skip to main content
10.1145/2484313.2484330acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

SocialWatch: detection of online service abuse via large-scale social graphs

Published: 08 May 2013 Publication History

Abstract

In this paper, we present a framework, SocialWatch, to detect attacker-created accounts and hijacked accounts for online services at a large scale. SocialWatch explores a set of social graph properties that effectively model the overall social activity and connectivity patterns of online users, including degree, PageRank, and social affinity features. These features are hard to mimic and robust to attacker counter strategies. We evaluate SocialWatch using a large, real dataset with more than 682 million users and over 5.75 billion directional relationships. SocialWatch successfully detects 56.85 million attacker-created accounts with a low false detection rate of 0.75% and a low false negative rate of 0.61%. In addition, SocialWatch detects 1.95 million hijacked accounts---among which 1.23 million were not detected previously---with a low false detection rate of 2%. Our work demonstrates the practicality and effectiveness of using large social graphs with billions of edges to detect real attacks.

References

[1]
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, "Spamming Botnets: Signatures and Characteristics," in SIGCOMM, 2008.
[2]
S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser, "Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine," in USENIX Security, 2009.
[3]
Z. Qian, Z. M. Mao, Y. Xie, and F. Yu, "On Network-level Clusters for Spam Detection," in NDSS, 2010.
[4]
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum, "BotGraph: Large Scale Spamming Botnet Detection," in NSDI, 2009.
[5]
Y. Yu, M. Isard, D. Fetterly, M. Budiu, U. Erlingsson, P. K. Gunda, and J. Currey, "DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language," in OSDI, 2008.
[6]
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," in SIGCOMM, 2006.
[7]
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks," in IEEE Symposium on Security and Privacy (Oakland), 2008.
[8]
N. Tran, B. Min, J. Li, and L. Subramanian, "Sybil-Resilient Online Content Voting," in NSDI, 2009.
[9]
B. Viswanath, K. P. Gummadi, A. Post, and A. Mislove, "An Analysis of Social Network-Based Sybil Defenses," in SIGCOMM, 2010.
[10]
A. Mohaisen, A. Yun, and Y. Kim, "Measuring the Mixing Time of Social Graphs," in IMC, 2010.
[11]
Y. Xie, F. Yu, Q. Ke, M. Abadi, E. Gillum, K. Vitaldevaria, J. Walter, J. Huang, and Z. M. Mao, "Innocent by Association: Early Recognition of Legitimate Users," in CCS, 2012.
[12]
Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, "Analysis of Topological Characteristics of Huge Online Social Networking Services," in WWW, 2007.
[13]
A. Bonato, J. Janssen, and P. Pralat, "A Geometric Model for On-line Social Networks," in WOSN, 2010.
[14]
J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graphs over Time: Densification Laws, Shrinking Diameters and Possible Explanations," in KDD, 2005.
[15]
M. Sirivianos, K. Kim, and X. Yang, "SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation," in INFOCOM, 2011.
[16]
V. P. R. P. Oscar Boykin, "Leveraging Social Networks to Fight Spam," in IEEE Computer Vol 38, 2005.
[17]
P. A. C. andJoerg Diederich and W. Nejdl, "MailRank: Global Attack-Resistant Whitelists for Spam Detection," in CIKM, 2005.
[18]
S. Garriss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazieres, and H. Yu, "RE: Reliable Email," in NSDI, 2006.
[19]
J. Huang, Y. Xie, F. Yu, Q. Ke, M. Abadi, E. Gillum, and Z. M. Mao, "SocialWatch: Detection of Online Service Abuse via Large-Scale Social Graphs," in Tech Report MSR-TR-2013-24, 2013.
[20]
S. Brin and L. Page, "The Anatomy of a Large-Scale Hypertextual Web Search Engine," in WWW, 1998.
[21]
Z. Bar-Yossef and L.-T. Mashiach, "Local Approximation of PageRank and Reverse PageRank," in WWW, 2008.
[22]
A. D. Sarma, S. Gollapudi, M. Najork, and R. Panigrahy, "A Sketch-Based Distance Oracle for Web-Scale Graphs," in WSDM, 2010.
[23]
E. Lehmann and J. P. Romano, Testing Statistical Hypotheses. Springer, 2005.
[24]
R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification. Wiley-Interscience, 2001.

Cited By

View all
  • (2024)A comprehensive survey on community detection methods and applications in complex information networksSocial Network Analysis and Mining10.1007/s13278-024-01246-514:1Online publication date: 18-Apr-2024
  • (2023)A graph-powered large-scale fraud detection systemInternational Journal of Machine Learning and Cybernetics10.1007/s13042-023-01786-w15:1(115-128)Online publication date: 14-Feb-2023
  • (2021)Live-Streaming Fraud Detection: A Heterogeneous Graph Neural Network ApproachProceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining10.1145/3447548.3467065(3670-3678)Online publication date: 14-Aug-2021
  • Show More Cited By

Index Terms

  1. SocialWatch: detection of online service abuse via large-scale social graphs

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
      May 2013
      574 pages
      ISBN:9781450317672
      DOI:10.1145/2484313
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 May 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. pagerank
      2. security
      3. social graph
      4. socialwatch
      5. spam

      Qualifiers

      • Short-paper

      Conference

      ASIA CCS '13
      Sponsor:

      Acceptance Rates

      ASIA CCS '13 Paper Acceptance Rate 35 of 216 submissions, 16%;
      Overall Acceptance Rate 418 of 2,322 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 14 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A comprehensive survey on community detection methods and applications in complex information networksSocial Network Analysis and Mining10.1007/s13278-024-01246-514:1Online publication date: 18-Apr-2024
      • (2023)A graph-powered large-scale fraud detection systemInternational Journal of Machine Learning and Cybernetics10.1007/s13042-023-01786-w15:1(115-128)Online publication date: 14-Feb-2023
      • (2021)Live-Streaming Fraud Detection: A Heterogeneous Graph Neural Network ApproachProceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining10.1145/3447548.3467065(3670-3678)Online publication date: 14-Aug-2021
      • (2021)What Happens Behind the Scene? Towards Fraud Community Detection in E-Commerce from Online to OfflineCompanion Proceedings of the Web Conference 202110.1145/3442442.3451147(105-113)Online publication date: 19-Apr-2021
      • (2021)Adversarial Attacks on Graphs: How to Hide Your Structural InformationGraph Data Mining10.1007/978-981-16-2609-8_5(93-120)Online publication date: 26-Apr-2021
      • (2020)Heterogeneous Mini-Graph Neural Network and Its Application to Fraud Invitation Detection2020 IEEE International Conference on Data Mining (ICDM)10.1109/ICDM50108.2020.00098(891-899)Online publication date: Nov-2020
      • (2019)Malware Detection via Extended Label Propagation Through Graph InferenceIEEE Access10.1109/ACCESS.2019.29483747(157830-157840)Online publication date: 2019
      • (2018)Heterogeneous Graph Neural Networks for Malicious Account DetectionProceedings of the 27th ACM International Conference on Information and Knowledge Management10.1145/3269206.3272010(2077-2085)Online publication date: 17-Oct-2018
      • (2017)POSTERProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3138827(2543-2545)Online publication date: 30-Oct-2017
      • (2017)Robust Spammer Detection in MicroblogsACM Transactions on Intelligent Systems and Technology10.1145/30866378:6(1-31)Online publication date: 18-Aug-2017
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media