Social network services have become one of the dominant human communication and interaction paradigms. However, the emergence of highly stealth attacks perpetrated by bots in social-networks lead to an increasing need for efficient detection methodologies. The bots objectives can be as varied as those of traditional human criminality by acting as agents of multiple scams. Bots may operate as independent entities that create fake (extremely convincing) profiles or hijack the profile of a real person using his infected computer. Detecting social networks bots may be extremely difficult by using human common sense or automated algorithms that evaluate social relations. However, bots are not able to fake the characteristic human behavior interactions over time. The pseudo-periodicity mixed with random and sometimes chaotic actions characteristic of human behavior is still very difficult to emulate/simulate. Nevertheless, this human uniqueness is very easy to differentiate from other behavioral patterns. As so, novel behavior analysis and identification methodologies are necessary for an accurate detection of social network bots. In this work, we propose a new paradigm that, by jointly analyzing the multiple scales of users’ interactions within a social network, can accurately discriminate the characteristic behaviors of humans and bots within a social network. Consequently, different behavior patterns can be built for the different social network bot classes and typical humans interactions, enabling the accurate detection of one of most recent stealth Internet threats.
[1]
Rik Fergusonnam.
Back to the future
,
2010,
Netw. Secur..
[2]
Danny Bradbury.
Spreading fear on Facebook
,
2012,
Netw. Secur..
[3]
Ahsan Kareem,et al.
Applications of wavelet transforms in earthquake, wind and ocean engineering
,
1999
.
[4]
Ronaldo M. Salles,et al.
Botnets: A survey
,
2013,
Comput. Networks.
[5]
Sushil Jajodia,et al.
Blog or block: Detecting blog bots through behavioral biometrics
,
2013,
Comput. Networks.
[6]
Won Kim,et al.
The dark side of the Internet: Attacks, costs and responses
,
2011,
Inf. Syst..
[7]
P. Jagnere.
Vulnerabilities in social networking sites
,
2012,
2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[8]
Krishna P. Gummadi,et al.
On the evolution of user interaction in Facebook
,
2009,
WOSN '09.
[9]
David M. Nicol,et al.
The Koobface botnet and the rise of social malware
,
2010,
2010 5th International Conference on Malicious and Unwanted Software.
[10]
Konstantin Beznosov,et al.
Design and analysis of a social botnet
,
2013,
Comput. Networks.
[11]
InduShobha N. Chengalur-Smith,et al.
An overview of social engineering malware: Trends, tactics, and implications
,
2010
.
[12]
Guanhua Yan,et al.
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks
,
2013,
Comput. Networks.
[13]
Howard Rush,et al.
The cybercrime ecosystem: Online innovation in the shadows?
,
2013
.