Skip to main content

Hiding in Plain Sight: The Anatomy of Malicious Pages on Facebook

  • Chapter
  • First Online:

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

Facebook is the world’s largest Online Social Network, having more than one billion users. Like most social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this chapter, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We revisit the scope and definition of what is deemed as “malicious” in the modern day Internet, and identify 627 pages publishing untrustworthy information, misleading content, adult and child unsafe content, scams, etc. We perform in-depth characterization of pages through spatial and temporal analysis. Upon analyzing these pages, our findings reveal dominant presence of politically polarized entities engaging in spreading content from untrustworthy web domains. Studying the temporal posting activity of pages reveals that malicious pages are 1.4 times more active daily than benign pages. We further identify collusive behavior within a set of malicious pages spreading adult and pornographic content. Finally, we attempt to automate the process of detecting malicious Facebook pages by extensively experimenting with multiple supervised learning algorithms and multiple feature sets. Artificial neural networks trained on a fixed sized bag-of-words perform the best and achieve a maximum ROC area under curve value of 0.931.

This chapter is an extended version of the paper titled “Hiding in Plain Sight: Characterizing and Detecting Malicious Facebook Pages” previously accepted at ASONAM 2016.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://grahamcluley.com/2015/09/british-airways-isnt-giving-away-free-flights-year-facebook-scam/.

  2. 2.

    http://www.marca.com/2014/07/18/en/football/barcelona/1405709402.html.

  3. 3.

    https://www.facebook.com/help/174987089221178.

  4. 4.

    http://mturk.com/.

  5. 5.

    http://crowdflower.com/.

  6. 6.

    https://developers.facebook.com/docs/graph-api/reference/page/feed.

  7. 7.

    https://www.mywot.com/wiki/API.

  8. 8.

    http://www.alexa.com/.

  9. 9.

    Exact description for each of these attributes can be found at https://developers.facebook.com/docs/graph-api/reference/page/.

  10. 10.

    https://developers.facebook.com/docs/graph-api/reference/v2.6/post.

  11. 11.

    http://lowrank.net/nikos//sparsenn/.

References

  1. Aggarwal, A., Rajadesingan, A., Kumaraguru, P.: PhishAri: automatic realtime phishing detection on twitter. In: eCrime Researchers Summit (eCrime), 2012, pp. 1–12. IEEE, Piscataway (2012)

    Google Scholar 

  2. Ahmed, F., Abulaish, M.: An MCL-based approach for spam profile detection in online social networks. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 602–608. IEEE, Piscataway (2012)

    Google Scholar 

  3. Akoglu, L., Chandy, R., Faloutsos, C.: Opinion fraud detection in online reviews by network effects. In: Proceedings of the seventh International AAAI Conference on Weblogs and Social Media, pp. 2–11 (2013)

    Google Scholar 

  4. Carlisle, J.E., Patton, R.C.: Is social media changing how we understand political engagement? An analysis of Facebook and the 2008 presidential election. Polit. Res. Q. 66(4), 883–895 (2013)

    Article  Google Scholar 

  5. Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of the 20th International Conference on World Wide Web, pp. 675–684. ACM, New York (2011)

    Google Scholar 

  6. Cha, M., Haddadi, H., Benevenuto, F., Gummadi, P.K.: Measuring user influence in twitter: the million follower fallacy. In: Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media, pp. 10–17 (2010)

    Google Scholar 

  7. De Choudhury, M., Monroy-Hernandez, A., Mark, G.: Narco emotions: affect and desensitization in social media during the Mexican drug war. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 3563–3572. ACM, New York (2014)

    Google Scholar 

  8. Dewan, P., Kumaraguru, P.: Towards automatic real time identification of malicious posts on Facebook. In: 13th Annual Conference on Privacy, Security and Trust (PST), pp. 85–92. IEEE, Piscataway (2015)

    Google Scholar 

  9. Dewan, P., Bagroy, S., Kumaraguru, P.: Hiding in plain sight: characterizing and detecting malicious Facebook pages. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 193–196. IEEE, Los Alamitos (2016)

    Google Scholar 

  10. Douceur, J.R.: The Sybil attack. In: Peer-to-Peer Systems, pp. 251–260. Springer, Berlin (2002)

    Chapter  Google Scholar 

  11. Douglas, S., Maruyama, M., Semaan, B., Robertson, S.P.: Politics and young adults: the effects of Facebook on candidate evaluation. In: Proceedings of the 15th Annual International Conference on Digital Government Research, pp. 196–204. ACM, New York (2014). http://doi.acm.org/10.1145/2612733.2612754

  12. Facebook: what is page spam?. https://www.facebook.com/help/116053525145846 (2015). Accessed 18 Sept 2015

  13. Facebook.com: Facebook community standards. https://www.facebook.com/communitystandards (2015). Accessed 12 July 2017

  14. Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection. In: Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media, pp. 175–184 (2013)

    Google Scholar 

  15. Friggeri, A., Adamic, L.A., Eckles, D., Cheng, J.: Rumor cascades. In: Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media (2014)

    Google Scholar 

  16. Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Internet Measurement Conference, pp. 35–47. ACM, New York (2010)

    Google Scholar 

  17. Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.N.: Towards online spam filtering in social networks. In: NDSS (2012)

    Google Scholar 

  18. Guardian, T.: Facebook’s failure: did fake news and polarized politics get trump elected?. https://www.theguardian.com/technology/2016/nov/10/facebook-fake-news-election-conspiracy-theories (2016). Accessed 12 July 2017

  19. Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, p. 2. ACM, New York (2012)

    Google Scholar 

  20. Gupta, M., Zhao, P., Han, J.: Evaluating event credibility on twitter. In: Proceedings of the 2012 SIAM International Conference on Data Mining, pp. 153–164. SIAM, Philadelphia (2012)

    Chapter  Google Scholar 

  21. Gupta, A., Kumaraguru, P., Castillo, C., Meier, P.: TweetCred: real-time credibility assessment of content on twitter. In: Social Informatics, pp. 228–243. Springer, Cham (2014)

    Google Scholar 

  22. Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Catching synchronized behaviors in large networks: a graph mining approach. ACM Trans. Knowl. Discov. Data 10(4), 35:1–35:27 (2016). Article No. 35

    Google Scholar 

  23. Jiang, M., Cui, P., Faloutsos, C.: Suspicious behavior detection: current trends and future directions. IEEE Intell. Syst. 31, 31–39 (2016)

    Article  Google Scholar 

  24. Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219–230. ACM, New York (2008)

    Google Scholar 

  25. Karma, F.: Study: average growth of Facebook fan pages. http://blog.fanpagekarma.com/2013/03/20/infographic-average-growths-facebook-fan-pages/ (2013). Accessed 12 July 2017

  26. Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 435–442. ACM, New York (2010)

    Google Scholar 

  27. Lim, E.P., Nguyen, V.A., Jindal, N., Liu, B., Lauw, H.W.: Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, pp. 939–948. ACM, New York (2010)

    Google Scholar 

  28. Mann, H.B., Whitney, D.R.: On a test of whether one of two random variables is stochastically larger than the other. Ann. Math. Stat. 18(1), 50–60 (1947)

    Article  Google Scholar 

  29. Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we RT? In: Proceedings of the First Workshop on Social Media Analytics, pp. 71–79. ACM, New York (2010)

    Google Scholar 

  30. Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st International Conference on World Wide Web, pp. 191–200. ACM, New York (2012)

    Google Scholar 

  31. Mukherjee, A., Kumar, A., Liu, B., Wang, J., Hsu, M., Castellanos, M., Ghosh, R.: Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 632–640. ACM, New York (2013)

    Google Scholar 

  32. Pennebaker, J.W., Chung, C.K., Ireland, M., Gonzales, A., Booth, R.J.: The development and psychometric properties of LIWC2007, Austin, TX: LIWC.net (2007)

    Google Scholar 

  33. Rahman, M.S., Huang, T.K., Madhyastha, H.V., Faloutsos, M.: Efficient and scalable socware detection in online social networks. In: USENIX Security Symposium, pp. 663–678 (2012)

    Google Scholar 

  34. Ratkiewicz, J., Conover, M., Meiss, M., Gonçalves, B., Patil, S., Flammini, A., Menczer, F.: Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp. 249–252. ACM, New York (2011)

    Google Scholar 

  35. Ratkiewicz, J., Conover, M., Meiss, M.R., Gonçalves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, pp. 297–304 (2011)

    Google Scholar 

  36. Sheng, S., Wardman, B., Warner, G., Cranor, L., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: Sixth Conference on Email and Anti-Spam (CEAS) (2009)

    Google Scholar 

  37. Stieglitz, S., Dang-Xuan, L.: Political communication and influence through microblogging – an empirical analysis of sentiment in twitter messages and retweet behavior. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 3500–3509. IEEE, Los Alamitos (2012)

    Google Scholar 

  38. Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1–9. ACM, New York (2010)

    Google Scholar 

  39. Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Election forecasts with twitter: How 140 characters reflect the political landscape. Soc. Sci. Comput. Rev. 29, 402–418 (2010). https://doi.org/10.1177/0894439310386557

    Article  Google Scholar 

  40. Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Predicting elections with twitter: What 140 characters reveal about political sentiment. In: Proceedings of the fourth International AAAI Conference on Weblogs and Social Media, pp. 178–185 (2010)

    Google Scholar 

  41. Vitak, J., Zube, P., Smock, A., Carr, C.T., Ellison, N., Lampe, C.: It’s complicated: Facebook users’ political participation in the 2008 election. CyberPsychol. Behav. Soc. Netw. 14(3), 107–114 (2011)

    Article  Google Scholar 

  42. Wang, Y., Leon, P.G., Scott, K., Chen, X., Acquisti, A., Cranor, L.F.: Privacy nudges for social media: an exploratory facebook study. In: Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 763–770. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva (2013)

    Google Scholar 

  43. WOT: Web of trust api. https://www.mywot.com/en/api (2014). Accessed 12 July 2017

  44. Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network Sybils in the wild. ACM Trans. Knowl. Discov. Data 8(1), 2 (2014)

    Article  Google Scholar 

  45. Zhang, X., Zhu, S., Liang, W.: Detecting spam and promoting campaigns in the twitter social network. In: IEEE 12th International Conference on Data Mining (ICDM), pp. 1194–1199. IEEE, Piscataway (2012)

    Google Scholar 

Download references

Acknowledgements

We would like to thank all the members of Precog Research Group and Cybersecurity Education and Research Centre (CERC) at IIIT Delhi for their constant support and feedback for this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prateek Dewan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Dewan, P., Bagroy, S., Kumaraguru, P. (2018). Hiding in Plain Sight: The Anatomy of Malicious Pages on Facebook. In: Kaya, M., Kawash, J., Khoury, S., Day, MY. (eds) Social Network Based Big Data Analysis and Applications. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-78196-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78196-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78195-2

  • Online ISBN: 978-3-319-78196-9

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics