End-to-End Compromised Account Detection

Social media, e.g. Twitter, has become a widely used medium for the exchange of information, but it has also become a valuable tool for hackers to spread misinformation through compromised accounts. Hence, detecting compromised accounts is a necessary step toward a safe and secure social media environment. Nevertheless, detecting compromised accounts faces several challenges. First, social media activities of users are temporally correlated which plays an important role in compromised account detection. Second, data associated with social media accounts is inherently sparse. Finally, social contagions where multiple accounts become compromised, take advantage of the user connectivity to propagate their attack. Thus how to represent each user's network features for compromised account detection is an additional challenge. To address these challenges, we propose an End-to-End Compromised Account Detection framework (E2ECAD). E2ECAD effectively captures temporal correlations via an LSTM (Long Short-Term Memory) network. Further, it addresses the sparsity problem by defining and employing a user context representation. Meanwhile, informative network-related features are modeled efficiently. To verify the working of the framework, we construct a real-world dataset of compromised accounts on Twitter and conduct extensive experiments. The results of experiments show that E2ECAD outperforms the state of the art compromised account detection algorithms.

[1]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[2]  Dik Lun Lee,et al.  Feature reduction for neural network based text categorization , 1999, Proceedings. 6th International Conference on Advanced Systems for Advanced Applications.

[3]  Wei Chen,et al.  Short Text Feature Selection for Micro-Blog Mining , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[4]  Geoffrey E. Hinton,et al.  Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.

[5]  Gianluca Stringhini,et al.  Poultry markets: on the underground economy of twitter followers , 2012 .

[6]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.

[7]  Jeffrey Dean,et al.  Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.

[8]  Gianluca Stringhini,et al.  COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.

[9]  Eva Zangerle,et al.  "Sorry, I was hacked": a classification of compromised twitter accounts , 2014, SAC.

[10]  Qiang Cao,et al.  Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.

[11]  Krishna P. Gummadi,et al.  Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.

[12]  Vern Paxson,et al.  Consequences of Connectivity: Characterizing Account Hijacking on Twitter , 2014, CCS.

[13]  Quoc V. Le,et al.  Distributed Representations of Sentences and Documents , 2014, ICML.

[14]  Sergey V. Buldyrev,et al.  Communication activity in a social network: relation between long-term correlations and inter-event clustering , 2012, Scientific Reports.

[15]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[16]  Bruno Bogaz Zarpelão,et al.  Recognition of Compromised Accounts on Twitter , 2015 .

[17]  Jun Zhao,et al.  Recurrent Convolutional Neural Networks for Text Classification , 2015, AAAI.

[18]  Yoshua Bengio,et al.  Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.

[19]  Jeffrey A. Gottfried,et al.  News use across social media platforms 2016 , 2016 .

[20]  Meike Nauta Detecting Hacked Twitter Accounts by Examining Behavioural Change using Twitter Metadata , 2016 .

[21]  Yue Zhang,et al.  Deceptive Opinion Spam Detection Using Neural Network , 2016, COLING.

[22]  Jun Zhang,et al.  Twitter spam detection based on deep learning , 2017, ACSW.

[23]  Jan Bohacik,et al.  Detecting compromised accounts on the Pokec online social network , 2017, 2017 International Conference on Information and Digital Technologies (IDT).

[24]  Svitlana Volkova,et al.  Separating Facts from Fiction: Linguistic Models to Classify Suspicious and Trusted News Posts on Twitter , 2017, ACL.

[25]  Pang-Ning Tan,et al.  Understanding compromised accounts on Twitter , 2017, WI.

[26]  Yongdong Zhang,et al.  Detection and Analysis of 2016 US Presidential Election Related Rumors on Twitter , 2017, SBP-BRiMS.

[27]  Qiang Li,et al.  GroupFound: An effective approach to detect suspicious accounts in online social networks , 2017, Int. J. Distributed Sens. Networks.

[28]  Jiliang Tang,et al.  Multi-Source Multi-Class Fake News Detection , 2018, COLING.