Download presentation
Presentation is loading. Please wait.
Published byRandolph Dean Modified over 7 years ago
1
Gross Niv, Ben-Gurion University CS20225921, Advanced Topics in On-Line Social Networks Analysis
2
Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit
ChaoYang Robert Harkreader Jialong Zhang Seungwon Shin Guofei Gu Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit A Case Study of Cyber Criminal Ecosystem on Twitter Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
3
Few Pictures of The Authors:
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
4
A Few General Questions. How many Monthly active users ?
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
5
A Few General Questions. How many Monthly active users ?
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
6
A Few General Questions. How many Monthly active users ?
How Many percent are Active Users on mobile ? Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
7
A Few General Questions. How many Monthly active users ?
How Many percent are Active Users on mobile ? Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
8
A-Few General Questions. How many Monthly active users ?
How Many percent are Active Users on mobile ? How many Employees around the world? Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
9
A Few General Questions. How many Monthly active users ?
How Many percent are Active Users on mobile ? How many Employees around the world? Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
10
Chapters: INTRODUCTION RESEARCH GOAL AND DATASET
INNER SOCIAL RELATIONSHIPS OUTER SOCIAL RELATIONSHIPS INFERRING CRIMINAL ACCOUNTS RELATED WORK LIMITATIONS AND FUTURE WORK CONCLUSION Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
11
Spam Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
12
Malware: Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
13
Question: Anyone knows what's Twitter’s “Follow Limit Policy”?
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
14
Question: Anyone knows what's Twitter’s “Follow Limit Policy”?
According to this policy, once an account has followed 2,000 users, the number of additional accounts it can follow is limited to its follower number Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
15
Updated Twitter Rules This Days:
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
16
Updated Twitter Rules This Days:
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
17
Command And Control Server which control botnets in order to transfer instruction The server can send commands threw twitter accounts (Base-64 encoded text) Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
18
Criminal accounts Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
19
Ways cyber criminal uses twitter:
sending spam phishing scams spreading malware hosting botnet C&C channels launching other underground illicit activities. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
20
How Twitter Community Help Cyber Criminal
Help them spread their illicit content with increasing the visibility of their malicious content. Harder to Detect the criminal account when been followed by legitimate accounts. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
21
Victims Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
22
Twitter Rules(spammer)
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
23
How would you label URL as a malicious?
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
24
Google Safe Browsing The URLs are labeled as malicious by using the widely-used URL blacklist Google Safe Browsing (GSB) and a high-interaction client honeypot, implemented using Capture-HPC. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
25
Research target The research target ,on criminal accounts as defined by Twitter Rules, who mainly post malicious URLs linking to malicious content with an intention to compromise users computers or privacy. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
26
Dataset Twitter Accounts 485,721 Tweets 14,401,157 URLs 5,805,351
malicious affected accounts 10,004 identified as spammer accounts 2,060 Date of tapping into twitter’s streaming April July 2010 Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
27
Twitter Accounts As Graph
following someone1 someone2 someone3 In dataset, the criminal relationship graph consists of 2,060 nodes and 9,868 directed edges Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
28
Criminal Relationship graph:
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
29
Compare with three metrics
graph density Reciprocity Average Shortest Path Length Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
30
Different Between legitimate twitter account and criminal accounts
The graph density is defined for directed simple graph: Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
31
The graph density following |E| = ? someone1 someone2 someone3
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
32
The graph density following |E| = 6 |V| = ? someone1 someone2 someone3
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
33
The graph density following |E| = 6 |V| = 3 = 6 3⋅ 3−1 =1 someone1
= 6 3⋅ 3−1 =1 |V| = 3 Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
34
The graph density following |E| = 3 |V| = 3 = 3 3⋅ 3−1 = 1 2 someone1
= 3 3⋅ 3−1 = 1 2 |V| = 3 Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
35
The graph density |E| = 0 |V| = 3 = 0 3⋅ 3−1 =0 someone1 someone2
= 0 3⋅ 3−1 =0 |V| = 3 Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
36
Density Different Between legitimate twitter account and criminal accounts
Legitimate Twitter accounts 41.7 million users ,1.47billion edges 𝟖.𝟒𝟓⋅ 𝟏𝟎 −𝟕 Criminal relationship 𝟐.𝟑𝟑⋅ 𝟏𝟎 −𝟑 Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
37
Different Between legitimate twitter account and criminal accounts
Reciprocity- is represented by the number of bi-directional links to the number of out links (follow each other) someone1 someone2 Following each other Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
38
Different reciprocity graph
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
39
Average Shortest Path Length
Average Shortest Path Length is defined as the average number of steps along the shortest paths for all possible pairs of graph nodes data set with 3,000 accounts Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
40
following quality “following quality”-which is the average follower number of an account’s all following accounts. In this way, a higher following quality of an account implies that this account tends to follow those accounts with more followers. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
41
Following quality example
someone2 4 someone1 someone3 6 FQ= (4+6)/2 =5 Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
42
Following quality In this way, a higher following quality of an account implies that this account tends to follow those accounts with more followers. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
43
Following quality Diffrence
Select a paper and notify me by Tuesday, November 8, 2016 Recommended reading: This observation validates that criminal accounts’ actions of indiscriminately following others lead them to connect with low quality accounts, and hence connect with other criminal accounts. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
44
CONCLUSION Criminal accounts tend to be socially connected, forming a small-world network Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
45
Victims Criminal leaves Criminal hubs
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
46
Victims Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
47
Victims Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
48
Compared to the Bee Community
Criminal leaves, like bee workers, mainly focus on collecting pollen. Criminal hubs, like bee queens, mainly focus on supporting bee workers and acquiring pollen from them. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
49
Which kind of supports you inspect there are ?
Criminal Supporters They are accounts outside the criminal community, who have close “follow relationships” with criminal accounts Which kind of supports you inspect there are ? Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
50
How many supports there are in the dataset ?
Criminal Supporters How many supports there are in the dataset ? Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
51
Dataset Twitter Accounts 485,721 Tweets 14,401,157 URLs 5,805,351
malicious affected accounts 10,004 identified as spammer accounts 2,060 Date of tapping into twitter’s streaming April July 2010 Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
52
Criminal Supporters They got output 5,924 criminal of supporters
What kind of supports there are? Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
53
Characterizing Criminal Supporters After extracting criminal supporters we observe three representative categories of supporters. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
54
Social Butterflies accounts that have extraordinarily large numbers of followers and followings. These accounts build a lot of social relationships with other accounts without discriminating those accounts’ qualities. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
55
5,924 criminal of supporters
Social Butterflies How many Butterflies supporters you think there is in this dataset? 5,924 criminal of supporters Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
56
Social Butterflies They found 3,818 social butterflies (5,924 total)
The hypothesis that the reason why social butterflies tend to have close friendships with criminals is mainly because most of them usually follow back the users who follow them without careful examinations. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
57
Social Butterflies how would you validate this hypothesis ?
Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
58
Social Butterflies 10 accounts to follow 500 accounts (from the butterfly account). 10 accounts to randomly normal accounts, and 10 accounts following criminal accounts Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
59
47.8% of those butterflies follow back
Social Butterflies After 48 hours: 47.8% of those butterflies follow back 1.8% of those normal accounts follow back 0.6% of those criminal accounts follow back. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
60
Social Promoters those Twitter accounts that have large following-follower ratios larger following numbers and relatively high URL ratios. The owners of these accounts usually use Twitter to promote themselves or their business. How many social promoters there are ? 5,924 criminal of supporters 3,818 social butterflies Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
61
Social Promoters 508 social promoters
Promoters may become criminal supporters by unintentionally following criminal accounts. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
62
those Twitter accounts who post few tweets but have many followers.
Dummies those Twitter accounts who post few tweets but have many followers. The hypothesis that the reason why dummies intend to have close friendship with criminals is mainly because most of them are controlled or utilized by cyber criminals Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
63
1 account has been suspended .
Dummies Analyzed 81 dummy accounts several months after the data collection. They find that: 1 account has been suspended . 6 accounts do not exist any more (closed), 36 accounts begin posting malware URLs labeled by GSB 8 accounts begin posting (verified) phishing URLs. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
64
Dummy post This dummy account steals victims’ addresses through claiming to help people earn money. However, the dummy account sends spam. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
65
My own experience with twitter
What type of account those are ? Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
66
Similar tweet: Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
67
Later on twitter deleted those accounts
My own experience with twitter Later on twitter deleted those accounts Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
68
My own experience with twitter
What type of account this? Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
69
After few days I did not follow back this account unfollowed me
My own experience with twitter After few days I did not follow back this account unfollowed me Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
70
Limitations The dataset may contain some bias
The number of our analyzed criminal accounts is most likely only a lower bound of the actual number in the dataset. The exact values of some metrics used in the work may vary a little bit when using different sample datasets. Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
71
CONCLUSION This Article present an analysis of the cyber criminal ecosystem on Twitter. It provides in-depth investigation on inner and outer social relationships. The Article reveal the characteristics of three representative categories of criminal supporters Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
72
Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit
ChaoYang Robert Harkreader Jialong Zhang Seungwon Shin Guofei Gu Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit A Case Study of Cyber Criminal Ecosystem on Twitter Gross Niv, Ben-Gurion University CS , Advanced Topics in On-Line Social Networks Analysis
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.