Malicious accounts: Dark of the social networks

Over the last few years, online social networks (OSNs), such as Facebook, Twitter and Tuenti, have experienced exponential growth in both profile registrations and social interactions. These networks allow people to share different information ranging from news, photos, videos, feelings, personal information or research activities. The rapid growth of OSNs has triggered a dramatic rise in malicious activities including spamming, fake accounts creation, phishing, and malware distribution. However, developing an efficient detection system that can identify malicious accounts, as well as their suspicious behaviors on the social networks, has been quite challenging. Researchers have proposed a number of features and methods to detect malicious accounts. This paper presents a comprehensive review of related studies that deal with detection of malicious accounts on social networking sites. The review focuses on four main categories, which include detection of spam accounts, fake accounts, compromised accounts, and phishing. To group the studies, the taxonomy of the different features and methods used in the literature to identify malicious accounts and their behaviors are proposed. The review considered only social networking sites and excluded studies such as email spam detection. The significance of proposed features and methods, as well as their limitations, are analyzed. Key issues and challenges that require substantial research efforts are discussed. In conclusion, the paper identifies the important future research areas with the aim of advancing the development of scalable malicious accounts detection system in OSNs. Propose taxonomy of features for identifying malicious accounts in social networks.Propose taxonomy of methods for detecting malicious accounts in social networks.Discuss the significance of each feature category as well as the methods.Identify issues and challenges with existing features and methods.Propose a framework for malicious account detection in social networks.

[1]  José María Gómez Hidalgo,et al.  An Analysis of the Effectiveness of Personalized Spam Using Online Social Network Public Information , 2015, CISIS-ICEUTE.

[2]  Leonardo Noriega,et al.  Multilayer Perceptron Tutorial , 2005 .

[3]  Joel J. P. C. Rodrigues,et al.  Real-time data management on wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[4]  Sergei Vassilvitskii,et al.  k-means++: the advantages of careful seeding , 2007, SODA '07.

[5]  Lada A. Adamic,et al.  How to search a social network , 2005, Soc. Networks.

[6]  A-L Barabási,et al.  Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.

[7]  Sotiris Ioannidis,et al.  Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[8]  Igor Santos,et al.  Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying , 2015, Log. J. IGPL.

[9]  David F. Nettleton,et al.  Data mining of social networks represented as graphs , 2013, Comput. Sci. Rev..

[10]  Hassan Takabi,et al.  Towards active detection of identity clone attacks on online social networks , 2011, CODASPY '11.

[11]  Faisal Ahmad,et al.  Analysis of Dynamic Web Services: Towards Efficient Discovery in Cloud , 2016 .

[12]  Chia-Mei Chen,et al.  Feature set identification for detecting suspicious URLs using Bayesian classification in social networks , 2014, Inf. Sci..

[13]  Alex 'Sandy' Pentland,et al.  If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts , 2016, International Journal of Information Security.

[14]  David G. Schwartz,et al.  Social network analysis of web links to eliminate false positives in collaborative anti-spam systems , 2011, J. Netw. Comput. Appl..

[15]  Muhammad Abulaish,et al.  Community-based features for identifying spammers in Online Social Networks , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[16]  Alex Alves Freitas,et al.  Contrasting meta-learning and hyper-heuristic research: the role of evolutionary algorithms , 2013, Genetic Programming and Evolvable Machines.

[17]  Sylvio Barbon Junior,et al.  Account classification in online social networks with LBCA and wavelets , 2016, Inf. Sci..

[18]  Rui Zhang,et al.  Least Square Transduction Support Vector Machine , 2009, Neural Processing Letters.

[19]  Alex Hai Wang,et al.  Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach , 2010, DBSec.

[20]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2013, IEEE Trans. Inf. Forensics Secur..

[21]  Patrick P. K. Chan,et al.  Spam filtering for short messages in adversarial environment , 2015, Neurocomputing.

[22]  Yi Zhang,et al.  Discover millions of fake followers in Weibo , 2016, Social Network Analysis and Mining.

[23]  Song Xin-fang Survey of model and techniques for online social networks , 2013, 2013 8th International Conference on Computer Science & Education.

[24]  Songqing Chen,et al.  UNIK: unsupervised social network spam detection , 2013, CIKM.

[25]  Rachel Friedman Protect Your Network! Koobface Virus Targets Facebook, MySpace, Twitter Users , 2009 .

[26]  Indrajit Ray,et al.  SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks , 2016, SEC.

[27]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[28]  Aoying Zhou,et al.  Density-Based Clustering over an Evolving Data Stream with Noise , 2006, SDM.

[29]  Juan Martínez-Romo,et al.  Detecting malicious tweets in trending topics using a statistical analysis of language , 2013, Expert Syst. Appl..

[30]  Nor Badrul Anuar,et al.  The rise of "malware": Bibliometric analysis of malware study , 2016, J. Netw. Comput. Appl..

[31]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[32]  M. Chuah,et al.  Spam Detection on Twitter Using Traditional Classifiers , 2011, ATC.

[33]  N. B. Anuar,et al.  The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..

[34]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[35]  Adriana Iamnitchi,et al.  The power of indirect ties , 2016, Comput. Commun..

[36]  Sabeur Aridhi,et al.  A MapReduce-based approach for shortest path problem in large-scale networks , 2015, Eng. Appl. Artif. Intell..

[37]  Francesc Sebé,et al.  Endorsement deduction and ranking in social networks , 2016, Comput. Commun..

[38]  David M. Nicol,et al.  The Koobface botnet and the rise of social malware , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[39]  Fangzhao Wu,et al.  Co-detecting social spammers and spam messages in microblogging via exploiting social contexts , 2016, Neurocomputing.

[40]  Mininath K. Nighot,et al.  N-Gram Classifier System to Filter Spam Messages from OSN User Wall , 2016 .

[41]  Muhammad Abulaish,et al.  An MCL-Based Approach for Spam Profile Detection in Online Social Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[42]  Gang Wang,et al.  Serf and turf: crowdturfing for fun and profit , 2011, WWW.

[43]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[44]  Krishna P. Gummadi,et al.  You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.

[45]  Danai Koutra,et al.  Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.

[46]  Peter J. Rousseeuw,et al.  Finding Groups in Data: An Introduction to Cluster Analysis , 1990 .

[47]  A. Kannan,et al.  Detecting cloning attack in Social Networks using classification and clustering techniques , 2014, 2014 International Conference on Recent Trends in Information Technology.

[48]  Ponnurangam Kumaraguru,et al.  PhishAri : Automatic Realtime Phishing Detection on Twitter Anupama Aggarwal , 2012 .

[49]  Lakshminarayanan Subramanian,et al.  Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.

[50]  Wei Hu,et al.  Twitter spammer detection using data stream clustering , 2014, Inf. Sci..

[51]  Yong Tian,et al.  Locality Preserving Based K-Means Clustering , 2015, IScIDE.

[52]  Zheyi Chen,et al.  Detecting spammers on social networks , 2015, Neurocomputing.

[53]  AbdulMalik S. Al-Salman,et al.  TSD: Detecting Sybil Accounts in Twitter , 2014, 2014 13th International Conference on Machine Learning and Applications.

[54]  Bernhard Schölkopf,et al.  A tutorial on support vector regression , 2004, Stat. Comput..

[55]  Alex Hai Wang,et al.  Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[56]  Ciro Cattuto,et al.  Social spam detection , 2009, AIRWeb '09.

[57]  Lorenzo Bruzzone,et al.  A novel classification technique based on progressive transductive SVM learning , 2014, Pattern Recognit. Lett..

[58]  Florian Probst,et al.  Online social networks: A survey of a global phenomenon , 2012 .

[59]  Gianluca Stringhini,et al.  Towards Detecting Compromised Accounts on Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[60]  Aziz Mohaisen,et al.  Measuring the mixing time of social graphs , 2010, IMC '10.

[61]  Anja Feldmann,et al.  Understanding online social network usage from a network perspective , 2009, IMC '09.

[62]  Roberto Di Pietro,et al.  Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..

[63]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, CCS '10.

[64]  Jong Kim,et al.  Early filtering of ephemeral malicious accounts on Twitter , 2014, Comput. Commun..

[65]  Guy Melançon,et al.  Model for generating artificial social networks having community structures with small-world and scale-free properties , 2013, Social Network Analysis and Mining.

[66]  Xiaojin Zhu,et al.  Introduction to Semi-Supervised Learning , 2009, Synthesis Lectures on Artificial Intelligence and Machine Learning.

[67]  Ying Liu,et al.  Latent topic based multi-instance learning method for localized content-based image retrieval , 2012, Comput. Math. Appl..

[68]  Yuval Elovici,et al.  Homing Socialbots: Intrusion on a specific organization's employee using Socialbots , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[69]  Xiao Wang,et al.  VoteTrust: Leveraging friend invitation graph to defend against social network Sybils , 2013, 2013 Proceedings IEEE INFOCOM.

[70]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[71]  M E J Newman,et al.  Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[72]  Vern Paxson,et al.  @spam: the underground on 140 characters or less , 2010, CCS '10.

[73]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.

[74]  Michalis Faloutsos,et al.  If walls could talk: Patterns and anomalies in Facebook wallposts , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[75]  Yuval Elovici,et al.  Friend or foe? Fake profile identification in online social networks , 2013, Social Network Analysis and Mining.

[76]  Filippo Menczer,et al.  The rise of social bots , 2014, Commun. ACM.

[77]  Lada A. Adamic,et al.  Friends and neighbors on the Web , 2003, Soc. Networks.

[78]  Abdulrahman A. Mirza,et al.  Spammer Classification Using Ensemble Methods over Structural Social Network Features , 2014, 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).

[79]  Huan Liu,et al.  Social Spammer Detection in Microblogging , 2013, IJCAI.

[80]  Krishna P. Gummadi,et al.  Understanding and combating link farming in the twitter social network , 2012, WWW.

[81]  Erdong Chen,et al.  Facebook immune system , 2011, SNS '11.

[82]  Vimala Balakrishnan,et al.  Improving document relevancy using integrated language modeling techniques , 2016 .

[83]  Winnie Main,et al.  Twitterati Identification System , 2015 .

[84]  Satu Elisa Schaeffer,et al.  Graph Clustering , 2017, Encyclopedia of Machine Learning and Data Mining.

[85]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[86]  Sushil Jajodia,et al.  Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.

[87]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[88]  Xiao Wang,et al.  Detecting and Validating Sybil Groups in the Wild , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[89]  Muhammad Abulaish,et al.  A generic statistical approach for spam detection in Online Social Networks , 2013, Comput. Commun..

[90]  Benjamin Renard,et al.  Bayesian topic model approaches to online and time-dependent clustering , 2015, Digit. Signal Process..

[91]  Mauro Conti,et al.  FakeBook: Detecting Fake Profiles in On-Line Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[92]  Md. Rafiqul Islam,et al.  Evolutionary optimization: A big data perspective , 2016, J. Netw. Comput. Appl..

[93]  Véronique Van Vlasselaer,et al.  Using social network knowledge for detecting spider constructions in social security fraud , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[94]  Hsing-Kuo Kenneth Pao,et al.  Malicious URL filtering — A big data application , 2013, 2013 IEEE International Conference on Big Data.

[95]  Haining Wang,et al.  Detecting Social Spam Campaigns on Twitter , 2012, ACNS.

[96]  Yuancheng Li,et al.  A semi-supervised learning approach for detection of phishing webpages , 2013 .

[97]  Sushil Jajodia,et al.  Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.

[98]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[99]  Monika Singh,et al.  Detecting Malicious Users in Twitter using Classifiers , 2014, SIN.

[100]  Jun Peng,et al.  Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD) , 2014, 2014 IEEE 13th International Conference on Cognitive Informatics and Cognitive Computing.

[101]  Alexandre Varnek,et al.  Transductive Support Vector Machines: Promising Approach to Model Small and Unbalanced Datasets , 2013, Molecular informatics.

[102]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[103]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.

[104]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.

[105]  Krishna P. Gummadi,et al.  Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.

[106]  Kamalakar Karlapalem,et al.  A multi-agent simulation framework on small Hadoop cluster , 2011, Eng. Appl. Artif. Intell..

[107]  Ali Feizollah,et al.  Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.

[108]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[109]  James Caverlee,et al.  Detecting Spam URLs in Social Media via Behavioral Analysis , 2015, ECIR.

[110]  Virgílio A. F. Almeida,et al.  Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.

[111]  Hakim Hacid,et al.  Towards multiple identity detection in social networks , 2012, WWW.

[112]  Po-Ching Lin,et al.  A study of effective features for detecting long-surviving Twitter spam accounts , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[113]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[114]  Xiuzhen Zhang,et al.  Anomaly detection in online social networks , 2014, Soc. Networks.

[115]  Jian Cao,et al.  Detection of Forwarding-Based Malicious URLs in Online Social Networks , 2016, International Journal of Parallel Programming.