Follow the green: growth and dynamics in twitter follower markets

The users of microblogging services, such as Twitter, use the count of followers of an account as a measure of its reputation or influence. For those unwilling or unable to attract followers naturally, a growing industry of "Twitter follower markets" provides followers for sale. Some markets use fake accounts to boost the follower count of their customers, while others rely on a pyramid scheme to turn non-paying customers into followers for each other, and into followers for paying customers. In this paper, we present a detailed study of Twitter follower markets, report in detail on both the static and dynamic properties of customers of these markets, and develop and evaluate multiple techniques for detecting these activities. We show that our detection system is robust and reliable, and can detect a significant number of customers in the wild.

[1]  John C. Platt,et al.  Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .

[2]  B. Schölkopf,et al.  Advances in kernel methods: support vector learning , 1999 .

[3]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[4]  Andy Liaw,et al.  Classification and Regression by randomForest , 2007 .

[5]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[6]  Balachander Krishnamurthy,et al.  A few chirps about twitter , 2008, WOSN '08.

[7]  Phillip B. Gibbons,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2006, IEEE/ACM Transactions on Networking.

[8]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[9]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[10]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[11]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[12]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, CCS '10.

[13]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[14]  Vern Paxson,et al.  @spam: the underground on 140 characters or less , 2010, CCS '10.

[15]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[16]  Virgílio A. F. Almeida,et al.  Detecting Spammers on Twitter , 2010 .

[17]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[18]  Haewoon Kwak,et al.  Fragile online relationship: a first look at unfollow dynamics in twitter , 2011, CHI.

[19]  Dawn Xiaodong Song,et al.  Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.

[20]  Stefan Savage,et al.  An analysis of underground forums , 2011, IMC '11.

[21]  Gianluca Stringhini,et al.  Poultry markets: on the underground economy of twitter followers , 2012, CCRV.

[22]  Krishna P. Gummadi,et al.  Understanding and combating link farming in the twitter social network , 2012, WWW.

[23]  Chris Jermaine,et al.  The Latent Community Model for Detecting Sybils in Social Networks , 2012, NDSS.

[24]  Gianluca Stringhini,et al.  Poultry markets: on the underground economy of twitter followers , 2012 .

[25]  Gang Wang,et al.  Northeastern University , 2021, IEEE Pulse.

[26]  Eric Gilbert,et al.  A longitudinal study of follow predictors on twitter , 2013, CHI.

[27]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.

[28]  Vern Paxson,et al.  Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.

[29]  Gianluca Stringhini,et al.  COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.

[30]  Gang Wang,et al.  Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.