IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Structure and evolution of online social networks
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Analysis of topological characteristics of huge online social networking services
Proceedings of the 16th international conference on World Wide Web
Communications of the ACM
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Spamscatter: characterizing internet scam hosting infrastructure
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Do social networks improve e-commerce?: a study on social marketplaces
Proceedings of the first workshop on Online social networks
Characterizing social cascades in flickr
Proceedings of the first workshop on Online social networks
Spamming botnets: signatures and characteristics
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Spamalytics: an empirical analysis of spam marketing conversion
Proceedings of the 15th ACM conference on Computer and communications security
SS'08 Proceedings of the 17th conference on Security symposium
Approximate object location and spam filtering on peer-to-peer systems
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
User interactions in social networks and their implications
Proceedings of the 4th ACM European conference on Computer systems
Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web
Detecting spammers and content promoters in online video social networks
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
FaceCloak: An Architecture for User Privacy on Social Networking Sites
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
Understanding online social network usage from a network perspective
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Characterizing user behavior in online social networks
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
StarClique: guaranteeing user privacy in social networks against intersection attacks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Spamcraft: an inside look at spam campaign orchestration
LEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
xBook: redesigning privacy control in social networking platforms
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Understanding latent interactions in online social networks
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Understanding latent interactions in online social networks
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Phi.sh/$oCiaL: the phishing landscape through short URLs
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Autonomous link spam detection in purely collaborative environments
Proceedings of the 7th International Symposium on Wikis and Open Collaboration
Loose tweets: an analysis of privacy leaks on twitter
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Content-driven detection of campaigns in social media
Proceedings of the 20th ACM international conference on Information and knowledge management
Suspended accounts in retrospect: an analysis of twitter spam
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Social snapshots: digital forensics for online social networks
Proceedings of the 27th Annual Computer Security Applications Conference
Poster: online spam filtering in social networks
Proceedings of the 18th ACM conference on Computer and communications security
Tips, dones and todos: uncovering user profiles in foursquare
Proceedings of the fifth ACM international conference on Web search and data mining
Characterizing user navigation and interactions in online social networks
Information Sciences: an International Journal
Proceedings of the 21st international conference on World Wide Web
Serf and turf: crowdturfing for fun and profit
Proceedings of the 21st international conference on World Wide Web
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Adapting social spam infrastructure for political censorship
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Poultry markets: on the underground economy of twitter followers
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Detecting social spam campaigns on twitter
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Efficient and scalable socware detection in online social networks
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Poultry markets: on the underground economy of twitter followers
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
Robust detection of comment spam using entropy rate
Proceedings of the 5th ACM workshop on Security and artificial intelligence
Manufacturing compromise: the emergence of exploit-as-a-service
Proceedings of the 2012 ACM conference on Computer and communications security
Observing common spam in Twitter and email
Proceedings of the 2012 ACM conference on Internet measurement conference
Twitter games: how successful spammers pick targets
Proceedings of the 28th Annual Computer Security Applications Conference
All your face are belong to us: breaking Facebook's social authentication
Proceedings of the 28th Annual Computer Security Applications Conference
Fluxing botnet command and control channels with URL shortening services
Computer Communications
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Detecting tip spam in location-based social networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Searching for spam: detecting fraudulent accounts via web search
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
Detection of spam tipping behaviour on foursquare
Proceedings of the 22nd international conference on World Wide Web companion
An analysis of socware cascades in online social networks
Proceedings of the 22nd international conference on World Wide Web
Two years of short URLs internet measurement: security threats and countermeasures
Proceedings of the 22nd international conference on World Wide Web
Characterizing and detecting malicious crowdsourcing
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Community-based features for identifying spammers in online social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Follow the green: growth and dynamics in twitter follower markets
Proceedings of the 2013 conference on Internet measurement conference
UNIK: unsupervised social network spam detection
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Building confederated web-based services with Priv.io
Proceedings of the first ACM conference on Online social networks
Understanding latent interactions in online social networks
ACM Transactions on the Web (TWEB)
Using naive bayes to detect spammy names in social networks
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
SEC'13 Proceedings of the 22nd USENIX conference on Security
Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse
SEC'13 Proceedings of the 22nd USENIX conference on Security
You are how you click: clickstream analysis for Sybil detection
SEC'13 Proceedings of the 22nd USENIX conference on Security
Campaign extraction from social media
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Section on Intelligent Mobile Knowledge Discovery and Management Systems and Special Issue on Social Web Mining
Uncovering social network Sybils in the wild
ACM Transactions on Knowledge Discovery from Data (TKDD) - Casin special issue
Stranger danger: exploring the ecosystem of ad-based URL shortening services
Proceedings of the 23rd international conference on World wide web
CoBAn: A context based model for data leakage prevention
Information Sciences: an International Journal
Web 2.0, social networks and E-commerce as marketing tools
Journal of Theoretical and Applied Electronic Commerce Research
Preventing spam in opportunistic networks
Computer Communications
Hi-index | 0.00 |
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective tools for executing spam campaigns and spreading malware. Intuitively, a user is more likely to respond to a message from a Facebook friend than from a stranger, thus making social spam a more effective distribution mechanism than traditional email. In fact, existing evidence shows malicious entities are already attempting to compromise OSN account credentials to support these "high-return" spam campaigns. In this paper, we present an initial study to quantify and characterize spam campaigns launched using accounts on online social networks. We study a large anonymized dataset of asynchronous "wall" messages between Facebook users. We analyze all wall messages received by roughly 3.5 million Facebook users (more than 187 million messages in all), and use a set of automated techniques to detect and characterize coordinated spam campaigns. Our system detected roughly 200,000 malicious wall posts with embed- ded URLs, originating from more than 57,000 user accounts. We find that more than 70% of all malicious wall posts advertise phishing sites. We also study the characteristics of malicious accounts, and see that more than 97% are compromised accounts, rather than "fake" accounts created solely for the purpose of spamming. Finally, we observe that, when adjusted to the local time of the sender, spamming dominates actual wall post activity in the early morning hours, when normal users are asleep.