Spam double-funnel: connecting web spammers with advertisers
Proceedings of the 16th international conference on World Wide Web
Spamscatter: characterizing internet scam hosting infrastructure
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Spamming botnets: signatures and characteristics
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Spamalytics: an empirical analysis of spam marketing conversion
Proceedings of the 15th ACM conference on Computer and communications security
Studying spamming botnets using Botlab
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
What is Twitter, a social network or a news media?
Proceedings of the 19th international conference on World wide web
Uncovering social spammers: social honeypots + machine learning
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
Proceedings of the 17th ACM conference on Computer and communications security
Truthy: mapping the spread of astroturf in microblog streams
Proceedings of the 20th international conference companion on World wide web
Information credibility on twitter
Proceedings of the 20th international conference on World wide web
Proceedings of the 20th international conference on World wide web
A social-engineering-centric data collection initiative to study phishing
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
Detecting and analyzing automated activity on twitter
PAM'11 Proceedings of the 12th international conference on Passive and active measurement
Structural trend analysis for online social networks
Proceedings of the VLDB Endowment
Dirty jobs: the role of freelance labor in web service abuse
SEC'11 Proceedings of the 20th USENIX conference on Security
Show me the money: characterizing spam-advertised revenue
SEC'11 Proceedings of the 20th USENIX conference on Security
Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade
SEC'11 Proceedings of the 20th USENIX conference on Security
Phi.sh/$oCiaL: the phishing landscape through short URLs
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Fashion crimes: trending-term exploitation on the web
Proceedings of the 18th ACM conference on Computer and communications security
Identifying automatic posting systems in microblogs
EPIA'11 Proceedings of the 15th Portugese conference on Progress in artificial intelligence
Suspended accounts in retrospect: an analysis of twitter spam
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
On word-of-mouth based discovery of the web
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
The socialbot network: when bots socialize for fame and money
Proceedings of the 27th Annual Computer Security Applications Conference
Poster: online spam filtering in social networks
Proceedings of the 18th ACM conference on Computer and communications security
Tips, dones and todos: uncovering user profiles in foursquare
Proceedings of the fifth ACM international conference on Web search and data mining
LazyBase: trading freshness for performance in a scalable database
Proceedings of the 7th ACM european conference on Computer Systems
Characterizing user navigation and interactions in online social networks
Information Sciences: an International Journal
Detecting collective attention spam
Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality
kaPoW plugins: protecting web applications using reputation-based proof-of-work
Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality
Credibility ranking of tweets during high impact events
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Online social network platforms: toward a model-backed security evaluation
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Spam filtering in twitter using sender-receiver relationship
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Understanding and combating link farming in the twitter social network
Proceedings of the 21st international conference on World Wide Web
Proceedings of the 21st international conference on World Wide Web
Serf and turf: crowdturfing for fun and profit
Proceedings of the 21st international conference on World Wide Web
Adapting social spam infrastructure for political censorship
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Short links under attack: geographical analysis of spam in a URL shortener network
Proceedings of the 23rd ACM conference on Hypertext and social media
Poultry markets: on the underground economy of twitter followers
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Detecting social spam campaigns on twitter
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
PharmaLeaks: understanding the business of online pharmaceutical affiliate programs
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Efficient and scalable socware detection in online social networks
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Poultry markets: on the underground economy of twitter followers
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
Containment of misinformation spread in online social networks
Proceedings of the 3rd Annual ACM Web Science Conference
Proceedings of the CUBE International Information Technology Conference
Innocent by association: early recognition of legitimate users
Proceedings of the 2012 ACM conference on Computer and communications security
Observing common spam in Twitter and email
Proceedings of the 2012 ACM conference on Internet measurement conference
Twitter games: how successful spammers pick targets
Proceedings of the 28th Annual Computer Security Applications Conference
Fluxing botnet command and control channels with URL shortening services
Computer Communications
Truthy: enabling the study of online social networks
Proceedings of the 2013 conference on Computer supported cooperative work companion
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Searching for spam: detecting fraudulent accounts via web search
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy
Proceedings of the 22nd international conference on World Wide Web companion
@i seek 'fb.me': identifying users across multiple online social networks
Proceedings of the 22nd international conference on World Wide Web companion
Design and prototyping of a social media observatory
Proceedings of the 22nd international conference on World Wide Web companion
An analysis of socware cascades in online social networks
Proceedings of the 22nd international conference on World Wide Web
Two years of short URLs internet measurement: security threats and countermeasures
Proceedings of the 22nd international conference on World Wide Web
Analysis of misinformation containment in online social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis and identification of spamming behaviors in Sina Weibo microblog
Proceedings of the 7th Workshop on Social Network Mining and Analysis
Follow the green: growth and dynamics in twitter follower markets
Proceedings of the 2013 conference on Internet measurement conference
How the live web feels about events
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
UNIK: unsupervised social network spam detection
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
The curse of 140 characters: evaluating the efficacy of SMS spam detection on android
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
Understanding latent interactions in online social networks
ACM Transactions on the Web (TWEB)
SEC'13 Proceedings of the 22nd USENIX conference on Security
Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse
SEC'13 Proceedings of the 22nd USENIX conference on Security
You are how you click: clickstream analysis for Sybil detection
SEC'13 Proceedings of the 22nd USENIX conference on Security
Social spammer detection in microblogging
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Campaign extraction from social media
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Section on Intelligent Mobile Knowledge Discovery and Management Systems and Special Issue on Social Web Mining
Uncovering social network Sybils in the wild
ACM Transactions on Knowledge Discovery from Data (TKDD) - Casin special issue
Twitter spammer detection using data stream clustering
Information Sciences: an International Journal
Web 2.0, social networks and E-commerce as marketing tools
Journal of Theoretical and Applied Electronic Commerce Research
Hi-index | 0.00 |
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blacklists. We analyze the accounts that send spam and find evidence that it originates from previously legitimate accounts that have been compromised and are now being puppeteered by spammers. Using clickthrough data, we analyze spammers' use of features unique to Twitter and the degree that they affect the success of spam. We find that Twitter is a highly successful platform for coercing users to visit spam pages, with a clickthrough rate of 0.13%, compared to much lower rates previously reported for email spam. We group spam URLs into campaigns and identify trends that uniquely distinguish phishing, malware, and spam, to gain an insight into the underlying techniques used to attract users. Given the absence of spam filtering on Twitter, we examine whether the use of URL blacklists would help to significantly stem the spread of Twitter spam. Our results indicate that blacklists are too slow at identifying new threats, allowing more than 90% of visitors to view a page before it becomes blacklisted. We also find that even if blacklist delays were reduced, the use by spammers of URL shortening services for obfuscation negates the potential gains unless tools that use blacklists develop more sophisticated spam filtering.