Combating Threats to Collective Attention in Social Media: An Evaluation

Breaking news, viral videos, and popular memes are all examples of the collective attention of huge numbers of users focusing in large-scale social systems. But this self-organization, leading to user attention quickly coalescing and then collectively focusing around a phenomenon, opens these systems to new threats like collective attention spam. Compared to many traditional spam threats, collective attention spam relies on the insidious property that users themselves will intentionally seek out the content where the spam will be encountered, potentially magnifying its effectiveness. Our goal in this paper is to initiate a study of this phenomenon. How susceptible are social systems to collective attention threats? What strategies by malicious users are most effective? Can a system automatically inoculate itself from emerging threats? Towards beginning our study of these questions, we take a two fold approach. First, we develop data-driven models to simulate large-scale social systems based on parameters derived from a real system. In this way, we can vary parameters — like the fraction of malicious users in the system, their strategies, and the countermeasures available to system operators — to explore the resilience of these systems to threats to collective attention. Second, we pair the data-driven model with a comprehensive evaluation over a Twitter system trace, in which we evaluate the effectiveness of countermeasures deployed  based on the first moments of a bursting phenomenon in a real system. Our experimental study shows the promise of these countermeasures to identifying threats to collective attention early in the lifecycle, providing a shield for unsuspecting social media users.

[1]  He Liu,et al.  Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.

[2]  Jacob Ratkiewicz,et al.  Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.

[3]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.

[4]  Zhiyuan Cheng,et al.  Detecting collective attention spam , 2012, WebQuality '12.

[5]  Christos Faloutsos,et al.  Modeling Blog Dynamics , 2009, ICWSM.

[6]  Fang Yu,et al.  On Network-level Clusters for Spam Detection , 2010, NDSS.

[7]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[8]  Georgia Koutrika,et al.  Combating spam in tagging systems: An evaluation , 2008, TWEB.

[9]  Kevin Borders,et al.  Social networks and context-aware spam , 2008, CSCW.

[10]  Nick Feamster,et al.  Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.

[11]  Constantine D. Spyropoulos,et al.  An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages , 2000, SIGIR '00.

[12]  Brian D. Davison,et al.  Predicting popular messages in Twitter , 2011, WWW.

[13]  Jon Kleinberg,et al.  Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter , 2011, WWW.

[14]  Calton Pu,et al.  Study of Trend-Stuffing on Twitter through Text Classification , 2010 .

[15]  Chris Kanich,et al.  Show Me the Money: Characterizing Spam-advertised Revenue , 2011, USENIX Security Symposium.

[16]  Nick Feamster,et al.  Observing common spam in Twitter and email , 2012, Internet Measurement Conference.

[17]  Fang Wu,et al.  Novelty and collective attention , 2007, Proceedings of the National Academy of Sciences.

[18]  Kristina Lerman,et al.  Information Contagion: An Empirical Study of the Spread of News on Digg and Twitter Social Networks , 2010, ICWSM.

[19]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[20]  Anirban Dasgupta,et al.  Impact of Spam Exposure on User Engagement , 2012, USENIX Security Symposium.

[21]  Ciro Cattuto,et al.  Dynamical classes of collective attention in twitter , 2011, WWW.

[22]  Gianluca Stringhini,et al.  BOTMAGNIFIER: Locating Spambots on the Internet , 2011, USENIX Security Symposium.

[23]  Virgílio A. F. Almeida,et al.  Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.

[24]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[25]  Krishna P. Gummadi,et al.  Understanding and combating link farming in the twitter social network , 2012, WWW.

[26]  Jaana Kekäläinen,et al.  IR evaluation methods for retrieving highly relevant documents , 2000, SIGIR '00.

[27]  C. Lumezanu Observing Common Spam in Tweets and Email , 2012 .

[28]  Santosh S. Vempala,et al.  Filtering spam with behavioral blacklisting , 2007, CCS '07.