REPLOT: REtrieving profile links on Twitter for suspicious networks detection

Charles Perez, Babiga Birregah, Robert Layton, Marc Lemercier, Paul Watters

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

4 Citations (Scopus)

Abstract

In the last few decades social networking sites have encountered their first large-scale security issues. The high number of users associated with the presence of sensitive data (personal or professional) is certainly an unprecedented opportunity for malicious activities. As a result, one observes that malicious users are progressively turning their attention from traditional e-mail to online social networks to carry out their attacks. Moreover, it is now observed that attacks are not only performed by individual profiles, but that on a larger scale, a set of profiles can act in coordination in making such attacks. The latter are referred to as malicious social campaigns. In this paper, we present a novel approach that combines authorship attribution techniques with a behavioural analysis for detecting and characterizing social campaigns. The proposed approach is performed in three steps: first, suspicious profiles are identified from a behavioural analysis; second, connections between suspicious profiles are retrieved using a combination of authorship attribution and temporal similarity; third, a clustering algorithm is performed to identify and characterise the suspicious campaigns obtained. We provide a real-life application of the methodology on a sample of 1,000 suspicious Twitter profiles tracked over a period of forty days. Our results show that a large set of suspicious profiles behaves in coordination (70%) and propagates mainly, but not only, trustworthy URLs on the online social network. Among the three largest detected campaigns, we have highlighted that one represents an important security issue for the platform by promoting a significant set of malicious URLs.

Original languageEnglish
Title of host publicationProceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)
EditorsTansel Özyer, Peter Carrington, Ee-Peng Lim
Place of PublicationNew York
PublisherAssociation for Computing Machinery
Pages1307-1314
Number of pages8
ISBN (Print)9781450322409
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013 - Niagara Falls, ON, Canada
Duration: 25 Aug 201328 Aug 2013

Conference

Conference2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013
Country/TerritoryCanada
CityNiagara Falls, ON
Period25/08/1328/08/13

Keywords

  • Authorship attribution
  • Clustering
  • Malicious campaigns
  • Online social networks
  • Suspicious profiles
  • Twitter

Fingerprint

Dive into the research topics of 'REPLOT: REtrieving profile links on Twitter for suspicious networks detection'. Together they form a unique fingerprint.

Cite this