Zhi Yang, Christo Wilson, Xio.
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
Detecting and Characterizing Social Spam Campaigns Yan Chen Lab for Internet and Security Technology (LIST) Northwestern Univ.
Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang Miriam Metzger, Haitao Zheng and Ben Y. Zhao Computer.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
On the State of OSN-based Sybil Defenses David Koll*, Jun Li^, Joshua Stein^ and Xiaoming Fu* *University of Göttingen, Germany ^University of Oregon,
Measuring the Mixing Time of Social Graphs Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim Computer Science and Engineering Department University of Minnesota.
Written by Qiang Cao, Xiaowei Yang, Jieqi Yu and Christopher Palow
Uncovering Social Spammers: Social Honeypots + Machine Learning
Written by Qiang Cao, Xiaowei Yang, Jieqi Yu and Christopher Palow
Lab for Internet and Security Technology Yan Chen
Dieudo Mulamba November 2017
Using Friendship Ties and Family Circles for Link Prediction
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
GANG: Detecting Fraudulent Users in OSNs
Social Network-Based Sybil Defenses
Presentation transcript:

Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei Dai Renren Inc.UC Santa BarbaraPeking University

Sybils on OSNs Large OSNs are attractive targets for… ▫ Spam dissemination ▫ Theft of personal information Sybil, s ɪ b ə l, Noun: a fake account that attempts to create many friendships with honest userss ɪ b ə l ▫ Friendships are precursor to other malicious activity ▫ Does not include benign fakes Research has identified malicious Sybils on OSNs ▫ Twitter [CCS 2010] ▫ Facebook [IMC 2010] 2

Understanding Sybil Behavior Prior work has focused on spam ▫ Content, dynamics, campaigns ▫ Includes compromised accounts Open question: What is the behavior of Sybils in the wild?  Important for evaluating Sybil detectors Partnership with largest OSN in China: Renren ▫ Leverage ground-truth data on 560K Sybils ▫ Develop measurement-based, real-time Sybil detector ▫ Deployed, caught additional 100K Sybils in 6 months 3

 Introduction  Sybils on Renren  Sybil Analysis  Conclusion 4

Sybils on Renren Renren is the oldest and largest OSN in China ▫ 160M users ▫ Facebook’s Chinese twin Ad-hoc Sybil detectors ▫ Threshold-based spam traps ▫ Keyword and URL blacklists ▫ Crowdsourced account flagging 560K Sybils banned as of August

Sybil Detection 2.0 Developed improved Sybil detector for Renren ▫ Analyzed ground-truth data on existing Sybils ▫ Identified four reliable Sybil indicators Evaluated threshold and SVM detectors ▫ Similar accuracy for both ▫ Deployed threshold, less CPU intensive, real-time 6 SVMThreshold SybilNon-SybilSybilNon-Sybil 98.99%99.34%98.68%99.5% 1.Friend Request Frequency 2.Outgoing Friend Requests Accepted 3.Incoming Friend Requests Accepted 4.Clustering Coefficient

Detection Results Caught 100K Sybils in the first six months ▫ Vast majority are spammers ▫ Many banned before generating content Low false positive rate ▫ Use customer complaint rate as signal ▫ Complaints evaluated by humans ▫ 25 real complaints per 3000 bans (<1%) 7 Spammers attempted to recover banned Sybils by complaining to Renren customer support! More details in the paper

 Introduction  Sybils on Renren  Sybil Analysis  Conclusion 8

Community-based Sybil Detectors Prior work on decentralized OSN Sybil detectors ▫ SybilGuard, SybilLimit, SybilInfer, Sumup ▫ Key assumption: Sybils form tight-knit communities 9 Edges Between Sybils Attack Edges

Do Sybils Form Connected Components? 10  Vast majority of Sybils blend completely into the social graph  Few communities to detect 80% have degree = 0 No edges to other Sybils!

Can Sybil Components be Detected? 11  Sybil components are internally sparse  Not amenable to community detection

Sybil Cluster Analysis 12 Are edges between Sybils formed intentionally? ▫ Temporal analysis indicates random formation How are random edges between Sybils formed? ▫ Surveyed Sybil management tools ▫ Biased sampling for friend request targets ▫ Likelihood of Sybils inadvertently friending is high More details in the paper

 Introduction  Sybils on Renren  Sybil Analysis  Conclusion 13

Conclusion First look at Sybils in the wild ▫ Ground-truth from inside a large OSN ▫ Deployed detector is still active Sybils are quite sophisticated ▫ Cheap labor  very realistic fakes ▫ Created and managed by-hand Need for new, decentralized Sybil detectors ▫ Results may not generalize beyond Renren ▫ Evaluation on other large OSNs 14

Questions? Slides and paper available at Christo Wilson UC Santa Barbara 15 P.S.: I’m on the job market…

Backup Slides Only use in case of emergency! 16

Creation of Edges Between Sybils 17 The majority of edges between Sybils form randomly

Friend Target Selection 18  High degree nodes are often Sybils!  Sybils unknowingly friend each other