ABSTRACT
Since Twitter has emerged as one of the easiest ways of reaching people, companies started using it to advertise their products. However, creating a functional network of followers to whom to promote content is not a straightforward task. On the one side, collecting followers requires time. On the other side, companies need to establish a reputation to motivate users to follow them.
A number of websites have emerged to help Twitter users create a large network of followers. These websites promise their subscribers to provide followers in exchange for a fee or limited services free of charge but in exchange for the user's Twitter account credentials. In addition, they offer to spread their clients' promotional messages in the network. In this paper, we study the phenomenon of these Twitter Account Markets, and we show how their services are often linked to abusive behavior and compromised Twitter profiles.
- klout. http://klout.com.Google Scholar
- Oauth community site. http://oauth.net.Google Scholar
- Twitter blog: #numbers. http://blog.twitter.com/2011/03/numbers.html.Google Scholar
- Twitter terms of service. http://support.twitter.com/articles/18311-the-twitter-rules.Google Scholar
- Twitter finally released a "stalkers" app? no, it's a phishing scam. http://nakedsecurity.sophos.com/2011/08/12/twitter-finally-released-a-stalkers-app-no-its-a-phishing-scam/, 2011.Google Scholar
- F. Benvenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting Spammers on Twitter. In Conference on Email and Anti-Spam (CEAS), 2010.Google Scholar
- L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In Wold Wide Web Conference (WWW), 2009. Google ScholarDigital Library
- Z. Cai and C. Jermaine. The latent community model for detecting sybils in social networks. In Symposium on Network and Distributed System Security (NDSS), 2012.Google Scholar
- Y. Cao, V. Yegneswaran, P. Possas, and Y. Chen. Pathcutter: Severing the self-propagation path of xss javascript worms in social web networks. In Symposium on Network and Distributed System Security (NDSS), 2012.Google Scholar
- M. Cha, H. Haddadi, F. Benvenuto, and K. Gummadi. Measuring User Influence in Twitter: The Million Follower Fallacy. In International AAAI Conference on Weblogs and Social Media, 2010.Google Scholar
- J. Franklin, V. Paxson, A. Perrig, and S. Savage. An inquiry into the nature and causes of the wealth of internet miscreants. In ACM Conference on Computer and Communications Security (CCS), 2007. Google ScholarDigital Library
- H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary. Towards online spam filtering in social networks. In Symposium on Network and Distributed System Security (NDSS), 2012.Google Scholar
- H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Zhao. Detecting and Characterizing Social Spam Campaigns. In Internet Measurement Conference (IMC), 2010. Google ScholarDigital Library
- C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: the underground on 140 characters or less. In ACM Conference on Computer and Communications Security (CCS), 2010. Google ScholarDigital Library
- T. Jagatic, N. Johnson, M. Jakobsson, and T. Jagatif. Social phishing. Comm. ACM, 50(10):94--100, 2007. Google ScholarDigital Library
- C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In ACM Conference on Computer and Communications Security (CCS), 2008. Google ScholarDigital Library
- C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage. Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium, 2011. Google ScholarDigital Library
- R. King. How companies use Twitter to bolster their brands. In BusinessWeek Online, 2008.Google Scholar
- H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In Wold Wide Web Conference (WWW), 2010. Google ScholarDigital Library
- K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: social honeypots+machine learning. In International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010. Google ScholarDigital Library
- S. Lee and J. Kim. Warningbird: Detecting suspicious urls in twitter stream. In Symposium on Network and Distributed System Security (NDSS), 2012.Google Scholar
- K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, and Others. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In IEEE Symposium on Security and Privacy, 2011. Google ScholarDigital Library
- J. Song, S. Lee, and J. Kim. Spam filtering in twitter using sender-receiver relationship. In Symposium on Recent Advances in Intrusion Detection (RAID), 2011. Google ScholarDigital Library
- G. Stringhini, C. Kruegel, and G. Vigna. Detecting Spammers on Social Networks. In Annual Computer Security Applications Conference (ACSAC), 2010. Google ScholarDigital Library
- K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and Evaluation of a Real-Time URL Spam Filtering Service. In IEEE Symposium on Security and Privacy, 2011. Google ScholarDigital Library
- C. Wilson, B. Boe, A. Sala, K. Puttaswamy, and B. Zhao. User Interactions in Social Networks and Their Implications. In ACM European conference on Computer systems (EuroSys), 2009. Google ScholarDigital Library
- W. Xu, F. Zhang, and S. Zhu. Toward worm detection in online social networks. In Annual Computer Security Applications Conference (ACSAC), 2010. Google ScholarDigital Library
- C. Yang, R. Harkreader, and G. Gu. Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. In Symposium on Recent Advances in Intrusion Detection (RAID), 2011. Google ScholarDigital Library
Index Terms
- Poultry markets: on the underground economy of twitter followers
Recommendations
Poultry markets: on the underground economy of twitter followers
Special october issue SIGCOMM '12Since Twitter has emerged as one of the easiest ways of reaching people, companies started using it to advertise their products. However, creating a functional network of followers to whom to promote content is not a straightforward task. On the one ...
Tweeting under pressure: analyzing trending topics and evolving word choice on sina weibo
COSN '13: Proceedings of the first ACM conference on Online social networksIn recent years, social media has risen to prominence in China, with sites like Sina Weibo and Renren each boasting hundreds of millions of users. Social media in China plays a profound role as a platform for breaking news and political commentary that ...
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy
WWW '13 Companion: Proceedings of the 22nd International Conference on World Wide WebIn today's world, online social media plays a vital role during real world events, especially crisis events. There are both positive and negative effects of social media coverage of events, it can be used by authorities for effective disaster management ...
Comments