By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

Whats new with social media Dean Chew SEO Consultant Ayima Search Marketing.
Privacy: Facebook, Twitter
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
Maximise Your Online Presence SEO & Social Media Strategies For Local Business Owners.
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
Web 2.0: Concepts and Applications 5 Connecting People.
Web 2.0: Concepts and Applications 5 Connecting People.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Starter for 10 Unit 11: Facebook Transform IT SFT11_Facebook.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
Social Media Motion: How to Get Started & Keep Going With Facebook, Twitter & More Presented by Eli Lilly and Company Hosted by Rob Robinson McNeely Pigott.
 Why would you want to be connected? o To make online connections that will improve your efficiency and speed o To provide a near instant platform.
Social Networking – The Ways and Means Rosey Broderick May 2011.
Social networking FACEBOOK AND TWITTER. Then In the beginning of Facebook, there were very few features. There were no status updates, messages, photo.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
+ The Future of Social Media By Abigail Boghurst.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Detecting Spammers on Social Networks Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna (University of California) Annual Computer Security Applications.
Using Social Networks in Education Region One Technology Conference May 11, 2010.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
How To Manage Your Social Media Presence in Just 10 Minutes A Day! And be more popular than the local news guy!
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Should you friend your boss? Navigating the travails of social networking for new users.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
FaceBook and Your Business Women in Technology in Nigeria Presented by Mrs M.O Alade Women in Technology in Nigeria
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories Mona Gandhi Markus Jakobsson Jacob Ratkiewicz Indiana University at Bloomington Presented.
Knowing Your Facebook From Your Flickr Dan O’ Neill – -
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Social Media 101 An Overview of Social Media Basics.
1. Go to 2. Complete the requested information.
Soni Sarin, Gina Striffolino, Chioma Ihekweazu, Mary Rhee December 7, 2010 ENGL
Leveraging Asset Reputation Systems to Detect and Prevent Fraud and Abuse at LinkedIn Jenelle Bray Staff Data Scientist Strata + Hadoop World New York,
Prediction of Influencers from Word Use Chan Shing Hei.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
Click to Add Title A Systematic Framework for Sentiment Identification by Modeling User Social Effects Kunpeng Zhang Assistant Professor Department of.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Authors: Yazan Boshmaf, Lldar Muslukhov, Konstantin Beznosov, Matei Ripeanu University of British Columbia Annual Computer Security Applications Conference.
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida Universidade Federal de Minas Gerais Belo Horizonte, Brazil ACSAC 2010 Fabricio.
How Chapters Can use Social Media Mark Storace Sacramento Chapter March 2013.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Dial For Twitter Support Number. How to Join Twitter to Use for Business and Marketing? While the registered users can post and share tweets,
Opinion spam and Analysis 소프트웨어공학 연구실 G 최효린 1 / 35.
How Chapters Can use Social Media Mark Storace Sacramento Chapter Jan 2011.
Welcome.
Facebook privacy policy
Social Media Attacks.
Local League Coordinators Meeting
Facebook in the Classroom
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Cross-Site Request Forgeries: Exploitation and Prevention
9/19/2018 Social Networks 9/19/2018.
Overview Social media applications inform, educate, and entertain people through online (multi-)media A social networking application allows users to create.
Dieudo Mulamba November 2017
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
USING SOCIAL MEDIA TO ENHANCE HUMAN RESOURCES PRACTICES
New Mexico Broadband Program Internet Tools for Small Business
Presentation transcript:

By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1

 Introduction.  The Popular Social Networks.  Data Collection.  Data Analysis.  Spam Bots Analysis.  Identification of Spam Campaigns.  Results of Spam Campaigns.  Conclusion. 2

 Facebook, MySpace and Twitter classified among the top 20 viewed web sites.  In 2008, 83% of the users had received unwanted friend request or massages.  Users’ information could be public or not.  Not public information can be accessed by person’s network of trust.  This paper differ from privious works by showing results for almost one year on spam activity in the three social networks. 3

 400 million active users with 2 billion media items shared every week.  Many users add peoples barely knows. In 2008, a study shows 41% of user accept friend request from unknown people.  Until 2009, the default privacy setting for Facebook was to allow all people in the same network (school, company, etc.) to view each other’s profiles.  In October 2009, more security had been added for these networks E.g. users should provide a valid address form that institution. 4

 The third most visited network.  Myspace provide users with a web pages.  It has also the concept of friendship.  Myspace page are public by default. 5

 Twitter has the fastest growing rate on the Internet. During 2009, it reported a 660% increase in visits.  Much simpler than Facebook and MySpace.  No personal information is shown.  The profiles are public by default but can be modified by the user. 6

 900 profiles created in the three social network, 300 for each.  The purpose of these profiles to log the traffic we receive from other users.  These accounts called honey-profiles. 7

 Each social network was crawled to collect common profile data.  On Facebook, the profiles joined 16 geographic networks.  For each Facebook network, 2000 accounts are crawled at random to create 300 profiles.  In MySpace, 4000 accounts are crawled to create 300 profiles. 8

 In Facebook and MySpace, birthdate and gender are needed for registration.  In Twitter, we only need a profile name and full name to create an account.  No more than 300 profiles were created on each network because registration is a semi- automated process. 9

 After creating honey-profiles, we run scripts that periodically connected to those accounts and checked for activity.  The accounts act on passive way.  All types of requests were logged on the three social networks.  Periodically visiting each account.  The visits had to be performed slowly (approximately one account visited every 2 minutes) 10

11 There is a big disparity between the three social networks. [1]

12 [1]

13 [1]

Bots typesDisplayerBraggerPosterWhisperer 14

 Displayer: Bots that do not post spam messages, but only display some spam content on their own profile pages.  Bragger: Bots that post messages to their own feed.  Poster: Bots that send a direct message to each victim.  Whisperer: Bots that send private messages to their victims. 15

Bots TypesFaceBookMySpace Twitter Displayer28- Bragger Poster8-- Whisperer

 Most spammers requests were at the beginning of the experiment.  On Facebook, the average lifetime of a spam account was four days, while on Twitter, it was 31 days.  Most spammers activated periodically or at specific time of the day.  In addition to study the effectiveness of spam activity, it is important to look at how many users acknowledged friend requests on the different networks 17

Two kinds of bot behavior were observed:  Stealthy Bots: send messages that look legitimate. ◦ Not easy to detect  Greedy Bots: a spam content in every message they send. ◦ Easier to detect From all the 534 spam bots detected, 416 were greedy and 98 were stealthy 18

 Spam bots are usually less active than legitimate users.  Some spammers follow a certain criteria to choose their victims. - Most of the victims are male. - Many victims have the same names. 19

 Most social network sites provide method to prevent automatic accounts generation. E.g. on Facebook the user needs CAPTCHA for sending a friend request or to create a new account.  The site uses a very complicated JavaScript environment that makes it difficult for bots to interact with the pages. 20

 Major social networks launched mobile versions of their sites. - No JavaScript is present. - No CAPTCHAs are required to send friend requests.  80% of bots detected on Facebook used the mobile site to send their spam messages.  For Twitter, there is no need to use mobile devices. - CAPTCHA required only to make a new account. - API to interact with the network is provided. 21

 This work focus on detecting “bragger” and “poster” spammers.  Machine learning techniques (Weka framework with a Random Forest algorithm ) used to classify spammers and legitimate users.  Six features were developed to detect the spammer profiles. 22

 FF ratio (R): The first feature compares the number of friend requests that a user sent to the number of friends she has. R = following/ followers  URL ratio (U): U = messages containing URLs / total messages. 23

 Message Similarity (S):leveraging the similarity among the messages sent by a user. message similarity on Twitter is less significant than on Facebook and MySpace 24

 Friend Choice (F):detect whether a profile likely used a list of names to pick its friends or not. F = Tn/Dn.  Messages Sent (M):using the number of messages sent by a profile as a feature  Friend Number (FN): Finally looking at the number of friends a profile has. 25

 1,000 profiles were used to train the classifier spam and 827 real fold cross validation estimated 2% false positive and 1% false negative.  The classifier applied to 790,951 profiles.  detected 130 spammers in this dataset, 7 were false positives. 26

 To train the classifier, 500 spam profiles were chosen, coming from - The ones that contacted the honey profiles - Manually selected from the public timeline  500 legitimate profiles picked from the public timeline.  The R feature was modified to reflect the number of followers a profile has. 27

 F feature was removed from the Twitter spam classifier.  A 10-fold cross validation for the classifier estimated - false positive ratio of 2.5% - false negative ratio of 3% on the training set.  The classifier also used to detect spammers in real time.  The problem was the crawling speed. - Twitter limited the machine to execute only 20,000 API calls per hour. 28

 Google was used to search for the common words detected before by spammers.  Only detect tweets with similar words.  Public service was created to address this limitation.  The classifier was able to detect 15,932 of those as spammers.  Only 75 were reported by Twitter to be false positives. 29

 Spam campaign refer to multiple spam profiles that act under the coordination of a single spammer.  Bots posting messages with URLs pointing to the same site are part of the same campaign  Some bots hide the real URLs. - To avoid detection - Meet the massage length requirement 30

 The behavior of bots to choose their victims seem not to be uniform for the various campaigns – Sharing same hashtag when they tweets. - Some of them targeted an anomalous number of private profiles. 31

32 [1]

33 [1]

33 [1]

33 [1]

34 [1]

 This study was able to detect many spam account specially in Twitter.  It was able to detect both single and campaign spammers.  Strength: Studying three social networks for a long period of time.  Low false negative and false positive ratios.  Limitations: Works well only on Twitter.  In future work more work should be done to identify spammers on social network that do not share many public information such as Facebook. 35

 [1] Stringhini, G., Kruegel, C., & Vigna, G. (2010, December). Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference (pp. 1- 9). ACM. 36