REPLOT: Retrieving profile links on Twitter for suspicious networks detection

Charles Perez, B. Birregah, R. Layton, Marc Lemercier, P. Watters
{"title":"REPLOT: Retrieving profile links on Twitter for suspicious networks detection","authors":"Charles Perez, B. Birregah, R. Layton, Marc Lemercier, P. Watters","doi":"10.1145/2492517.2500234","DOIUrl":null,"url":null,"abstract":"In the last few decades social networking sites have encountered their first large-scale security issues. The high number of users associated with the presence of sensitive data (personal or professional) is certainly an unprecedented opportunity for malicious activities. As a result, one observes that malicious users are progressively turning their attention from traditional e-mail to online social networks to carry out their attacks. Moreover, it is now observed that attacks are not only performed by individual profiles, but that on a larger scale, a set of profiles can act in coordination in making such attacks. The latter are referred to as malicious social campaigns. In this paper, we present a novel approach that combines authorship attribution techniques with a behavioural analysis for detecting and characterizing social campaigns. The proposed approach is performed in three steps: first, suspicious profiles are identified from a behavioural analysis; second, connections between suspicious profiles are retrieved using a combination of authorship attribution and temporal similarity; third, a clustering algorithm is performed to identify and characterise the suspicious campaigns obtained. We provide a real-life application of the methodology on a sample of 1,000 suspicious Twitter profiles tracked over a period of forty days. Our results show that a large set of suspicious profiles behaves in coordination (70%) and propagates mainly, but not only, trustworthy URLs on the online social network. Among the three largest detected campaigns, we have highlighted that one represents an important security issue for the platform by promoting a significant set of malicious URLs.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2492517.2500234","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

In the last few decades social networking sites have encountered their first large-scale security issues. The high number of users associated with the presence of sensitive data (personal or professional) is certainly an unprecedented opportunity for malicious activities. As a result, one observes that malicious users are progressively turning their attention from traditional e-mail to online social networks to carry out their attacks. Moreover, it is now observed that attacks are not only performed by individual profiles, but that on a larger scale, a set of profiles can act in coordination in making such attacks. The latter are referred to as malicious social campaigns. In this paper, we present a novel approach that combines authorship attribution techniques with a behavioural analysis for detecting and characterizing social campaigns. The proposed approach is performed in three steps: first, suspicious profiles are identified from a behavioural analysis; second, connections between suspicious profiles are retrieved using a combination of authorship attribution and temporal similarity; third, a clustering algorithm is performed to identify and characterise the suspicious campaigns obtained. We provide a real-life application of the methodology on a sample of 1,000 suspicious Twitter profiles tracked over a period of forty days. Our results show that a large set of suspicious profiles behaves in coordination (70%) and propagates mainly, but not only, trustworthy URLs on the online social network. Among the three largest detected campaigns, we have highlighted that one represents an important security issue for the platform by promoting a significant set of malicious URLs.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
REPLOT:在Twitter上检索配置文件链接以进行可疑网络检测
在过去的几十年里,社交网站第一次遇到了大规模的安全问题。与敏感数据(个人或专业)相关的大量用户无疑为恶意活动提供了前所未有的机会。因此,有人观察到,恶意用户正逐渐将他们的注意力从传统的电子邮件转向在线社交网络来实施攻击。此外,现在可以观察到,攻击不仅是由单个配置文件执行的,而且在更大的范围内,一组配置文件可以在进行此类攻击时协同行动。后者被称为恶意社交活动。在本文中,我们提出了一种新颖的方法,将作者归因技术与用于检测和表征社会活动的行为分析相结合。所提出的方法分三个步骤进行:首先,从行为分析中识别可疑的配置文件;其次,结合作者归属和时间相似性检索可疑档案之间的联系;第三,执行聚类算法来识别和表征获得的可疑运动。我们在40天内跟踪了1000个可疑的Twitter个人资料样本,并提供了该方法的实际应用。我们的研究结果表明,大量可疑配置文件的行为是协调的(70%),并且主要(但不仅仅是)在在线社交网络上传播可信的url。在检测到的三个最大的活动中,我们已经强调了一个通过推广大量恶意url来代表平台的重要安全问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Statistical analysis and implications of SNS search in under-developed countries Identifying unreliable sources of skill and competency information Assessing group cohesion in homophily networks Exploiting online social data in ontology learning for event tracking and emergency response Event identification for social streams using keyword-based evolving graph sequences
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1