Skip to main content
Log in

Analysis of and defense against crowd-retweeting based spam in social networks

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

Social networking websites with microblogging functionality, such as Twitter or Sina Weibo, have emerged as popular platforms for discovering real-time information on the Web. Like most Internet services, these websites have become the targets of spam campaigns, which contaminate Web contents and damage user experiences. Spam campaigns have become a great threat to social network services. In this paper, we investigate crowd-retweeting spam in Sina Weibo, the counterpart of Twitter in China. We carefully analyze the characteristics of crowd-retweeting spammers in terms of their profile features, social relationships and retweeting behaviors. We find that although these spammers are likely to connect more closely than legitimate users, the underlying social connections of crowd-retweeting campaigns are different from those of other existing spam campaigns because of the unique features of retweets that are spread in a cascade. Based on these findings, we propose retweeting-aware link-based ranking algorithms to infer more suspicious accounts by using identified spammers as seeds. Our evaluation results show that our algorithms are more effective than other link-based strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12

Similar content being viewed by others

References

  1. Becchetti, L., Castillo, C., Donato, D., Baeza-YATES, R., Leonardi, S.: Link analysis for Web spam detection. ACM Trans. Web 2(1), 2:1–2:42 (2008)

    Article  Google Scholar 

  2. Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS) (2010)

  3. Chen, C., Wen, S., Zhang, J., Xiang, Y., Oliver, J., Alelaiwi, A., Hassan, M.M.: Investigating the deceptive information in twitter spam. Futur. Gener. Comput. Syst. 72, 319–326 (2017)

    Article  Google Scholar 

  4. Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: Detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining, ASONAM ’13, pp. 116–120 (2013)

  5. Crawler4j: https://github.com/yasserg/crawler4j (2017)

  6. Danezis, G., Mittal, P.: Sybilinfer: Detecting sybil nodes using social networks. In: Proceedings of the network and distributed system security symposium(NDSS), San Diego, 8th February - 11th February (2009)

  7. Fayazi, A., Lee, K., Caverlee, J., Squicciarini, A.: Uncovering crowdsourced manipulation of online reviews. In: Proceedings of the 38th international ACM SIGIR conference on research and development in information retrieval, pp. 233–242. ACM (2015)

  8. Fielding, N., Cobain, L.: Revealed: Us spy operation that manipulates social media http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks (2011)

  9. Freelancer.com: https://www.freelancer.com/about (2017)

  10. Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st international conference on World Wide Web, WWW ’12, pp. 61–70 (2012)

  11. Gyöngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating Web spam with trustrank In: Proceedings of the Thirtieth international conference on very large data bases, vol. 30, VLDB ’04, pp. 576–587 (2004)

    Chapter  Google Scholar 

  12. Kittur, A., Chi, E.H., Suh, B.: Crowdsourcing user studies with mechanical turk. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI ’08, pp. 453–456 (2008)

  13. Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. J. ACM 46(5), 604–632 (1999)

    Article  MathSciNet  Google Scholar 

  14. Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media?. In: Proceedings of the 19th international conference on World Wide Web, WWW ’10, pp. 591–600 (2010)

  15. Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval, SIGIR ’10, pp. 435–442 (2010)

  16. Li, H., Chen, Z., Mukherjee, A., Liu, B., Shao, J.: Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In: ICWSM, pp. 634–637 (2015)

  17. Liu, B., Luo, J., Cao, J., Ni, X., Liu, B., Fu, X.: On crowd-retweeting spamming campaign in social networks. In: IEEE international conference on communications (ICC), 2016., pp. 1–6. IEEE (2016)

  18. Liu, Y., Liu, Y., Zhang, M., Ma, S.: Pay Me and I’ll follow you: detection of crowdturfing following activities in microblog environment. In: International joint conference on artificial intelligence (IJCAI) (2016)

  19. Lunden, I.: Twitter vulnerability allows cyber criminals to spread spam. http://www.one.com (2012)

  20. Matthias, H., Tobias, H., Tran-Gia, P.: Anatomy of a crowdsourcing platform - using the example of microworkers.com. In: Proceedings of the 2011 Fifth international conference on innovative mobile and internet services in ubiquitous computing, IMIS ’11, pp. 322–329 (2011)

  21. Microworkers.com: https://ttv.microworkers.com/index/template (2017)

  22. Motoyama, M., McCoy, D., Levchenko, K., Savage, S., Voelker, G.M.: Dirty jobs: the role of freelance labor in Web service abuse. In: Proceedings of the 20th USENIX conference on security, SEC’11, pp. 14–14 (2011)

  23. Sandaha: http://www.sandaha.com/ (2017)

  24. Scrapy: https://github.com/scrapy/scrapy (2017)

  25. SDK, S.W.O.: http://open.weibo.com/wiki/SDK (2017)

  26. Smith, C.: 61 amazing weibo statistics and facts. Digital Statistics and Gadgets 2017-03-18. http://expandedramblings.com/index.php/weibo-user-statistics/ (2017)

  27. Sparks, D.: How many users does twitter have? The Motley Fool (2017)

  28. Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC ’11, pp. 243–258 (2011)

  29. Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: Proceedings of the 6th USENIX symposium on networked systems design and implementation, NSDI’09, pp. 15–28 (2009)

  30. Turk, A.M.: https://requester.mturk.com/ (2017)

  31. Twitter: http://www.twitter.com/ (2017)

  32. Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based sybil defenses. SIGCOMM Comput. Commun. Rev 41(4), 363–374 (2010)

    Article  Google Scholar 

  33. Wang, A.H.: Don’T follow me - spam detection in twitter. In: Proc. of IEEE SECRYPT, pp. 142–151 (2010)

  34. Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf: Crowdturfing for fun and profit. In: Proceedings of the 21st International conference on World Wide Web, WWW ’12, pp. 679–688 (2012)

  35. Weibo, S.: http://weibo.com/ (2017)

  36. Wikipedia: Internet water army http://en.wikipedia.org/wiki/Internet_Water_Army(2015)

  37. Xue, J., Yang, Z., Yang, X., Wang, X., Chen, L., Dai, Y.: Votetrust: leveraging friend invitation graph to defend against social network sybils. In: Proceeding of the 32Nd IEEE international conference on computer communications, INFOCOM ’2013 (2013)

  38. Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st international conference on World Wide Web, WWW ’12, pp. 71–80 (2012)

  39. Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In: Proceedings of the 14th international conference on recent advances in intrusion detection, RAID’11, pp. 318–337 (2011)

    Google Scholar 

  40. Yang, X., Yang, Q., Wilson, C.: Penny for your thoughts: searching for the 50 cent party on Sina Weibo. In: ICWSM, pp. 694–697 (2015)

  41. Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network sybils in the wild. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC ’11, pp. 259–268 (2011)

  42. Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010)

    Article  Google Scholar 

  43. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM ’06, pp. 267–278 (2006)

  44. Zhubajie: http://www.zhubajie.com/ (2017)

Download references

Acknowledgements

This work is supported by National Natural Science Foundation of China under Grants, No. 61370208, No. 61472081, No. 61772133, No. 61402104, No. 61320106007, No. 61370207, US NSF under awards CNS-1527303 and OAC-1642124, Collaborative Innovation Center of Wireless Communications Technology, Collaborative Innovation Center of Social Safety Science and Technology, Jiangsu Provincial Key Laboratory of Network and Information Security (BM2003201),and Key Laboratory of Computer Network and Information Integration of Ministry of Education of China under Grants No. 93K-9.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Liu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on Social Computing and Big Data Applications

Guest Editors: Xiaoming Fu, Hong Huang, Gareth Tyson, Lu Zheng, and Gang Wang

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, B., Ni, Z., Luo, J. et al. Analysis of and defense against crowd-retweeting based spam in social networks. World Wide Web 22, 2953–2975 (2019). https://doi.org/10.1007/s11280-018-0613-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-018-0613-y

Keywords

Navigation