Abstract
Twitter has become a target platform for both promoters and spammers to disseminate their messages, which are more harmful than traditional spamming methods, such as email spamming. Recently, large amounts of campaigns that contain lots of spam or promotion accounts have emerged in Twitter. The campaigns cooperatively post unwanted information, and thus they can infect more normal users than individual spam or promotion accounts. Organizing or participating in campaigns has become the main technique to spread spam or promotion information in Twitter. Since traditional solutions focus on checking individual accounts or messages, efficient techniques for detecting spam and promotion campaigns in Twitter are urgently needed. In this article, we propose a framework to detect both spam and promotion campaigns. Our framework consists of three steps: the first step links accounts who post URLs for similar purposes; the second step extracts candidate campaigns that may be for spam or promotion purposes; and the third step classifies the candidate campaigns into normal, spam, and promotion groups. The key point of the framework is how to measure the similarity between accounts' purposes of posting URLs. We present two measure methods based on Shannon information theory: the first one uses the URLs posted by the users, and the second one considers both URLs and timestamps. Experimental results demonstrate that the proposed methods can extract the majority of the candidate campaigns correctly, and detect promotion and spam campaigns with high precision and recall.
- F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. 2010. Detecting spammers on twitter. In Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS'10).Google Scholar
- F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonçalves. 2009. Detecting spammers and content promoters in online video social networks. In Proceedings of the 32nd International ACM Conference on Research and Development in Information Retrieval (SIGIR'09). ACM, New York, NY, 620--627. DOI:http://dx.doi.org/10.1145/1571941.1572047 Google Scholar
Digital Library
- T. Bogers and A. Van den Bosch. 2009. Using language modeling for spam detection in social reference manager Websites. In Proceedings of the 9th Belgian-Dutch Information Retrieval Workshop (DIR'09). 87--94.Google Scholar
- F. Chen, P. N. Tan, and A. K. Jain. 2009. A co-classification framework for detecting Web spam and spammers in social media Web sites. In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM'09). ACM, New York, NY, 1807--1810. DOI:http://dx.doi.org/10.1145/1645953.1646235 Google Scholar
Digital Library
- Zi Chu, Indra Widjaja, and Haining Wang. 2012. Detecting social spam campaigns on Twitter. In Proceedings of the Applied Cryptography and Network Security Conference (ACNS'12). 455--472. DOI:http://dx.doi.org/10.1007/978-3-642-31284-7_27 Google Scholar
Digital Library
- Y. Duan, L. Jiang, T. Qin, M. Zhou, and H. Y. Shum. 2010. An empirical study on learning to rank of tweets. In Proceedings of the 23rd International Conference on Computational Linguistics (COLING'10). 295--303. Google Scholar
Digital Library
- F. Benevenuto, S. Ghosh, C. Freitas, and A. Veloso. 2015. Reverse engineering socialbot infiltration strategies in Twitter. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15). ACM, New York, NY, 25--32. DOI:http://dx.doi.org/10.1145/2808797.2809292 Google Scholar
Digital Library
- H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. 2010. Detecting and characterizing social spam campaigns. In Proceedings of the 10th Annual Conference on Internet Measurement (IMC'10). ACM, New York, NY, 35--47. DOI:http://dx.doi.org/10.1145/1879141.1879147 Google Scholar
Digital Library
- Saptarshi Ghosh, Bimal Viswanath, Farshad Kooti, Naveen Kumar Sharma, Gautam Korlam, Fabricio Benevenuto, Niloy Ganguly, and Krishna Phani Gummadi. 2012. Understanding and combating link farming in the Twitter social network. In Proceedings of the 21st International Conference on World Wide Web (WWW'12). ACM, New York, NY, 61--70. DOI:http://dx.doi.org/10.1145/2187836.2187846 Google Scholar
Digital Library
- C. Grier, K. Thomas, V. Paxson, and M. Zhang. 2010. @ Spam: The underground on 140 characters or less. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10). ACM, New York, NY, 27--37. Google Scholar
Digital Library
- T. Hatanaka and H. Hisamatsu. 2010. Method for countering social bookmarking pollution using user similarities. In Proceedings of the 2nd Conference on Networked Digital Technologies (NDT). Springer Berlin Heidelberg, 523--528.Google Scholar
- P. Heymann, G. Koutrika, and H. Garcia-Molina. 2007. Fighting spam on social Web sites: A survey of approaches and future challenges. IEEE Internet Computing 11, 6, 36--45. Google Scholar
Digital Library
- C. F. Hsu, E. Khabiri, and J. Caverlee. 2009. Ranking comments on the social Web. In Proceedings of the 2009 International Conference on Computational Science and Engineering (CSE'09), Vol. 4. IEEE, Los Alamitos, CA, 90--97. Google Scholar
Digital Library
- Xia Hu, Jiliang Tang, and Huan Liu. 2014. Online social spammer detection. In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI'14). 59--65. Google Scholar
Digital Library
- Xia Hu, Jiliang Tang, Yanchao Zhang, and Huan Liu. 2013. Social spammer detection in microblogging. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI'13). 2633--2639. Google Scholar
Digital Library
- D. Irani, S. Webb, C. Pu, and K. Li. 2010. Study of trend-stuffing on Twitter through text classification. In Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS'10).Google Scholar
- X. Jin, C. X. Lin, J. Luo, and J. Han. 2011. SocialSpamGuard: A data mining-based spam detection system for social media networks. In Proceedings of the 37th International Conference on Very Large Data Bases (VLDB'11). 1458--1461.Google Scholar
- V. Kandylas and A. Dasdan. 2010. The utility of tweeted URLs for Web search. In Proceedings of the 19th International Conference on World Wide Web (WWW'10). ACM, New York, NY, 1127--1128. DOI:http://dx.doi.org/10.1145/1772690.1772837 Google Scholar
Digital Library
- B. Krause, C. Schmitz, A. Hotho, and G. Stumme. 2008. The anti-social tagger: Detecting spam in social bookmarking systems. In Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb'08). ACM, New York, NY, 61--68. Google Scholar
Digital Library
- K. Lee, J. Caverlee, Z. Cheng, and D. Z. Sui. 2011. Content-driven detection of campaigns in social media. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM'11). ACM, New York, NY, 551--556. DOI:http://dx.doi.org/10.1145/2063576.2063658 Google Scholar
Digital Library
- Kyumin Lee, James Caverlee, Zhiyuan Cheng, and Daniel Z Sui. 2013. Campaign extraction from social media. ACM Transactions on Intelligent Systems and Technology 5, 1, Article No. 9. DOI:http://dx.doi.org/10.1145/2542182.2542191 Google Scholar
Digital Library
- K. Lee, J. Caverlee, and S. Webb. 2010. Uncovering social spammers: Social honeypots+ machine learning. In Proceedings of the 33rd International ACM Conference on Research and Development in Information Retrieval. ACM, New York, NY, 435--442. DOI:http://dx.doi.org/10.1145/1835449.1835522 Google Scholar
Digital Library
- B. Markines, C. Cattuto, and F. Menczer. 2009. Social spam detection. In Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb'09). ACM, New York, NY, 41--48. DOI:http://dx.doi.org/10.1145/1531914.1531924 Google Scholar
Digital Library
- M. G. Noll, C. Au Yeung, N. Gibbins, C. Meinel, and N. Shadbolt. 2009. Telling experts from spammers: Expertise ranking in folksonomies. In Proceedings of the 32nd International ACM Conference on Research and Development in Information Retrieval (SIGIR'09). ACM, New York, NY, 612--619. DOI:http://dx.doi.org/ 10.1145/1571941.1572046 Google Scholar
Digital Library
- S. Sedhai and A. Sun 2015. HSpam14: A collection of 14 million tweets for hashtag-oriented spam research. In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'15). ACM, New York, NY, 223--232. DOI:http://dx.doi.org/ 10.1145/2766462.2767701 Google Scholar
Digital Library
- A. D. Sarma, A. D. Sarma, S. Gollapudi, and R. Panigrahy. 2010. Ranking mechanisms in Twitter-like forums. In Proceedings of the 3rd ACM International Conference on Web Search and Data Mining (WSDM'10). ACM, New York, NY, 21--30. DOI:http://dx.doi.org/10.1145/1718487.1718491 Google Scholar
Digital Library
- Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang, and Yihong Zhao. 2013. UNIK: Unsupervised social network spam detection. In Proceedings of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13). ACM, New York, NY, 479--488. DOI:http://dx.doi.org/ 10.1145/2505515.2505581 Google Scholar
Digital Library
- I. Uysal and W. B. Croft. 2011. User oriented tweet ranking: A filtering approach to microblogs. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM'11). ACM, New York, NY, 2261--2264. DOI:http://dx.doi.org/10.1145/2063576.2063941 Google Scholar
Digital Library
- A. H. Wang. 2010. Don't follow me: Spam detection in Twitter. In Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT'10). IEEE, Los Alamitos, CA, 1--10.Google Scholar
- D. Wang, D. Irani, and C. Pu. 2011. A social-spam detection framework. In Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS'11). ACM, New York, NY, 46--54. DOI:http://dx.doi.org/10.1145/2030376.2030382 Google Scholar
Digital Library
- N. Wang, S. Parthasarathy, K. L. Tan, and A. K. H. Tung. 2008. CSV: Visualizing and mining cohesive subgraphs. In Proceedings of the 2008 ACM International Conference on Management of Data (SIGMOD'08). ACM, New York, NY, 445--458. DOI:http://dx.doi.org/10.1145/1772690.1772837 Google Scholar
Digital Library
- Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. 2008. Spamming botnets: Signatures and characteristics. SIGCOMM Computer Communication Review 38, 4, 171--182. DOI:http://dx.doi.org/10.1145/1402946.1402979 Google Scholar
Digital Library
- Chang Xu, Jie Zhang, Kuiyu Chang, and Chong Long. 2013. Uncovering collusive spammers in Chinese review Websites. In Proceedings of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13). ACM, New York, NY, 979--988. DOI:http://dx.doi.org/10.1145/2505515.2505700 Google Scholar
Digital Library
- Y. Yamaguchi, T. Takahashi, T. Amagasa, and H. Kitagawa. 2010. TURank: Twitter user ranking based on user-tweet graph analysis. In Proceedings of the International Conference on Web Information Systems Engineering (WISE'10). 240--253. Google Scholar
Digital Library
- Chao Yang, Robert Harkreader, and Guofei Gu. 2013. Empirical evaluation and new design for fighting evolving Twitter spammers. IEEE Transactions on Information Forensics and Security 8, 8, 1280--1293. Google Scholar
Digital Library
- Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu. 2012. Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on Twitter. In Proceedings of the 21st International Conference on World Wide Web (WWW'12). ACM, New York, NY, 71--80. DOI:http://dx.doi.org/10.1145/2187836.2187847 Google Scholar
Digital Library
- X. Zhang, S. Zhu, and W. Liang. 2012. Detecting spam and promoting campaigns in the Twitter social network. In Proceedings of the IEEE International Conference on Data Mining (ICDM'12). IEEE, Los Alamitos, CA, 1194--1199. Google Scholar
Digital Library
- Yin Zhu, Xiao Wang, Erheng Zhong, Nathan Nan Liu, He Li, and Qiang Yang. 2012. Discovering spammers in social networks. In Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI'12). 171--177.Google Scholar
Index Terms
Detecting Spam and Promoting Campaigns in Twitter
Recommendations
Detecting and characterizing social spam campaigns
IMC '10: Proceedings of the 10th ACM SIGCOMM conference on Internet measurementOnline social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective tools for executing spam campaigns and spreading malware. Intuitively, a ...
Detecting Spam and Promoting Campaigns in the Twitter Social Network
ICDM '12: Proceedings of the 2012 IEEE 12th International Conference on Data MiningThe Twitter social network has become a target platform for both promoters and stammers to disseminate their target messages. There are a large number of campaigns containing coordinated spam or promoting accounts in Twitter, which are more harmful than ...
Detecting social spam campaigns on twitter
ACNS'12: Proceedings of the 10th international conference on Applied Cryptography and Network SecurityThe popularity of Twitter greatly depends on the quality and integrity of contents contributed by users. Unfortunately, Twitter has attracted spammers to post spam content which pollutes the community. Social spamming is more successful than traditional ...






Comments