Spammers Are Becoming "Smarter" on Twitter

نویسندگان

  • Chao Chen
  • Jun Zhang
  • Yang Xiang
  • Wanlei Zhou
  • Jonathan Oliver
چکیده

T witter has become one of the most commonly used communication tools in daily life. With 500 million users, Twitter now generates more than 500 million tweets per day. However, its popularity has also attracted spamming. Spammers spread many intensive tweets, which can lure legitimate users to commercial or malicious sites containing malware downloads, phishing, drug sales, scams, and more.1 Spam is a problem throughout the Internet, and Twitter is not immune. In addition, Twitter spam is much more successful compared to email spam.2 Various methods have been proposed by researchers to deal with Twitter spam, such as identifying spammers based on tweeting history3 or social attributes,4 detecting abnormal behavior,5 and classifying tweet-embedded URLs.6 Although researchers, as well as Twitter itself, have attempted to combat spam, the percentage of spam in the whole platform is still high. We hypothesize that this is because spammers are becoming more cunning on Twitter. While researchers are developing methods to detect spam, spammers continuously invent new strategies to bypass detection. Here, we review the well-known methods that spammers have used to avoid or reduce their chances of being caught on Twitter. We show that spammers are now using more advanced strategies, namely coordinated posting behavior, finitestate-machine-based spam template, and passive spam.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hunting for Spammers: Detecting Evolved Spammers on Twitter

Once an email problem, spam has nowadays branched into new territories with disruptive effects. In particular, spam has established itself over the recent years as a ubiquitous, annoying, and sometimes threatening aspect of online social networks. Due to its prevalent existence, many works have tackled spam on Twitter from different angles. Spam is, however, a moving target. The new generation ...

متن کامل

Yang, Harkreader and Gu: Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers

To date, as one of the most popular Online Social Networks (OSNs), Twitter is paying its dues as more and more spammers set their sights on this microblogging site. Twitter spammers can achieve their malicious goals such as sending spam, spreading malware, hosting botnet command and control (C&C) channels, and launching other underground illicit activities. Due to the significance and indispens...

متن کامل

Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers

To date, as one of the most popular Online Social Networks (OSNs), Twitter is paying its dues as more and more spammers set their sights on this microblogging site. The Twitter spammers can achieve their malicious goals such as sending spam, spreading malware, hosting botnet command and control (C&C) channels, and launching other underground illicit activities. Due to the significance and indis...

متن کامل

Connections between Twitter Spammer Categories

Twitter has become a viable platform for spammers, who often form networks to further their reach. Troublesomely, targeted users become increasingly frustrated, or worse, view content resulting in computer virus infection. We build on previous work around detecting spam on Twitter, proposing that subcategorising spammers can increase our understanding of their connections in spammer networks an...

متن کامل

Spam Filtering in Twitter Using Sender-Receiver Relationship

Twitter is one of the most visited sites in these days. Twitter spam, however, is constantly increasing. Since Twitter spam is different from traditional spam such as email and blog spam, conventional spam filtering methods are inappropriate to detect it. Thus, many researchers have proposed schemes to detect spammers in Twitter. These schemes are based on the features of spam accounts such as ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IT Professional

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016