Identification of Sybil Communities Generating Context-Aware Spam on Online Social Networks

نویسندگان

  • Faraz Ahmed
  • Muhammad Abulaish
چکیده

This paper presents a hybrid approach to identify coordinated spam or malware attacks carried out using sybil accounts on online social networks. It also presents an online social network data collection methodology, with a special focus on Facebook social network. The pages crawled from Facebook network are grouped according to users’ interests and analyzed to retrieve users’ profiles from each of them. As a result, based on the users’ page-likes behavior, a total number of six groups has been identified. Each group is treated separately and modeled using a graph structure, termed as profile graph, in which a node represents a profile and a weighted edge connecting a pair of profiles represents the degree of their behavior similarity. Behavior similarity is calculated as a function of common shared links, common page-likes, and cosine similarity of the posts, and used to determine weights of the edges of the profile graph. Louvain’s community detection algorithm is applied on the profile graphs to identify various communities. Finally, a set of statistical features identified in one of our previous works is used classify the obtained communities either as malicious or benign. The experimental results on a real dataset show that profiles belonging to a malicious community have high closeness-centrality representing high behavioral similarity, whereas those of a benign community have low closeness-centrality.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Social Turing Tests: Crowdsourcing Sybil Detection

As popular tools for spreading spam andmalware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils that effectively befriend legitimate users, rendering most automated Sybil detection techniques ineffective. In this paper, we explore the feasibility of a crowdsourced Sybil dete...

متن کامل

You Are How You Click: Clickstream Analysis for Sybil Detection

Fake identities and Sybil accounts are pervasive in today’s online communities. They are responsible for a growing number of threats, including fake product reviews, malware and spam on social networks, and astroturf political campaigns. Unfortunately, studies show that existing tools such as CAPTCHAs and graph-based Sybil detectors have not proven to be effective defenses. In this paper, we de...

متن کامل

A Novel Approach for Secure Hidden Community Mining in Social Networks using Data Mining Techniques

Social network community contains a group of nodes connected on the basis of certain relationships or same properties. Sometimes it refers to the special kind of network arrangement where the Community Mining discovers all communities hidden in distributed networks based on their important similarities. Different methods and algorithms have been employed to carry out the task of community minin...

متن کامل

VoteTrust: A System to Defend against Social Network Sybils in Facebook

The Sybil attack is one where an user creates multiple Duplicate or fake identities to compromise the running of the system. Online social networks(OSN) suffers from the creation of fake accounts that introduce fake product reviews, malware and spam, existing defenses focus on using the social graph structure to isolate fakes. This paper presents VoteTrusta salable defense system that further l...

متن کامل

VoteTrust: A System to Defend against Social Network Sybils in Facebook

The Sybil attack is one where an user creates multiple Duplicate or fake identities to compromise the running of the system. Online social networks(OSN) suffers from the creation of fake accounts that introduce fake product reviews, malware and spam, existing defenses focus on using the social graph structure to isolate fakes. This paper presents VoteTrusta salable defense system that further l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013