Abstract
Twitter is one of the most influential Online Social Networks (OSNs), adopted not only by hundreds of millions of users but also by public figures, organizations, news media, and official authorities. One of the factors contributing to this success is the inherent property of the platform for spreading news – encapsulated in short messages that are tweeted from one user to another – across the globe. Today, it is sufficient to just inspect the trending topics in Twitter for figuring out what is happening around the world. Unfortunately, the capabilities of the platform can be also abused and exploited for distributing illicit content or boosting false information, and the consequences of such actions can be really severe: one false tweet was enough for making the stock-market crash for a short period of time in 2013.
In this paper, we analyze a large collection of tweets and explore the dynamics of popular trends and other Twitter features in regards to deliberate misuse. We identify a specific class of trend-exploiting campaigns that exhibits a stealthy behavior and hides spam URLs within Google search-result links. We build a spam classifier for both users and tweets, and demonstrate its simplicity and efficiency. Finally, we visualize these spam campaigns and reveal their inner structure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Amleshwaram, A.A., Reddy, A.L.N., Yadav, S., Gu, G., Yang, C.: Cats: characterizing automation of twitter spammers. In: COMSNETS, pp. 1–10. IEEE (2013)
Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS) (2010)
Flores, M., Kuzmanovic, A.: Searching for spam: detecting fraudulent accounts via web search. In: Roughan, M., Chang, R. (eds.) PAM 2013. LNCS, vol. 7799, pp. 208–217. Springer, Heidelberg (2013)
Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards online spam filtering in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)
Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th Annual Conference on Internet Measurement. ACM (2010)
Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: The underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 27–37. ACM, New York (2010)
Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: ICWSM (2011)
Markatos, E., Balzarotti, D., Almgren, M., Athanasopoulos, E., Bos, H., Cavallaro, L., Ioannidis, S., Lindorfer, M., Maggi, F., Minchev, Z., et al.: The red book
Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992–3000 (2013)
O’Donovan, J., Kang, B., Meyer, G., Höllerer, T., Adalii, S.: Credibility in context: an analysis of feature distributions in twitter. In: SocialCom/PASSAT, pp. 293–301 (2012)
Ozdikis, O., Senkul, P., Oguztuzun, H.: Semantic expansion of hashtags for enhanced event detection in twitter. In: Proceedings of the 1st International Workshop on Online Social Systems (2012)
Perlroth, N.: Fake twitter followers become multimillion-dollar business. The New York Times (2013)
Sridharan, V., Shankar, V., Gupta, M.: Twitter games: how successful spammers pick targets. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC 2012, pp. 389–398. ACM, New York (2012)
Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y.: Follow the green: growth and dynamics in twitter follower markets. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 163–176. ACM (2013)
Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, pp. 243–258. ACM, New York (2011)
Time.com. How does one fake tweet cause a stock market crash? http://business.time.com/2013/04/24/how-does-one-fake-tweet-cause-a-stock-market-crash/
Twitter, Huffington Post, e. Twitter Statistics (2014). http://www.statisticbrain.com/twitter-statistics/
Wang, A.H.: Don’t follow me - spam detection in twitter. In: SECRYPT, pp. 142–151 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Antonakaki, D., Polakis, I., Athanasopoulos, E., Ioannidis, S., Fragopoulou, P. (2015). Think Before RT: An Experimental Study of Abusing Twitter Trends. In: Aiello, L., McFarland, D. (eds) Social Informatics. SocInfo 2014. Lecture Notes in Computer Science(), vol 8852. Springer, Cham. https://doi.org/10.1007/978-3-319-15168-7_49
Download citation
DOI: https://doi.org/10.1007/978-3-319-15168-7_49
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15167-0
Online ISBN: 978-3-319-15168-7
eBook Packages: Computer ScienceComputer Science (R0)