DOI QR코드

DOI QR Code

Exploratory study on the Spam Detection of the Online Social Network based on Graph Properties

그래프 속성을 이용한 온라인 소셜 네트워크 스팸 탐지 동향 분석

  • Jeong, Sihyun (Department of Computer and Engineering, Seoul University) ;
  • Oh, Hayoung (Global Convergence, Sungkyunkwan University)
  • Received : 2019.10.22
  • Accepted : 2019.12.31
  • Published : 2020.05.31

Abstract

As online social networks are used as a critical medium for modern people's information sharing and relationship, their users are increasing rapidly every year. This not only increases usage but also surpasses the existing media in terms of information credibility. Therefore, emerging marketing strategies are deliberately attacking social networks. As a result, public opinion, which should be formed naturally, is artificially formed by online attacks, and many people trust it. Therefore, many studies have been conducted to detect agents attacking online social networks. In this paper, we analyze the trends of researches attempting to detect such online social network attackers, focusing on researches using social network graph characteristics. While the existing content-based techniques may represent classification errors due to privacy infringement and changes in attack strategies, the graph-based method proposes a more robust detection method using attacker patterns.

온라인 소셜 네트워크가 현대인의 정보 공유 및 교류의 핵심적인 매체로 사용됨에 따라, 그 이용자는 매해 급격하게 증가하고 있다. 이는 단순히 사용량 증가뿐만 아니라 정보의 신뢰성에서도 기존 언론 매체를 능가하기도 하는데, 최근 등장하는 마케팅 전략들은 이 점을 노리고 교묘하게 소셜 네트워크를 공격하고 있다. 그에 따라 자연스럽게 형성되어야 할 여론이 온라인 공격으로 인해 인위적으로 구성되기도 하고, 이를 신뢰하는 사람들도 많아지게 되었다. 따라서 온라인 소셜 네트워크를 공격하는 주체들을 탐지하고자 하는 연구들이 최근 많이 진행되고 있다. 본 논문에서는 이러한 온라인 소셜 네트워크 공격자들을 탐지하고자 하는 연구들의 동향을 분석하는데, 그 중 소셜 네트워크 그래프 특성을 이용한 연구들에 집중하고 있다. 기존의 contents-based 기법이 사생활 침해 및 공격 전략 변화에 따른 분류 오류를 나타낼 수 있음에 반해, 그래프 기반 방법은 공격자 패턴을 이용하여 보다 강건한 탐지 방법을 제안하고 있다.

Keywords

References

  1. M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. "COMPA: Detecting Compromised Accounts on Social Networks." NDSS. 2013.
  2. G. Magno, T. Rodrigues, V. Augusto, and F. Almeida. "Detecting spammers on twitter. In Collaboration, Electronic messaging", Anti-Abuse and Spam Conference (CEAS), 2010.
  3. J. M. Romo and L. Araujo. "Detecting malicious tweets in trending topics using a statistical analysis of language". Expert Systems with Applications 40.8, 2013
  4. S. Y. Schoenebeck, D. M. Romero, G. Schoenebeck, and D. Boyd. "Detecting spam in a twitter network." First Monday, 15(1), January, 2009.
  5. X. Li, M. Zhang, Y. Liu, S. Ma, Y. Jin, and L. Ru. "Search engine click spam detection based on bipartite graph propagation." Proceedings of the 7th ACM international conference on Web search and data mining. ACM, 2014.
  6. T. Tian, J. Zhu, F. Xia, X. Zhuang, and T. Zhang. "Crowd fraud detection in internet advertising." Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2015.
  7. Q. Cao, X. Yang, J. Yu, and C. Palow. "Uncovering large groups of active malicious accounts in online social networks." Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014.
  8. Q. Cao, X. Yang, J. Yu, and C. Palow. "VolTime: Unsupervised Anomaly Detection on Users' Online Activity Volume." Proceedings of the 2017 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, 2017.
  9. L. H. Yu, and D.Y. Yeung. "A learning approach to spam detection based on social networks". Diss. Hong Kong University of Science and Technology, 2007
  10. I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi, and F.Bonchi. "The social world of content abusers in community question answering." Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2015.
  11. E. Zhai, Z. Li, Z. Li, F. Wu, and G. Chen. "Resisting tag spam by leveraging implicit user behaviors." Proceedings of the VLDB Endowment 10.3 (2016): 241-252.
  12. H. Zheng, M. Xue, H. Lu, S. Hao, H. Zhu, X. Liang, and K. W. Ross "Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks." arXiv preprint arXiv:1709.06916 (2017).
  13. M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang "Inferring strange behavior from connectivity pattern in social networks." Advances in Knowledge Discovery and Data Mining. Springer International Publishing, 2014. 126-138.
  14. M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. "CatchSync: catching synchronized behavior in large directed graphs." Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2014.
  15. M. Newman,. Networks. Oxford university press, 2018.
  16. L. Akoglu, M. McGlohon, and C. Faloutsos. "Oddball: Spotting anomalies in weighted graphs." Advances in Knowledge Discovery and Data Mining. Springer Berlin Heidelberg, 2010. 410-421.
  17. D. O'Callaghan, M. Harrigan, J. Carthy, and P. Cunningham." Network Analysis of Recurring YouTube Spam Campaigns." ICWSM. 2012.
  18. S. Jeong, G. Noh, H. Oh, and C. Kim. "Follow spam detection based on cascaded social information." Information Sciences 369 (2016): 481-499. https://doi.org/10.1016/j.ins.2016.07.033
  19. N. Z. Gong, M. Frank, and P. Mittal. "SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection." Information Forensics and Security, IEEE Transactions on 9.6 (2014): 976-987. https://doi.org/10.1109/TIFS.2014.2316975
  20. S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. "Understanding and combating link farming in the twitter social network." Proceedings of the 21st international conference on World Wide Web. ACM, 2012.
  21. D. Yuan, G. Li, Q. Li, and Y. Zheng. "Sybil defense in crowdsourcing platforms." Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. ACM, 2017.
  22. N. Shah, A. Beutel, B. Gallagher, and C. Faloutsos. "Spotting suspicious link behavior with fBox: an adversarial perspective." Data Mining (ICDM), 2014 IEEE International Conference on. IEEE, 2014.
  23. A. Beutel, K. Murray, C. Faloutsos, and A. J. Smola. "Cobafi: collaborative bayesian filtering." Proceedings of the 23rd international conference on World wide web. ACM, 2014.
  24. M. Gupta, J. Gao, and J. Han. "Community distribution outlier detection in heterogeneous information networks." Machine Learning and Knowledge Discovery in Databases. Springer Berlin Heidelberg, 2013. 557-573.
  25. B. Viswanath, M. A. Bashir, M. Crovella, S. Guha, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. "Towards detecting anomalous user behavior in online social networks." Proceedings of the 23rd USENIX Security Symposium (USENIX Security). 2014.
  26. I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi, and F. Bonchi. "The Social World of Content Abusers in Community Question Answering." Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2015.
  27. B. Perozzi, and L. Akoglu. "Scalable anomaly ranking of attributed neighborhoods." Proceedings of the 2016 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, 2016.
  28. S. Dhawan, S. C. R. Gangireddy, S. Kumar, and T. Chakraborty. 2019. "Spotting collective behaviour of online frauds in customer reviews." In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19), Sarit Kraus (Ed.). AAAI Press 245-251.
  29. S. Jeong, J. Lee, J. Park, and C. Kim. "The Social Relation Key: A new paradigm for security." Information Systems 71 (2017): 68-77. https://doi.org/10.1016/j.is.2017.07.003
  30. M. McPherson, L. S. Lovin, and J. M. Cook. "Birds of a feather: Homophily in social networks." Annual review of sociology 27.1 (2001): 415-444. https://doi.org/10.1146/annurev.soc.27.1.415
  31. R. Milo, S. Itzkovitz, N. Kashtan, R. Levitt, S. S. Orr, I. Ayzenshtat, M. Sheffer, and U. Alon. "Superfamilies of evolved and designed networks." Science 303.5663 (2004): 1538-1542. https://doi.org/10.1126/science.1089167
  32. O. N. Yaveroglu, N. M. Dognin, D. Davis, Z. Levnajic, V. Janjic, R. Karapandza, A. Stojmirovic, and N. Przulj. "Revealing the hidden language of complex networks." Scientific reports 4 (2014).
  33. Y. Koren, "Collaborative filtering with temporal dynamics." Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009.
  34. R. Salakhutdinov, and A. Mnih. "Bayesian probabilistic matrix factorization using Markov chain Monte Carlo." Proceedings of the 25th international conference on Machine learning. ACM, 2008.
  35. L.Page, S. Brin, R. Motwani, and T. Winograd. "The PageRank citation ranking: Bringing order to the web." Stanford InfoLab, 1999.
  36. J. Kleinberg, "Hubs, authorities, and communities." ACM computing surveys (CSUR) 31.4es (1999): 5. https://doi.org/10.1145/345966.345982
  37. Lee Chan-chan, Seo Go-eun, Shin-yong Shin, Dong-gun Kim, & Jae-hee Cho. (2015). "Improved tweet bot detection using geographic space and device information." Journal of the Korea Information and Communication Society, 19(12), 2878-2884. https://doi.org/10.6109/jkiice.2015.19.12.2878