ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions

Online social networks (OSNs) gradually integrate financial capabilities by enabling the usage of real and virtual currency. They serve as new platforms to host a variety of business activities, such as online promotion events, where users can possibly get virtual currency as rewards by participating in such events. Both OSNs and business partners are significantly concerned when attackers instrument a set of accounts to collect virtual currency from these events, which make these events ineffective and result in significant financial loss. It becomes of great importance to proactively detecting these malicious accounts before the online promotion activities and subsequently decreases their priority to be rewarded. In this paper, we propose a novel system, namely ProGuard, to accomplish this objective by systematically integrating features that characterize accounts from three perspectives including their general behaviors, their recharging patterns, and the usage of their currency. We have performed extensive experiments based on data collected from the Tencent QQ, a global leading OSN with built-in financial management activities. Experimental results have demonstrated that our system can accomplish a high detection rate of 96.67% at a very low false positive rate of 0.3%.

[1]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[2]  Sushil Jajodia,et al.  Blog or block: Detecting blog bots through behavioral biometrics , 2013, Comput. Networks.

[3]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, IMC '10.

[4]  Yao Zhao,et al.  BotGraph: Large Scale Spamming Botnet Detection , 2009, NSDI.

[5]  Huan Liu,et al.  Online Social Spammer Detection , 2014, AAAI.

[6]  Sushil Jajodia,et al.  Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.

[7]  J. Gans,et al.  Some Economics of Private Digital Currency , 2013 .

[8]  Fangzhao Wu,et al.  Social Spammer and Spam Message Co-Detection in Microblogging with Social Context Regularization , 2015, CIKM.

[9]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[11]  David C. Yen,et al.  Detecting the financial statement fraud: The analysis of the differences between data mining techniques and experts' judgments , 2015, Knowl. Based Syst..

[12]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[13]  R. Suganya,et al.  Data Mining Concepts and Techniques , 2010 .

[14]  Anazida Zainal,et al.  Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..

[15]  Hsin-Hsi Chen,et al.  Opinion Spammer Detection in Web Forum , 2015, SIGIR.

[16]  Dominik Olszewski,et al.  Fraud detection using self-organizing map visualizing the user profiles , 2014, Knowl. Based Syst..

[17]  Wei Hu,et al.  Twitter spammer detection using data stream clustering , 2014, Inf. Sci..

[18]  Jong Kim,et al.  Spam Filtering in Twitter Using Sender-Receiver Relationship , 2011, RAID.

[19]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[20]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[21]  James R. Foulds,et al.  Collective Spammer Detection in Evolving Multi-Relational Social Networks , 2015, KDD.

[22]  Teng-Sheng Moh,et al.  Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers , 2010, ICISTM.

[23]  Huan Liu,et al.  Leveraging knowledge across media for spammer detection in microblogging , 2014, SIGIR.

[24]  Maumita Bhattacharya,et al.  Intelligent Financial Fraud Detection: A Comprehensive Review , 2015 .

[25]  Martijn J. Schuemie,et al.  Improving sensitivity of machine learning methods for automated case identification from free-text electronic medical records , 2013, BMC Medical Informatics and Decision Making.

[26]  Yang Wang,et al.  Human-Currency Interaction: learning from virtual currency use in China , 2008, CHI.

[27]  Jong Kim,et al.  WarningBird: Detecting Suspicious URLs in Twitter Stream , 2012, NDSS.

[28]  Leslie M. Collins,et al.  Financial fraud detection using vocal, linguistic and financial cues , 2015, Decis. Support Syst..