Nothing Special   »   [go: up one dir, main page]

Skip to main content

Think Before RT: An Experimental Study of Abusing Twitter Trends

  • Conference paper
  • First Online:
Social Informatics (SocInfo 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8852))

Included in the following conference series:

Abstract

Twitter is one of the most influential Online Social Networks (OSNs), adopted not only by hundreds of millions of users but also by public figures, organizations, news media, and official authorities. One of the factors contributing to this success is the inherent property of the platform for spreading news – encapsulated in short messages that are tweeted from one user to another – across the globe. Today, it is sufficient to just inspect the trending topics in Twitter for figuring out what is happening around the world. Unfortunately, the capabilities of the platform can be also abused and exploited for distributing illicit content or boosting false information, and the consequences of such actions can be really severe: one false tweet was enough for making the stock-market crash for a short period of time in 2013.

In this paper, we analyze a large collection of tweets and explore the dynamics of popular trends and other Twitter features in regards to deliberate misuse. We identify a specific class of trend-exploiting campaigns that exhibits a stealthy behavior and hides spam URLs within Google search-result links. We build a spam classifier for both users and tweets, and demonstrate its simplicity and efficiency. Finally, we visualize these spam campaigns and reveal their inner structure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. http://followerwonk.com/

  2. https://blog.twitter.com/2012/shutting-down-spammers

  3. https://blog.twitter.com/2010/state-twitter-spam

  4. Amleshwaram, A.A., Reddy, A.L.N., Yadav, S., Gu, G., Yang, C.: Cats: characterizing automation of twitter spammers. In: COMSNETS, pp. 1–10. IEEE (2013)

    Google Scholar 

  5. Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS) (2010)

    Google Scholar 

  6. Flores, M., Kuzmanovic, A.: Searching for spam: detecting fraudulent accounts via web search. In: Roughan, M., Chang, R. (eds.) PAM 2013. LNCS, vol. 7799, pp. 208–217. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  7. Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards online spam filtering in social networks. In: Symposium on Network and Distributed System Security (NDSS) (2012)

    Google Scholar 

  8. Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th Annual Conference on Internet Measurement. ACM (2010)

    Google Scholar 

  9. Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: The underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 27–37. ACM, New York (2010)

    Google Scholar 

  10. Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: ICWSM (2011)

    Google Scholar 

  11. Markatos, E., Balzarotti, D., Almgren, M., Athanasopoulos, E., Bos, H., Cavallaro, L., Ioannidis, S., Lindorfer, M., Maggi, F., Minchev, Z., et al.: The red book

    Google Scholar 

  12. Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992–3000 (2013)

    Article  Google Scholar 

  13. O’Donovan, J., Kang, B., Meyer, G., Höllerer, T., Adalii, S.: Credibility in context: an analysis of feature distributions in twitter. In: SocialCom/PASSAT, pp. 293–301 (2012)

    Google Scholar 

  14. Ozdikis, O., Senkul, P., Oguztuzun, H.: Semantic expansion of hashtags for enhanced event detection in twitter. In: Proceedings of the 1st International Workshop on Online Social Systems (2012)

    Google Scholar 

  15. Perlroth, N.: Fake twitter followers become multimillion-dollar business. The New York Times (2013)

    Google Scholar 

  16. Sridharan, V., Shankar, V., Gupta, M.: Twitter games: how successful spammers pick targets. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC 2012, pp. 389–398. ACM, New York (2012)

    Google Scholar 

  17. Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y.: Follow the green: growth and dynamics in twitter follower markets. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 163–176. ACM (2013)

    Google Scholar 

  18. Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, pp. 243–258. ACM, New York (2011)

    Google Scholar 

  19. Time.com. How does one fake tweet cause a stock market crash? http://business.time.com/2013/04/24/how-does-one-fake-tweet-cause-a-stock-market-crash/

  20. Twitter, Huffington Post, e. Twitter Statistics (2014). http://www.statisticbrain.com/twitter-statistics/

  21. Wang, A.H.: Don’t follow me - spam detection in twitter. In: SECRYPT, pp. 142–151 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Despoina Antonakaki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Antonakaki, D., Polakis, I., Athanasopoulos, E., Ioannidis, S., Fragopoulou, P. (2015). Think Before RT: An Experimental Study of Abusing Twitter Trends. In: Aiello, L., McFarland, D. (eds) Social Informatics. SocInfo 2014. Lecture Notes in Computer Science(), vol 8852. Springer, Cham. https://doi.org/10.1007/978-3-319-15168-7_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15168-7_49

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15167-0

  • Online ISBN: 978-3-319-15168-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics