Fast training of support vector machines using sequential minimal optimization
Advances in kernel methods
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Communications of the ACM
Proceedings of the first workshop on Online social networks
User interactions in social networks and their implications
Proceedings of the 4th ACM European conference on Computer systems
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
The WEKA data mining software: an update
ACM SIGKDD Explorations Newsletter
What is Twitter, a social network or a news media?
Proceedings of the 19th international conference on World wide web
Uncovering social spammers: social honeypots + machine learning
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
@spam: the underground on 140 characters or less
Proceedings of the 17th ACM conference on Computer and communications security
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Detecting spammers on social networks
Proceedings of the 26th Annual Computer Security Applications Conference
Fragile online relationship: a first look at unfollow dynamics in twitter
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Design and Evaluation of a Real-Time URL Spam Filtering Service
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
An analysis of underground forums
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Understanding and combating link farming in the twitter social network
Proceedings of the 21st international conference on World Wide Web
Poultry markets: on the underground economy of twitter followers
Proceedings of the 2012 ACM workshop on Workshop on online social networks
A longitudinal study of follow predictors on twitter
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse
SEC'13 Proceedings of the 22nd USENIX conference on Security
You are how you click: clickstream analysis for Sybil detection
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |
The users of microblogging services, such as Twitter, use the count of followers of an account as a measure of its reputation or influence. For those unwilling or unable to attract followers naturally, a growing industry of "Twitter follower markets" provides followers for sale. Some markets use fake accounts to boost the follower count of their customers, while others rely on a pyramid scheme to turn non-paying customers into followers for each other, and into followers for paying customers. In this paper, we present a detailed study of Twitter follower markets, report in detail on both the static and dynamic properties of customers of these markets, and develop and evaluate multiple techniques for detecting these activities. We show that our detection system is robust and reliable, and can detect a significant number of customers in the wild.