Mining Spam Accounts with User Influence

As the increasing development of online social networks (OSNs), spammers' attentions have been attracted from the traditional email field. Nowadays, advertisements, deception messages, illegal contents are prevalent in all kinds of ONSs. They're propagated from one to another arbitrarily, polluting the Internet environment, and what's more, resulting in a great many of security problems. Some previous works have been proposed to detect spammers according to user properties. The problem is that in order to prevent from being detected, spammers are likely to pretend to be normal, and what's more, some normal users also engage into spam spreading for financial benefits, making detection more difficult. In this paper, we solve the detection problem from the view of user influence. The basic of our work is that since spammers pretend to be normal, their influences should keep step with their normal behaviors. But when a spam campaign is launched, usually in order to influent others, a great many of spammers engaged into propagation, the original poster's influence would get a sudden increase, making him outstanding from the others. In this way, we can distinguish the original spammers and supervise from the root of the propagation tree. Our work is experimented on real data gathered from Weibo and shows inspiring results.

[1]  Yiqun Liu,et al.  Identifying web spam with user behavior analysis , 2008, AIRWeb '08.

[2]  Yiqun Liu,et al.  User behavior oriented web spam detection , 2008, WWW.

[3]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[4]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[5]  Vincent T. Y. Ng,et al.  Identifying Influential Users by Their Postings in Social Networks , 2012, MSM/MUSE.

[6]  Calton Pu,et al.  Study of Static Classification of Social Spam Profiles in MySpace , 2010, ICWSM.

[7]  Alex Leavitt,et al.  The Influentials : New Approaches for Analyzing Influence on Twitter , 2009 .

[8]  Hao Chen,et al.  Spam double-funnel: connecting web spammers with advertisers , 2007, WWW '07.

[9]  Qi He,et al.  TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.

[10]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[11]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, CCS '10.

[12]  Nagaaki Ohyama,et al.  Empirical analysis of internet identity misuse: case study of south Korean real name system , 2010, DIM '10.

[13]  Dawn Xiaodong Song,et al.  Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.

[14]  Steven Myers,et al.  Prevalence and mitigation of forum spamming , 2011, 2011 Proceedings IEEE INFOCOM.

[15]  Danah Boyd The politics of "real names" , 2012, CACM.

[16]  Vincent T. Y. Ng,et al.  Identifying influential users by their postings in social networks , 2012, MSM '12.

[17]  Vern Paxson,et al.  @spam: the underground on 140 characters or less , 2010, CCS '10.

[18]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.

[19]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.