Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.

Slides:



Advertisements
Similar presentations
Influence and Passivity in Social Media Daniel M. Romero, Wojciech Galuba, Sitaram Asur, and Bernardo A. Huberman Social Computing Lab, HP Labs.
Advertisements

SOCIAL MEDIA & PHYSICAL ACTIVITY PROMOTION: MAKING THE CONNECTIONS Presented by: Sandra De Freitas
1 KSIDI June 9, 2010 Measuring User Influence in Twitter: The Million Follower Fallacy Meeyoung Cha Max Planck Institute for Software Systems (MPI-SWS)
PSRC Technology Integration Team TWITTER 101.  Twitter is a social networking tool or microblog.  It is composed of short text, pictures, and URLs called.
@ SPAM : T HE U NDERGROUND ON 140 C HARACTERS OR L ESS Chris Grier, Vern Paxson, Michael Zhang University of California, Berkeley Kurt Thomas University.
A Beginner’s Guide to Social Media Nevada State Board of Nursing September 18-20, 2013 Las Vegas, Nevada.
Twitter Twends and Tips Alicia Anderson, Blytheco Suzanne Spear, Sage Greg Tirico, Sage.
The Role of Twitter in YouTube Videos Diffusion George Christodoulou EPFL Switzerland Laboratory for Internet Computing Department of Computer Science.
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
Twitter The Basics. What is Twitter? Tweets are: 140 characters or less Quick to follow and view updates Used to share links, photos, videos, music,hot.
Design and Evaluation of a Real-Time URL Spam Filtering Service
Using LinkedIn To Enhance Employability Prospects For Computing Students Thomas Lancaster Birmingham City University.
30 Tips in 30 Minutes Marketing Your Event on Social Media.
Twitter: What do so many people have to say? Mary Zedeck Instructional Designer Twitter: Course Resources:
Anthony Bonomi, Amber Heeg, Elizabeth Newton, Bianca Robinson & Marzi Shabani.
Towards Online Spam Filtering in Social Networks Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology.
Social Networking – The Ways and Means Rosey Broderick May 2011.
TwitterSearch : A Comparison of Microblog Search and Web Search
Tweet, Tweet, Tweet… Tweeting Assignments & Discussions Kara Damm, Technology Integration Specialist.
TECHNOLOGICAL ENABLERS TO ASSIST YOUR LIBRARY'S MARKETING STRATEGIES: THE POWER OF SOCIAL MEDIA PRESENTED BY MS MOSHIANE RAMAUBE MS MANDISA LAKHENI.
Using Social Networks in Education Region One Technology Conference May 11, 2010.
PSRC Technology Integration Team Twitter 101.  Twitter is a social networking tool or microblog.  It is composed of short text, pictures, and URLs called.
SOCIAL NETWORKS AND THEIR IMPACTS ON BRANDS Edwin Dionel Molina Vásquez.
Using Social Media to Communicate and Support Your School A Closer Look at Twitter.
TEACHERS AND Adapted from Mary Harriet Talbut. So What is it?  Micro-blogging Platform  140 character limit in each tweet  Originally started as a.
How to Get, Keep, and Engage on Social Media Chere Schmidt and Rhen Wilson.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
C HAPTER Social Networking Using Twitter 7 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Using Social Media to Promote Events Paul Gillin Curator, InfoboomInfoboom Author: The New Influencers Secrets of Social Media Marketing.
Suspended Accounts in Retrospect: An Analysis of Twitter Spam Kurt Thomas, Chris Grier, Vern Paxson, Dawn Song University of California, Berkeley International.
12/2014 Heidi Larson HeidiL_edc.  Setting up an account  Twitter vocabulary – With Strategy tips  How to Tweet  Why to Tweet  How to get started.
Social Media – Facebook Vs. Twitter Twitter asks its users to regularly publish short updates about what they’re doing or thinking. Its users answer the.
Knowing Your Facebook From Your Flickr Dan O’ Neill – -
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
Cloak and Dagger: Dynamics of Web Search Cloaking David Y. Wang, Stefan Savage, and Geoffrey M. Voelker University of California, San Diego 左昌國 Seminar.
Skills: familiarity with the Twitter user interface and major features, the #hashtag and search Concepts: evolution of Twitter applications.
Skills: familiarity with the Twitter user interface and major features, the #hashtag and search Concepts: evolution of Twitter applications.
Microblogs: Information and Social Network Huang Yuxin.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
 Social Media for Public Interaction. Major Questions  How is the public sector using social media?  Analyzing individual users  How are people discussing.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
THE GLOBAL LEADER FOR FUNDRAISING IN THE CLOUD ONE WORLD. ZERO BARRIERS. Carla Ferreira 17 July 2012.
Brenna Patterson|Jenna Quiring|Allison Riggs| Kala’e Parish “Twitter is word-of-mouth marketing on steroids.” –Adam Franklin, journalist.
Social Media: The Basics Teresa Marks School Community Oral Health Conference Friday, October 16, 2015.
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
What is Social Media? Why Use It? Social Media Tools Facebook Twitter Linking social media in your website
We.b : The web of short URLs Demetris Antoniades, lasonas Polakis, Gerogios Kontaxis, Elias Athansapoulos, Sotiris loannidis, Evangelos P.Markatos, Thomas.
Twitter for Business 140 Character Advertising and Customer Engagement.
#GoingViral giulia_bonelli, formicablu Using social media to promote research CAGLIARI,
Dominique Renault. > Groups Groups - A group can be set up by any user and can be set to private. These are generally used by smaller groups of people.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida Universidade Federal de Minas Gerais Belo Horizonte, Brazil ACSAC 2010 Fabricio.
Measuring User Influence in Twitter: The Million Follower Fallacy Meeyoung Cha Hamed Haddadi Fabricio Benevenuto Krishna P. Gummadi.
Chapter 8: Web Analytics, Web Mining, and Social Analytics
Twitter Part One – The Fundamentals. First things first… What is Twitter? Social networking platform Short messages – 140 characters maximum Relaxed,
Twitter anyone? Sue Newell Chief Operating Officer Faculty of Health and Social Sciences Leeds Metropolitan University.
Personal Branding. Objectives How do you see yourself? How do others see you? What is your personal brand?
Internet in 21st Century. We all use web in our daily lives, from our mobiles or coputers. However we do not realize how fast is internet getting bigger.
Uncovering Social Spammers: Social Honeypots + Machine Learning
Hummingbird: Privacy at the time of Twitter
Chapter 7 E-commerce Marketing Communications. Chapter 7 E-commerce Marketing Communications.
Your Company Competitor Report {Insert Company Logo Here}
The important use of Twitter in the Educators’ World
OCT 2017.
In the Classroom.
Social Media Account Management Services
Twitter 330 million Montlhy Active Users
The World of Social Media
Digital Marketing Starter Course
Presentation transcript:

Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University ACSAC2012

OUTLINE Introduction - DATA COLLECTION - TWEET TYPES STRATEGIES FOR PICKING TARGET DISCUSSION - Posting methodology - Unbinned Spam Profiles - Gathering followers RELATE WORK CONCLUSION

Introduction spam has been a problem for decades As spam filtering programs have improved, with many claiming 99% or higher accuracies Spammers have looked for other avenues Online social networks (OSNs)

OSN: TWITTER WHY Twitter ? - Twitter alone boasted 140 million users as of March 2012 [20] - Fighting spam on OSNs requires new types of filtering techniques New topic of spam on OSNs (Classifiers) we do not know how spammers pick their targets

DATA COLLECTION Twitter’s streaming API (collect tweets)(samples) November ,991,050 tweets / 7,078,643 profiles we visited looked for suspended profiles (SPAM?) suspended profiles

suspended profiles

DATA COLLECTION Eliminated languages other than English > (suspended profiles) 10 tweets within five days -successful spam profiles (14230) -unsuccessful spam profiles

70% of unsuccessful spam profiles and 15% of successful spam profiles get suspended on the first day [16] 77% of spam profiles were suspended on the first day and 92% within three days> [16] Thomas, K., Grier, C., Song, D., and Paxson, V. Suspended accounts in retrospect: an analysis of twitter spam. In ACM/USENIX Internet Measurement Conference (IMC) (2011)

TWEET TYPES regular tweet Attack : Sender’s follower reply tweet Attack : anyone mention tweet Attack : anyone Retweet Attack : Sender’s follower

1. Regular Tweets: Successful spam > Unsuccessful spam 2. Replies Tweets :Successful spam < Unsuccessful spam Twitter is known to suspend accounts which send large numbers of replies or mentions [19] 3. Mention Tweets: Successful, Unsuccessful : 1/5,1/4 Thomas et al. a year ago [16] found that 52% of spam profiles made use of mention tweets. we conclude that Twitter spammers have evolved their strategies in the last one year

We find that over 3/4 of successful spam profiles exclusively used only one type of tweet Spammers vs Other-user 3/4 2/3 14 %

STRATEGIES FOR PICKING TARGET 1.Spamming Ones Own Followers 2.Spamming Followers of Popular Profiles 3.Spamming based on Keywords in Tweets 4.Trending Topics Hijacking 5.Targeting Own Followers by Reweets

Spamming Ones Own Followers Nearly 40% of unsuccessful spam profiles have zero followers and a total of 2/3 (66%) have less than 10. Thomas et al. noted in their work that 89% of spam profiles have less than 10 followers. (1 year before) 1/3 of successful spam profiles have over a 100 followers spammers become smarter

14230 profiles >> ten regular tweets with link >> 7704 >> 80% Url same Domain >> <> 559 different domains - t.co (1822) - Amazon.com (1741) Affiliate ID

Amazon.com All profiles using the same affiliate ID were clearly part of the same campaign. Profiles across multiple IDs belonged to a spam campaign Top five

Spamming Followers of Popular Profiles Ex. Basketball lovers, Reply or Mention tweets ( >4 user receive same spam & 50% follow same person ) >> reply or mention >> 4086 >> 877 (26)

Spamming based on Keywords in Tweets Spammers can also pick their targets based on the content of tweets from Twitter users. ex: search “bumbler” “justinbieber” Reply or Mention tweets (TF-IDF[8] 7 million words(spam tweets) -> 50K words) 1004 (1)(150) Spam reply tweet: Here ip5 0rz.tw/ab source tweet: Wow ip5~

Trending Topics Hijacking Hashtag ( 圖 ) Ex. #bumbler Spammers have been known to hijack trending topics to increase the visibility of their spam campaigns [16] Various types of tweets (#iphone5) 4327 (spam,#) >> top 200 hashtag >> 1043 (523)(14)(3)

Targeting Own Followers by Reweets Reweets 1230 used retweets 1230 >> 10 tweets with url >> retweeting from omgwire (promoting) Overall 5 methods 8805 / (61.9%)

DISCUSSION - Posting methodology - Unbinned Spam Profiles - Gathering followers

Posting methodology

Twitterfeed : sucessful spammer tweets 2/3 Web : profiles

Others *organic profiles use several different apps, where as spammers have fewer dedicated apps. 92% 80%60%

Unbinned Spam Profiles Overall 5 methods 8805 / (61.9%) 10 url tweets, 80% same domain (5 url, 50%) 61.9 % >> 72% TweetAdder, based on their geographical location and language Not spamer (ex. violence)

Gathering followers 1. communities (encourage following back) #InstantFollowBack(#IFB) 2. Buy

fiverr

RELATE WORK YOUTUBE [2] video spam on Youtube and employ machine learning techniques to identify spammers on YouTube FaceBook [5] involves detecting and characterizing spam campaigns on Facebook.

youtube

CONCLUSION We analyzed strategies of successful Twitter spammers Particularly as they relate to picking spam target The spammers themselves evolved in a mere mattter of one year(Thomas [16]) Need more data

End THANKS