2011
DOI: 10.1007/978-3-642-23644-0_17
|View full text |Cite
|
Sign up to set email alerts
|

Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers

Abstract: Abstract. Due to the significance and indispensability of detecting and suspending Twitter spammers, many researchers along with the engineers in Twitter Corporation have devoted themselves to keeping Twitter as spam-free online communities. Meanwhile, Twitter spammers are also evolving to evade existing detection techniques. In this paper, we make an empirical analysis of the evasion tactics utilized by Twitter spammers, and then design several new and robust features to detect Twitter spammers. Finally, we f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
140
0
4

Year Published

2013
2013
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 182 publications
(144 citation statements)
references
References 15 publications
0
140
0
4
Order By: Relevance
“…Some systems analyze the characteristics of social network accounts, looking for sign of mass-created fake accounts [7,16,24,31,40,42]. Other systems look at the social network structure of accounts, or at how the messages posted by them spread, looking for anomalies indicative of a malicious profile [8,9,15,32,38,41].…”
Section: Related Workmentioning
confidence: 99%
“…Some systems analyze the characteristics of social network accounts, looking for sign of mass-created fake accounts [7,16,24,31,40,42]. Other systems look at the social network structure of accounts, or at how the messages posted by them spread, looking for anomalies indicative of a malicious profile [8,9,15,32,38,41].…”
Section: Related Workmentioning
confidence: 99%
“…While the TPR is similar to those seen with other algorithms [6,2,8,10], direct comparison is difficult due to variations in methodologies. In particular, differences in determining a suitable "ground truth" (Twitter suspension information, URL blacklists, and manual verification) and granularity (account and message levels) mean each study is measuring a slightly different value.…”
Section: Resultsmentioning
confidence: 61%
“…Others techniques use both the content of the messages, profile information, and information from the Twitter social graph to try and determine the nature of tweets [6,7,8,9,10,11]. Even more complex methods have further used similar types of information to determine which large scale campaign a spam tweet belongs [2,4,12,3].…”
Section: Introductionmentioning
confidence: 99%
“…When the user selects the name of an existing anti spammer system, WEST automatically selects the set of features used by that system. WEST also allows for new features to be added by the user and presently there are 17 systems [1,2,4,[6][7][8][9][10][11][12][13][14][15][16][17][18][19] and 173 features. Each of those features can be grouped into four types: profile, activities, relations, and tweet contents.…”
Section: Feature Extractionmentioning
confidence: 99%
“…They deploy different techniques to post unwanted messages to users on SNS for advertisement, frauds or spreading of malware through the malicious URLs [12]. For instance, spammers create many fake accounts to post spam tweets for a specific purpose (or known as spam campaign), send message with different text to convey the same meanings or pay some users to follow their accounts [15]. Thus, the statistical attributes of spammers and spam tweets vary over time.…”
Section: Introductionmentioning
confidence: 99%