Skip to main content

Quit Playing Games with My Heart: Understanding Online Dating Scams

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9148))

Abstract

Online dating sites are experiencing a rise in popularity, with one in five relationships in the United States starting on one of these sites. Online dating sites provide a valuable platform not only for single people trying to meet a life partner, but also for cybercriminals, who see in people looking for love easy victims for scams. Such scams span from schemes similar to traditional advertisement of illicit services or goods (i.e., spam) to advanced schemes, in which the victim starts a long-distance relationship with the scammer and is eventually extorted money.

In this paper we perform the first large-scale study of online dating scams. We analyze the scam accounts detected on a popular online dating site over a period of eleven months, and provide a taxonomy of the different types of scammers that are active in the online dating landscape. We show that different types of scammers target a different demographics on the site, and therefore set up accounts with different characteristics. Our results shed light on the threats associated to online dating scams, and can help researchers and practitioners in developing effective countermeasures to fight them.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The data about the users of Jiayuan was collected according to the company’s privacy policy and it was only accessed by two of the authors of this paper, who were Jiayuan employees at the time the research was conducted. The authors external to Jiayuan did not access any personal or sensitive information about any user on the online dating site, but instead worked with aggregated statistics.

  2. 2.

    Note that this number takes into accounts also those accounts that never received a message at all on the site.

References

  1. Jiayuan. http://www.jiayuan.com/

  2. eHarmony (2013). http://www.eharmony.com

  3. OkCupid (2013). http://www.okcupid.com

  4. Online dating sites pricing (2013). http://www.nextadvisor.com/online_dating/compare.php

  5. Online Dating Statistics 2013. http://www.statisticbrain.com/online-dating-statistics/

  6. Afroz, S., Brennan, M., Greenstadt, R.: Detecting hoaxes, frauds, and deception in writing style online. In IEEE Symposium on Security and Privacy (2012)

    Google Scholar 

  7. Baltazar, J., Costoya, J., Flores, R.: KOOBFACE: the largest web 2.0 botnet explained. Trend Micro Threat Research (2009)

    Google Scholar 

  8. Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Conference on Email and Anti-spam (CEAS) (2010)

    Google Scholar 

  9. Cai, Z., Jermaine, C.: The latent community model for detecting sybils in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)

    Google Scholar 

  10. Cao, Y., Yegneswaran, V., Possas, P., Chen, Y.: PathCutter: severing the self-propagation path of XSS javascript worms in social web networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)

    Google Scholar 

  11. Chen, L., Nayak, R.: Social network analysis of an online dating network. In: Proceedings of the 5th International Conference on Communities and Technologies (2011)

    Google Scholar 

  12. Drucker, H., Wu, D., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 988–999 (1999)

    Article  Google Scholar 

  13. Dyrud, M.A.: “I brought you a good news”: an analysis of nigerian 419 letters. In: Association for Business Communication Annual Convention (2005)

    Google Scholar 

  14. Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: Compa: detecting compromised accounts on social networks. In: Symposium on Network and Distributed System Security (NDSS) (2013)

    Google Scholar 

  15. Fiore, A., Tresolini, R.: Romantic regressions: an analysis of behavior in online dating systems. Ph.D. thesis, Massachusetts Institute of Technology (2004)

    Google Scholar 

  16. Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards Online spam filtering in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)

    Google Scholar 

  17. Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.: Detecting and characterizing social spam campaigns. In: Internet Measurement Conference (IMC) (2010)

    Google Scholar 

  18. Gao, Y., Zhao, G.: Knowledge-based information extraction: a case study of recognizing emails of nigerian frauds. In: Montoyo, A., Muńoz, R., Métais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 161–172. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  19. Glickman, H.: The nigerian "419" advance fee scams: prank or peril? Can. J. Afr. Stud. 39(3), 460–89 (2005)

    Google Scholar 

  20. Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: ACM Conference on Computer and Communications Security (CCS) (2010)

    Google Scholar 

  21. Hao, S., Syed, N.A., Feamster, N., Gray, A.G., Krasser, S.: Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. In: USENIX Security Symposium (2009)

    Google Scholar 

  22. Herley, C.: Why do Nigerian scammers say they are from Nigeria? In: Workshop on the Economics of Information Security (WEIS) (2012)

    Google Scholar 

  23. Hitsch, G.J., Hortacsu, A., Ariely, D.: What makes you click: an empirical analysis of online dating. Society for Economic Dynamics Meeting Papers (2005)

    Google Scholar 

  24. Isacenkova, J., Thonnard, O., Costin, A., Balzarotti, D., Francillon, A.: Inside the SCAM jungle: a closer look at 419 scam email operations. In: International Workshop on Cyber Crime (IWCC) (2013)

    Google Scholar 

  25. Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: International ACM SIGIR Conference on Research and Development in Information Retrieval (2010)

    Google Scholar 

  26. Park, Y., Jones, J., McCoy, D., Shi, E., Jakobsson, M.: Scambaiter: understanding targeted nigerian scams on craigslist. In: Symposium on Network and Distributed System Security (NDSS) (2014)

    Google Scholar 

  27. Pitsillidis, A., Levchenko, K., Kreibich, C., Kanich, C., Voelker, G.M., Paxson, V., Weaver, N., Savage, S.: Botnet judo: fighting spam with itself. In: Symposium on Network and Distributed System Security (NDSS) (2010)

    Google Scholar 

  28. Pizzato, L.A., Akehurst, J., Silvestrini, C., Yacef, K., Koprinska, I., Kay, J.: The effect of suspicious profiles on people recommenders. In: Masthoff, J., Mobasher, B., Desmarais, M.C., Nkambou, R. (eds.) UMAP 2012. LNCS, vol. 7379, pp. 225–236. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  29. Rege, A.: What’s love got to do with it? Exploring online dating scams and identity fraud. Int. J. Cyber Criminol. 3(2), 494–512 (2009)

    Google Scholar 

  30. Sahami, M., Dumais, S., Heckermann, D., Horvitz, E.: A Bayesian approach to filtering junk e-mail. Learning for Text Categorization (1998)

    Google Scholar 

  31. Stringhini, G., Holz, T., Stone-Gross, B., Kruegel, C., Vigna, G.: BotMagnifier: locating spambots on the Internet. In: USENIX Security Symposium (2011)

    Google Scholar 

  32. Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Annual Computer Security Applications Conference (ACSAC) (2010)

    Google Scholar 

  33. Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y.: Follow the green: growth and dynamics in twitter follower markets. In: ACM SIGCOMM Conference on Internet Measurement (2013)

    Google Scholar 

  34. Symantec Corp. Symantec intelligence report (2013). http://www.symanteccloud.com/mlireport/SYMCINT_2013_01_January.pdf

  35. Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., Zhao, B.Y.: Social turing tests: crowdsourcing sybil detection. In: Symposium on Network and Distributed System Security (NDSS) (2013)

    Google Scholar 

  36. Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf: crowdturfing for fun and profit. In: Wold Wide Web Conference (WWW) (2012)

    Google Scholar 

  37. Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychology Behav. Soc. Netw. 15(3), 181–183 (2012)

    Article  Google Scholar 

  38. Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. SIGCOMM Comput. Commun. Rev. 38, 171–182 (2008)

    Article  Google Scholar 

  39. Xu, W., Zhang, F., Zhu, S.: Toward worm detection in online social networks. In: Annual Computer Security Applications Conference (ACSAC) (2010)

    Google Scholar 

  40. Yang, B., Gu, F., Niu, X.: Block mean value based image perceptual hashing. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2006)

    Google Scholar 

  41. Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318–337. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  42. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 40(4), 363–374 (2006)

    Google Scholar 

  43. Zhang, C.M., Paxson, V.: Detecting and analyzing automated activity on twitter. In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol. 6579, pp. 102–111. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers for their comments. We would also like to thank Ali Zand, Adam Doupé, Alexandros Kapravelos, Ben Y. Zhao, and Christo Wilson for reviewing an early draft of this paper. Your feedback was highly appreciated.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gianluca Stringhini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Huang, J., Stringhini, G., Yong, P. (2015). Quit Playing Games with My Heart: Understanding Online Dating Scams. In: Almgren, M., Gulisano, V., Maggi, F. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2015. Lecture Notes in Computer Science(), vol 9148. Springer, Cham. https://doi.org/10.1007/978-3-319-20550-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20550-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20549-6

  • Online ISBN: 978-3-319-20550-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics