Improved algorithms for topic distillation in a hyperlinked environment
Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval
The stochastic approach for link-structure analysis (SALSA) and the TKC effect
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Proceedings of the 10th international conference on World Wide Web
Proceedings of the 11th international conference on World Wide Web
Identifying link farm spam pages
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Understanding the network-level behavior of spammers
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Know your neighbors: web spam detection using the web topology
SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
Combating web spam with trustrank
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Link analysis for Web spam detection
ACM Transactions on the Web (TWEB)
TwitterRank: finding topic-sensitive influential twitterers
Proceedings of the third ACM international conference on Web search and data mining
Earthquake shakes Twitter users: real-time event detection by social sensors
Proceedings of the 19th international conference on World wide web
@spam: the underground on 140 characters or less
Proceedings of the 17th ACM conference on Computer and communications security
#TwitterSearch: a comparison of microblog search and web search
Proceedings of the fourth ACM international conference on Web search and data mining
Fragile online relationship: a first look at unfollow dynamics in twitter
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Detecting and analyzing automated activity on twitter
PAM'11 Proceedings of the 12th international conference on Passive and active measurement
Suspended accounts in retrospect: an analysis of twitter spam
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Understanding factors that affect response rates in twitter
Proceedings of the 23rd ACM conference on Hypertext and social media
Twitter games: how successful spammers pick targets
Proceedings of the 28th Annual Computer Security Applications Conference
Detecting malicious tweets in trending topics using a statistical analysis of language
Expert Systems with Applications: An International Journal
Enhancing and identifying cloning attacks in online social networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detecting tip spam in location-based social networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Spotting opinion spammers using behavioral footprints
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Detection of spam tipping behaviour on foursquare
Proceedings of the 22nd international conference on World Wide Web companion
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy
Proceedings of the 22nd international conference on World Wide Web companion
Two types of Twitter users with equally many followers
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
REPLOT: REtrieving profile links on Twitter for suspicious networks detection
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Follow the green: growth and dynamics in twitter follower markets
Proceedings of the 2013 conference on Internet measurement conference
Indirect weighted association rules mining for academic network collaboration recommendations
AusDM '12 Proceedings of the Tenth Australasian Data Mining Conference - Volume 134
SEC'13 Proceedings of the 22nd USENIX conference on Security
Social spammer detection in microblogging
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Hi-index | 0.00 |
Recently, Twitter has emerged as a popular platform for discovering real-time information on the Web, such as news stories and people's reaction to them. Like the Web, Twitter has become a target for link farming, where users, especially spammers, try to acquire large numbers of follower links in the social network. Acquiring followers not only increases the size of a user's direct audience, but also contributes to the perceived influence of the user, which in turn impacts the ranking of the user's tweets by search engines. In this paper, we first investigate link farming in the Twitter network and then explore mechanisms to discourage the activity. To this end, we conducted a detailed analysis of links acquired by over 40,000 spammer accounts suspended by Twitter. We find that link farming is wide spread and that a majority of spammers' links are farmed from a small fraction of Twitter users, the social capitalists, who are themselves seeking to amass social capital and links by following back anyone who follows them. Our findings shed light on the social dynamics that are at the root of the link farming problem in Twitter network and they have important implications for future designs of link spam defenses. In particular, we show that a simple user ranking scheme that penalizes users for connecting to spammers can effectively address the problem by disincentivizing users from linking with other users simply to gain influence.