ABSTRACT
In Online Social Networks (OSNs), the audience size commanded by an organization or an individual is a critical measure of that entity's popularity. This measure has important economic and/or political implications. Organizations can use information about their audience, such as age, location etc., to tailor their products or their message appropriately. But such tailoring can be biased by the presence of fake profiles on these networks. In this study, analysis of 62 million publicly available Twitter user profiles was conducted and a strategy to retroactively identify automatically generated fake profiles was established. Using a pattern-matching algorithm on screen-names with an analysis of tweet update times, a highly reliable sub-set of fake user accounts were identified. Analysis of profile creation times and URLs of these fake accounts revealed distinct behavior of the fake users relative to a ground truth data set. The combination of this scheme with established social graph analysis will allow for time-efficient detection of fake profiles in OSNs.
- Parmelee, J. H., and Bichard S. L. 2011. Politics and the Twitter revolution: How tweets influence the relationship between political leaders and the public. Lexington Books.Google Scholar
- Douceur, J. R. 2002. The sybil attack. Peer-to-peer Systems, Springer, 251--260. Google ScholarDigital Library
- Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B. Y., and Dai, Y. 2011. Uncovering Social Network Sybils in the Wild. ACM Trans. Knowl. Discov. from Data 8, 1, 7. Google ScholarDigital Library
- Kwak, H., Lee, C., Park, H., and Moon, S. (2010).What is Twitter, a social network or a news media?. In Proceedings of the 19th international conference on World wide web, 591--600. Google ScholarDigital Library
- Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., and Zhao, B. Y. 2013. Follow the green: growth and dynamics in twitter follower markets. In Proceedings of the 2013 conference on Internet measurement, 163--176. Google ScholarDigital Library
- Jin, L., Takabi, H., and Joshi, J. B. D. 2011. Towards active detection of identity clone attacks on online social networks. In Proceedings of the first ACM conference on Data and application security and privacy, 27--38. Google ScholarDigital Library
- Lee, K., Caverlee, J., and Webb, S. 2010. Uncovering social spammers: social honeypots+ machine learning. In Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, 435--442. Google ScholarDigital Library
- Stringhini, G., Kruegel, C., and Vigna, G. 2010. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference, 1--9. Google ScholarDigital Library
- Benevenuto, F., Magno, G., Rodrigues, T., and Almeida, V. 2010. Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference, 6,12.Google Scholar
- Wang, A. H. 2010. Don't follow me: Spam detection in twitter. In Security and Cryptography (SECRYPT), Proc. of the International Conf., 2010, 1--10.Google Scholar
- Grier, C., Thomas, K., Paxson, V., and Zhang, M. 2010. @ spam: the underground on 140 characters or less. In Proc. of the 17th ACM conference on Computer and communications security, 27--37. Google ScholarDigital Library
- Thomas, K., McCoy, D., Grier, C., Kolcz, A., and Paxson, V. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security, 2013,195--210. Google ScholarDigital Library
- Twitter\ Inc., "The Twitter Rules.".Google Scholar
- Gabielkov, M., and Legout, A. 2012. The complete picture of the Twitter social graph. In CoNEXT Student '12 Proc. of ACM conference on CoNEXT student workshop,19--20. Google ScholarDigital Library
- S. D, "Is Twitter telling the truth about their 'active user' stats?" Nov-2013.Google Scholar
- Twitter\ Inc., "The Twitter Users.".Google Scholar
Index Terms
- Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach
Recommendations
Multidimensional Analysis of Fake News Spreaders on Twitter
Computational Data and Social NetworksAbstractSocial media has become a tool to spread false information with the help of its large complex network. The consequences of such misinformation could be very severe. The paper uses the Twitter conversations about the scrapping of Article 370 in ...
Fake Twitter followers detection by denoising autoencoder
WI '17: Proceedings of the International Conference on Web IntelligenceGaining followers on the Twitter platform has become a rapid way to increase one's credibility on this social network, that in the last few years has become a launch pad for new trends and to influence people opinions. So, many people have begun to buy ...
Discovering similar Twitter accounts using semantics
On daily basis, millions of Twitter accounts post a vast number of tweets including numerous Twitter entities (mentions, replies, hashtags, photos, URLs). Many of these entities are used in common by many accounts. The more common entities are found in ...
Comments