A categorization scheme for socialbot attacks in online social networks

In the past, online social networks (OSN) like Facebook and Twitter became powerful instruments for communication and networking. Unfortunately, they have also become a welcome target for socialbot attacks. Therefore, a deep understanding of the nature of such attacks is important to protect the Eco-System of OSNs. In this extended abstract we propose a categorization scheme of social bot attacks that aims at providing an overview of the state of the art of techniques in this emerging field. Finally, we demonstrate the usefulness of our categorization scheme by characterizing recent socialbot attacks according to our categorization scheme.

[1]  Vern Paxson,et al.  Adapting Social Spam Infrastructure for Political Censorship , 2012, LEET.

[2]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, CCS '10.

[3]  Vern Paxson,et al.  @spam: the underground on 140 characters or less , 2010, CCS '10.

[4]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.

[5]  Harold Joseph Highland,et al.  Internet sniffer attacks: E. Eugene Schultz, SRI International, Menlo Park, CA and Thomas Longstaff, Carnegie Mellon University, Pittsburgh, PA, USA , 1995 .

[6]  E. Rosch,et al.  Categorization of Natural Objects , 1981 .

[7]  Rossano Schifanella,et al.  People Are Strange When You're a Stranger: Impact and Influence of Bots on Social Networks , 2012, ICWSM.

[8]  M. Bishop Vulnerabilities Analysis , 1967 .

[9]  Bing Liu,et al.  Opinion spam and analysis , 2008, WSDM '08.

[10]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[11]  Markus Strohmaier,et al.  When Social Bots Attack: Modeling Susceptibility of Users in Online Social Networks , 2012, #MSM.

[12]  John D. Howard,et al.  An analysis of security incidents on the Internet 1989-1995 , 1998 .

[13]  Eugene H. Spafford,et al.  Software vulnerability analysis , 1998 .

[14]  Konstantin Beznosov,et al.  The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.

[15]  Ronald D. Williams,et al.  Taxonomies of attacks and vulnerabilities in computer systems , 2008, IEEE Communications Surveys & Tutorials.

[16]  Edward G. Amoroso,et al.  Fundamentals of computer security technology , 1994 .

[17]  Erland Jonsson,et al.  How to systematically classify computer security intrusions , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).