skip to main content
10.1145/2789187.2789206acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmsocietyConference Proceedingsconference-collections
research-article

Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach

Published:27 July 2015Publication History

ABSTRACT

In Online Social Networks (OSNs), the audience size commanded by an organization or an individual is a critical measure of that entity's popularity. This measure has important economic and/or political implications. Organizations can use information about their audience, such as age, location etc., to tailor their products or their message appropriately. But such tailoring can be biased by the presence of fake profiles on these networks. In this study, analysis of 62 million publicly available Twitter user profiles was conducted and a strategy to retroactively identify automatically generated fake profiles was established. Using a pattern-matching algorithm on screen-names with an analysis of tweet update times, a highly reliable sub-set of fake user accounts were identified. Analysis of profile creation times and URLs of these fake accounts revealed distinct behavior of the fake users relative to a ground truth data set. The combination of this scheme with established social graph analysis will allow for time-efficient detection of fake profiles in OSNs.

References

  1. Parmelee, J. H., and Bichard S. L. 2011. Politics and the Twitter revolution: How tweets influence the relationship between political leaders and the public. Lexington Books.Google ScholarGoogle Scholar
  2. Douceur, J. R. 2002. The sybil attack. Peer-to-peer Systems, Springer, 251--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B. Y., and Dai, Y. 2011. Uncovering Social Network Sybils in the Wild. ACM Trans. Knowl. Discov. from Data 8, 1, 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Kwak, H., Lee, C., Park, H., and Moon, S. (2010).What is Twitter, a social network or a news media?. In Proceedings of the 19th international conference on World wide web, 591--600. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., and Zhao, B. Y. 2013. Follow the green: growth and dynamics in twitter follower markets. In Proceedings of the 2013 conference on Internet measurement, 163--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jin, L., Takabi, H., and Joshi, J. B. D. 2011. Towards active detection of identity clone attacks on online social networks. In Proceedings of the first ACM conference on Data and application security and privacy, 27--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lee, K., Caverlee, J., and Webb, S. 2010. Uncovering social spammers: social honeypots+ machine learning. In Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, 435--442. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Stringhini, G., Kruegel, C., and Vigna, G. 2010. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference, 1--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Benevenuto, F., Magno, G., Rodrigues, T., and Almeida, V. 2010. Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference, 6,12.Google ScholarGoogle Scholar
  10. Wang, A. H. 2010. Don't follow me: Spam detection in twitter. In Security and Cryptography (SECRYPT), Proc. of the International Conf., 2010, 1--10.Google ScholarGoogle Scholar
  11. Grier, C., Thomas, K., Paxson, V., and Zhang, M. 2010. @ spam: the underground on 140 characters or less. In Proc. of the 17th ACM conference on Computer and communications security, 27--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Thomas, K., McCoy, D., Grier, C., Kolcz, A., and Paxson, V. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security, 2013,195--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Twitter\ Inc., "The Twitter Rules.".Google ScholarGoogle Scholar
  14. Gabielkov, M., and Legout, A. 2012. The complete picture of the Twitter social graph. In CoNEXT Student '12 Proc. of ACM conference on CoNEXT student workshop,19--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. D, "Is Twitter telling the truth about their 'active user' stats?" Nov-2013.Google ScholarGoogle Scholar
  16. Twitter\ Inc., "The Twitter Users.".Google ScholarGoogle Scholar

Index Terms

  1. Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            SMSociety '15: Proceedings of the 2015 International Conference on Social Media & Society
            July 2015
            122 pages
            ISBN:9781450339230
            DOI:10.1145/2789187

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 July 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            SMSociety '15 Paper Acceptance Rate20of47submissions,43%Overall Acceptance Rate78of189submissions,41%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader