Skip to main content

Malicious Behaviour Analysis on Twitter Through the Lens of User Interest

  • Conference paper
  • First Online:
Data Mining (AusDM 2017)

Abstract

Evolving behaviours by spammers on online social networks continue to be a big challenge; this phenomenon has consistently received attention from researchers in terms of how they can be combated. On micro-blogging communities, such as Twitter, spammers intentionally change their behavioural patterns and message contents to avoid detection. Understanding the behavior of spammers is important for developing effective approaches to differentiate spammers from legitimate users. Due to the dynamic and inconsistent behaviour of spammers, the problem should be considered from two different levels to properly understand this type of behaviour and differentiate it from that of legitimate users. The first level pertains to the content, and the second, to the users’ demographics. In this paper, we first examine Twitter content relating to a particular topic, extracted from one hashtag, for a dataset comprising both spammers and legitimate users in order to characterise user behaviour with respect to that topic. We then investigate the users’ demographic data with a focus on the users’ profile description and how it relates to their tweets. The result of this experiment confirms that, in addition to the content level, users’ demographic data can present an alternative approach to identify the different behaviours of both spammers and legitimate users; moreover, it can be used to detect spammers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.followthehashtag.com/datasets/nasdaq-100-companies-free-twitter-dataset/.

  2. 2.

    https://www.virustotal.com/.

  3. 3.

    https://www.mywot.com/.

  4. 4.

    https://www.mywot.com/wiki/API.

  5. 5.

    http://www.followthehashtag.com/datasets/nasdaq-100-companies-free-twitter-dataset/.

  6. 6.

    https://support.twitter.com/articles/64986.

References

  • Aggarwal, A., Rajadesingan, A., Kumaraguru, P.: PhishAri: automatic realtime phishing detection on Twitter. In: IEEE eCrime Researchers Summit, Las Croabas, Puerto Rico, p. 1 (2012). https://doi.org/10.1109/eCrime.2012.6489521

  • Agrawal, R., Imieliński, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Washington, D.C., USA, pp. 207–216 (1993)

    Google Scholar 

  • Alghamdi, B., Watson, J., Xu, Y.: Toward detecting malicious links in online social networks through user behavior. In: IEEE WIC/ACM International Conference on Web Intelligence Workshops, Omaha, USA, pp. 5–8 (2016). https://doi.org/10.1109/wiw.2016.014

  • Benevenuto, F., Magno G., Rodrigues, T., Almeida, V.: Detecting spammers on Twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)

    Google Scholar 

  • Bhattarai, A., Rus, V., Dasgupta, D.: Characterizing comment spam in the blogosphere through content analysis. In: IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, pp. 37–44 (2009)

    Google Scholar 

  • Cao, C., Caverlee, J.: Behavioral detection of spam URL sharing: posting patterns versus click patterns. In: International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 138–141. IEEE/ACM, Beijing (2014)

    Google Scholar 

  • Dang, Q., Zhou, Y., Gao, F., Sun, Q.: Detecting cooperative and organized spammer groups in micro-blogging community. Data Min. Knowl. Discov. 31, 573–605 (2016)

    Article  MathSciNet  Google Scholar 

  • Dewan, P., Ponnurangam, K.: Towards automatic real time identification of malicious posts on Facebook. In: 13th Annual Conference on Privacy, Security and Trust (PST), Izmir, pp. 85–92 (2015)

    Google Scholar 

  • Eshraqi, N., Jalali, M., Moatar, H.M.: Detecting spam tweets in Twitter using a data stream clustering algorithm. In: International Congress on Technology, Communication and Knowledge (ICTCK), pp. 347–351 (2015)

    Google Scholar 

  • Feroz, M.N., Mengel, S.: Examination of data, rule generation and detection of phishing URLs using online logistic regression. In: International Conference on Big Data, pp. 241–250. IEEE, Washington, D.C. (2014)

    Google Scholar 

  • Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35–47. ACM (2010)

    Google Scholar 

  • Grier, C., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: ACM Conference on Computer and Communications Security, pp. 27–37. ACM (2010)

    Google Scholar 

  • Gyöngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with trustrank. In: Thirtieth International Conference on Very large Data Dases, vol. 30, pp. 576–587. VLDB Endowment (2004)

    Chapter  Google Scholar 

  • He, S., Wang, H.J., Hong, Z.: Identifying user behavior on Twitter based on multi-scale entropy. In: International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), pp. 381–384. IEEE, Wuhan (2014)

    Google Scholar 

  • Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11(6), 36–45 (2007)

    Article  Google Scholar 

  • Hua, W., Zhang, Y.: Threshold and associative based classification for social spam profile detection on Twitter. In: The Ninth International Conference on Semantics, Knowledge and Grids (SKG), pp. 113–120. IEEE, Beijing (2013)

    Google Scholar 

  • Jeong, S.Y., Koh, Y.S., Dobbie, G.: Phishing detection on Twitter streams. In: Cao, H., Li, J., Wang, R. (eds.) PAKDD 2016. LNCS (LNAI), vol. 9794, pp. 141–153. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-42996-0_12

    Chapter  Google Scholar 

  • Kotsiantis, S.B., Zaharakis, I.D., Pintelas, P.E.: Machine learning: a review of classification and combining techniques. Artif. Intell. Rev. 26(3), 159–190 (2006)

    Article  Google Scholar 

  • Ma, J.S., Savage, L.K., Voelker, S., Geoffrey, M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245–1254. ACM, New York (2009)

    Google Scholar 

  • Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992–3000 (2013)

    Article  Google Scholar 

  • McCord, M., Chuah, M.: Spam detection on Twitter using traditional classifiers. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 175–186. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23496-5_13

    Chapter  Google Scholar 

  • Nepali, R.K., Wang, Y.: You look suspicious!!: leveraging visible attributes to classify malicious short URLs on Twitter. In: Hawaii International Conference on System Sciences (HICSS), pp. 2648–2655. IEEE (2016)

    Google Scholar 

  • Ruan, X., Wu, Z., Wang, H., Jajodia, S.: Profiling online social behaviors for compromised account detection. IEEE Trans. Inf. Forensics Secur. 11(1), 176–187 (2016). https://doi.org/10.1109/TIFS.2015.2482465

    Article  Google Scholar 

  • Sedhai, S., Sun, A.: An analysis of 14 Million tweets on hashtag-oriented spamming. J. Assoc. Inf. Sci. Technol. 68(7), 1638–1651 (2017)

    Article  Google Scholar 

  • Shen, H., Ma, F., Zhang, X., Zong, L., Liu, X., Liang, W.: Discovering social spammers from multiple views. Neurocomputing 225, 49–57 (2017)

    Article  Google Scholar 

  • Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the ACM of the 26th Annual Computer Security Applications Conference (ACSAC 2010), pp. 1–9. ACM, New York (2010)

    Google Scholar 

  • Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time URL spam filtering service. In: IEEE Symposium on Security and Privacy (SP), Berkeley, CA, pp. 447–462. IEEE (2011a)

    Google Scholar 

  • Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of Twitter spam. In: The 2011 ACM SIGCOMM Conference on Internet Measurement conference, New York, USA, pp. 243–258. ACM (2011b)

    Google Scholar 

  • Wang, D., Irani, D., Pu, C.: A study on evolution of email spam over fifteen years. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, (Collaboratecom), Austin, TX, pp. 1–10. (2013)

    Google Scholar 

  • Wang, D., Navathe, S.B., Liu, L., Irani, D., Tamersoy, A., Pu, C.: Click traffic analysis of short URL spam on Twitter. In: International Conference Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), IEEE, pp. 250–259 (2013)

    Google Scholar 

  • Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving Twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318–337. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23644-0_17

    Chapter  Google Scholar 

  • Zheng, L.-X., Xu, X.-L., Li, J., Zhang, L., Pan, X.-C., Ma, Z.-Y., Zhang, L.-H.: Malicious URL prediction based on community detection. In: 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1–7. IEEE (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Bandar Alghamdi , Yue Xu or Jason Watson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alghamdi, B., Xu, Y., Watson, J. (2018). Malicious Behaviour Analysis on Twitter Through the Lens of User Interest. In: Boo, Y., Stirling, D., Chi, L., Liu, L., Ong, KL., Williams, G. (eds) Data Mining. AusDM 2017. Communications in Computer and Information Science, vol 845. Springer, Singapore. https://doi.org/10.1007/978-981-13-0292-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0292-3_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0291-6

  • Online ISBN: 978-981-13-0292-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics