Distance-based customer detection in fake follower markets

Abstract As the Online Social Networks (OSNs) have become popular, more and more people want to increase their influence not only in the real world but also in the OSNs. However, increasing the influence in OSNs is time-consuming job, so some users want to find a shortcut to increase their relationships. The demand for quick increasement of relationship has led to the growth of the fake follower markets that cater to customers who want to grow their relationships rapidly. However, customers of fake follower markets cannot manipulate legitimate user’s relationship perfectly. Existing approaches explore node’s relationships or features to detect customers. But none of them combines the relationships and node’s features directly. In this article, we propose a model that directly combines the relationship and node’s feature to detect customers of fake followers. Specifically, we study the geographical distance for 1-hop-directional links using the nodes geographical location. Motivated by the difference of a distance ratio for 1-hop directional links, the proposed method is designed to generate a 1-hop link distance ratio, and classifies a node as a customer or not. Experimental results on a Twitter dataset demonstrate that the proposed method achieves higher performance than other baseline methods.

[1]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[2]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[3]  Timothy W. Finin,et al.  Why we twitter: understanding microblogging usage and communities , 2007, WebKDD/SNA-KDD '07.

[4]  Hossein Hamooni,et al.  DeBot: Twitter Bot Detection via Warped Correlation , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).

[5]  Roberto Di Pietro,et al.  The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race , 2017, WWW.

[6]  Christos Faloutsos,et al.  CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.

[7]  Lada A. Adamic The Small World Web , 1999, ECDL.

[8]  Sounman Hong,et al.  Which candidates do the public discuss online in an election campaign?: The use of social media by 2012 presidential candidates and its impact on candidate salience , 2012, Gov. Inf. Q..

[9]  Venkatesan Guruswami,et al.  CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.

[10]  Ian H. Witten,et al.  WEKA: a machine learning workbench , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.

[11]  Roberto Di Pietro,et al.  Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..

[12]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, IMC '10.

[13]  Lada A. Adamic,et al.  Looking at the Blogosphere Topology through Different Lenses , 2007, ICWSM.

[14]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[15]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[16]  Marco Rosa,et al.  Four degrees of separation , 2011, WebSci '12.

[17]  Hyun Ah Song,et al.  FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.

[18]  Gianluca Stringhini,et al.  COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.

[19]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[20]  T. Buchanan,et al.  Ethics Guidelines for Internet-mediated Research , 2013 .

[21]  Vern Paxson,et al.  Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.

[22]  Krishna P. Gummadi,et al.  Understanding and combating link farming in the twitter social network , 2012, WWW.

[23]  Roberto Di Pietro,et al.  DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection , 2016, IEEE Intell. Syst..

[24]  Christos Faloutsos,et al.  Inferring lockstep behavior from connectivity pattern in large graphs , 2016, Knowledge and Information Systems.

[25]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[26]  Edgar R. Weippl,et al.  Fake identities in social media: A case study on the sustainability of the Facebook business model , 2012, J. Serv. Sci. Res..

[27]  Virgílio A. F. Almeida,et al.  Detecting Spammers on Twitter , 2010 .

[28]  Massimo Marchiori,et al.  Is the Boston subway a small-world network? , 2002 .

[29]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[30]  Chih-Hung Wu,et al.  Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks , 2009, Expert Syst. Appl..

[31]  Gang Wang,et al.  Northeastern University , 2021, IEEE Pulse.

[32]  Liselot Hudders,et al.  Marketing through Instagram influencers: the impact of number of followers and product divergence on brand attitude , 2017 .

[33]  Vern Paxson,et al.  @spam: the underground on 140 characters or less , 2010, CCS '10.

[34]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.

[35]  Dawn Xiaodong Song,et al.  Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.

[36]  Gianluca Stringhini,et al.  Poultry markets: on the underground economy of twitter followers , 2012 .

[37]  Ponnurangam Kumaraguru,et al.  What they do in shadows: Twitter underground follower market , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).

[38]  Eric Gilbert,et al.  A longitudinal study of follow predictors on twitter , 2013, CHI.

[39]  Roberto Di Pietro,et al.  Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling , 2017, IEEE Transactions on Dependable and Secure Computing.

[40]  Gang Wang,et al.  Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.

[41]  Muhammad Abulaish,et al.  Community-based features for identifying spammers in Online Social Networks , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[42]  D. Sculley,et al.  Relaxed online SVMs for spam filtering , 2007, SIGIR.

[43]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[44]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[45]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[46]  Vangelis Metsis,et al.  Spam Filtering with Naive Bayes - Which Naive Bayes? , 2006, CEAS.

[47]  Patric R. Spence,et al.  How much Klout do you have ... A test of system generated cues on source credibility , 2013, Comput. Hum. Behav..

[48]  Mohamed F. Mokbel,et al.  Location-based and preference-aware recommendation using sparse geo-social networking data , 2012, SIGSPATIAL/GIS.

[49]  Shiu-Wan Hung,et al.  Examining the small world phenomenon in the patent citation network: a case study of the radio frequency identification (RFID) network , 2009, Scientometrics.

[50]  Jon M. Kleinberg,et al.  The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.

[51]  Michael Luca,et al.  Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud , 2015 .

[52]  Qiang Cao,et al.  Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.

[53]  Christos Faloutsos,et al.  Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms , 2016, IEEE Transactions on Knowledge and Data Engineering.

[54]  Pierre Baldi,et al.  Assessing the accuracy of prediction algorithms for classification: an overview , 2000, Bioinform..

[55]  Juan Martínez-Romo,et al.  Detecting malicious tweets in trending topics using a statistical analysis of language , 2013, Expert Syst. Appl..

[56]  Yi Yang,et al.  Spam ain't as diverse as it seems: throttling OSN spam with templates underneath , 2014, ACSAC.

[57]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[58]  Yiqun Liu,et al.  Pay Me and I'll Follow You: Detection of Crowdturfing Following Activities in Microblog Environment , 2016, IJCAI.

[59]  Jon M. Kleinberg,et al.  The Web as a Graph: Measurements, Models, and Methods , 1999, COCOON.

[60]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.