Abstract
Social networking websites with microblogging functionality, such as Twitter or Sina Weibo, have emerged as popular platforms for discovering real-time information on the Web. Like most Internet services, these websites have become the targets of spam campaigns, which contaminate Web contents and damage user experiences. Spam campaigns have become a great threat to social network services. In this paper, we investigate crowd-retweeting spam in Sina Weibo, the counterpart of Twitter in China. We carefully analyze the characteristics of crowd-retweeting spammers in terms of their profile features, social relationships and retweeting behaviors. We find that although these spammers are likely to connect more closely than legitimate users, the underlying social connections of crowd-retweeting campaigns are different from those of other existing spam campaigns because of the unique features of retweets that are spread in a cascade. Based on these findings, we propose retweeting-aware link-based ranking algorithms to infer more suspicious accounts by using identified spammers as seeds. Our evaluation results show that our algorithms are more effective than other link-based strategies.
Similar content being viewed by others
References
Becchetti, L., Castillo, C., Donato, D., Baeza-YATES, R., Leonardi, S.: Link analysis for Web spam detection. ACM Trans. Web 2(1), 2:1–2:42 (2008)
Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS) (2010)
Chen, C., Wen, S., Zhang, J., Xiang, Y., Oliver, J., Alelaiwi, A., Hassan, M.M.: Investigating the deceptive information in twitter spam. Futur. Gener. Comput. Syst. 72, 319–326 (2017)
Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: Detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining, ASONAM ’13, pp. 116–120 (2013)
Crawler4j: https://github.com/yasserg/crawler4j (2017)
Danezis, G., Mittal, P.: Sybilinfer: Detecting sybil nodes using social networks. In: Proceedings of the network and distributed system security symposium(NDSS), San Diego, 8th February - 11th February (2009)
Fayazi, A., Lee, K., Caverlee, J., Squicciarini, A.: Uncovering crowdsourced manipulation of online reviews. In: Proceedings of the 38th international ACM SIGIR conference on research and development in information retrieval, pp. 233–242. ACM (2015)
Fielding, N., Cobain, L.: Revealed: Us spy operation that manipulates social media http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks (2011)
Freelancer.com: https://www.freelancer.com/about (2017)
Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st international conference on World Wide Web, WWW ’12, pp. 61–70 (2012)
Gyöngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating Web spam with trustrank In: Proceedings of the Thirtieth international conference on very large data bases, vol. 30, VLDB ’04, pp. 576–587 (2004)
Kittur, A., Chi, E.H., Suh, B.: Crowdsourcing user studies with mechanical turk. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI ’08, pp. 453–456 (2008)
Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. J. ACM 46(5), 604–632 (1999)
Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media?. In: Proceedings of the 19th international conference on World Wide Web, WWW ’10, pp. 591–600 (2010)
Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval, SIGIR ’10, pp. 435–442 (2010)
Li, H., Chen, Z., Mukherjee, A., Liu, B., Shao, J.: Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In: ICWSM, pp. 634–637 (2015)
Liu, B., Luo, J., Cao, J., Ni, X., Liu, B., Fu, X.: On crowd-retweeting spamming campaign in social networks. In: IEEE international conference on communications (ICC), 2016., pp. 1–6. IEEE (2016)
Liu, Y., Liu, Y., Zhang, M., Ma, S.: Pay Me and I’ll follow you: detection of crowdturfing following activities in microblog environment. In: International joint conference on artificial intelligence (IJCAI) (2016)
Lunden, I.: Twitter vulnerability allows cyber criminals to spread spam. http://www.one.com (2012)
Matthias, H., Tobias, H., Tran-Gia, P.: Anatomy of a crowdsourcing platform - using the example of microworkers.com. In: Proceedings of the 2011 Fifth international conference on innovative mobile and internet services in ubiquitous computing, IMIS ’11, pp. 322–329 (2011)
Microworkers.com: https://ttv.microworkers.com/index/template (2017)
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., Voelker, G.M.: Dirty jobs: the role of freelance labor in Web service abuse. In: Proceedings of the 20th USENIX conference on security, SEC’11, pp. 14–14 (2011)
Sandaha: http://www.sandaha.com/ (2017)
Scrapy: https://github.com/scrapy/scrapy (2017)
SDK, S.W.O.: http://open.weibo.com/wiki/SDK (2017)
Smith, C.: 61 amazing weibo statistics and facts. Digital Statistics and Gadgets 2017-03-18. http://expandedramblings.com/index.php/weibo-user-statistics/ (2017)
Sparks, D.: How many users does twitter have? The Motley Fool (2017)
Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC ’11, pp. 243–258 (2011)
Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: Proceedings of the 6th USENIX symposium on networked systems design and implementation, NSDI’09, pp. 15–28 (2009)
Turk, A.M.: https://requester.mturk.com/ (2017)
Twitter: http://www.twitter.com/ (2017)
Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based sybil defenses. SIGCOMM Comput. Commun. Rev 41(4), 363–374 (2010)
Wang, A.H.: Don’T follow me - spam detection in twitter. In: Proc. of IEEE SECRYPT, pp. 142–151 (2010)
Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf: Crowdturfing for fun and profit. In: Proceedings of the 21st International conference on World Wide Web, WWW ’12, pp. 679–688 (2012)
Weibo, S.: http://weibo.com/ (2017)
Wikipedia: Internet water army http://en.wikipedia.org/wiki/Internet_Water_Army(2015)
Xue, J., Yang, Z., Yang, X., Wang, X., Chen, L., Dai, Y.: Votetrust: leveraging friend invitation graph to defend against social network sybils. In: Proceeding of the 32Nd IEEE international conference on computer communications, INFOCOM ’2013 (2013)
Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st international conference on World Wide Web, WWW ’12, pp. 71–80 (2012)
Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In: Proceedings of the 14th international conference on recent advances in intrusion detection, RAID’11, pp. 318–337 (2011)
Yang, X., Yang, Q., Wilson, C.: Penny for your thoughts: searching for the 50 cent party on Sina Weibo. In: ICWSM, pp. 694–697 (2015)
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network sybils in the wild. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC ’11, pp. 259–268 (2011)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM ’06, pp. 267–278 (2006)
Zhubajie: http://www.zhubajie.com/ (2017)
Acknowledgements
This work is supported by National Natural Science Foundation of China under Grants, No. 61370208, No. 61472081, No. 61772133, No. 61402104, No. 61320106007, No. 61370207, US NSF under awards CNS-1527303 and OAC-1642124, Collaborative Innovation Center of Wireless Communications Technology, Collaborative Innovation Center of Social Safety Science and Technology, Jiangsu Provincial Key Laboratory of Network and Information Security (BM2003201),and Key Laboratory of Computer Network and Information Integration of Ministry of Education of China under Grants No. 93K-9.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article belongs to the Topical Collection: Special Issue on Social Computing and Big Data Applications
Guest Editors: Xiaoming Fu, Hong Huang, Gareth Tyson, Lu Zheng, and Gang Wang
Rights and permissions
About this article
Cite this article
Liu, B., Ni, Z., Luo, J. et al. Analysis of and defense against crowd-retweeting based spam in social networks. World Wide Web 22, 2953–2975 (2019). https://doi.org/10.1007/s11280-018-0613-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11280-018-0613-y