SocialDistance: How Far Are You from Verified Users in Online Social Media?

Verified users on online social media (OSM) largely determine the quality of OSM services and applications, but most OSM users are unverified due to the significant effort involved in becoming a verified user. This paper presents SocialDistance, a novel technique to identify unverified users that can be considered as trustworthy as verified users. SocialDistance is motivated by the observation that online interactions initiated from verified users towards unverified users can translate into some sort of trustworthiness. It treats all verified users equally and assigns a trust score between 0 and 1 to each unverified user. The higher the trust score, the closer an unverified user to verified users. We propose various metrics to model the interactions from verified to unverified users and then derive corresponding trust scores. SocialDistance is thoroughly evaluated with large Twitter datasets containing 276,143 verified users and 19,047,202 unverified users. Our results demonstrate that SocialDistance can produce a non-trivial number of unverified users that can be regarded as verified users for OSM applications. We also show the high efficacy of SocialDistance in sybil detection, a fundamental operation performed by virtually every OSM operator.

[1]  Guanhua Yan,et al.  The Rise of Social Botnets: Attacks and Countermeasures , 2016, IEEE Transactions on Dependable and Secure Computing.

[2]  Christopher J. Fariss,et al.  Inferring Tie Strength from Online Directed Behavior , 2013, PloS one.

[3]  Scott Counts,et al.  Identifying topical authorities in microblogs , 2011, WSDM '11.

[4]  Krishna P. Gummadi,et al.  Understanding and combating link farming in the twitter social network , 2012, WWW.

[5]  Isabel Anger,et al.  Measuring influence on Twitter , 2011, i-KNOW '11.

[6]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[7]  Filippo Menczer,et al.  BotOrNot: A System to Evaluate Social Bots , 2016, WWW.

[8]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[9]  Jennifer Neville,et al.  Modeling relationship strength in online social networks , 2010, WWW '10.

[10]  Scott Counts,et al.  Finding Users we Trust: Scaling up Verified Twitter Users Using their Communication Patterns , 2014, ICWSM.

[11]  Chi Zhang,et al.  TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter , 2015, IEEE/ACM Transactions on Networking.

[12]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[13]  Konstantin Beznosov,et al.  The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.

[14]  Lakshminarayanan Subramanian,et al.  Sybil-Resilient Online Content Voting , 2009, NSDI.

[15]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[16]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[17]  Matthieu Latapy,et al.  Basic notions for the analysis of large two-mode networks , 2008, Soc. Networks.

[18]  Ben Y. Zhao,et al.  Understanding latent interactions in online social networks , 2010, IMC '10.

[19]  M. Kendall A NEW MEASURE OF RANK CORRELATION , 1938 .

[20]  Ben Y. Zhao,et al.  Uncovering User Interaction Dynamics in Online Social Networks , 2015, ICWSM.

[21]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[22]  Guanhua Yan,et al.  On the impact of social botnets for spam distribution and digital-influence manipulation , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[23]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[24]  Jacob Ratkiewicz,et al.  Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.

[25]  Fengyuan Xu,et al.  SybilDefender: Defend against sybil attacks in large social networks , 2012, 2012 Proceedings IEEE INFOCOM.

[26]  Jimmy J. Lin,et al.  Information network or social network?: the structure of the twitter follow graph , 2014, WWW.

[27]  Duncan J. Watts,et al.  Everyone's an influencer: quantifying influence on twitter , 2011, WSDM '11.

[28]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[29]  Aziz Mohaisen,et al.  On the mixing time of directed social graphs and security implications , 2012, ASIACCS '12.

[30]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[31]  Rui Zhang,et al.  Your actions tell where you are: Uncovering Twitter users in a metropolitan area , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[32]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[33]  Huan Liu,et al.  Your Age Is No Secret: Inferring Microbloggers' Ages via Content and Interaction Analysis , 2016, ICWSM.

[34]  Jacob Ratkiewicz,et al.  Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams , 2010, ArXiv.