ABSTRACT
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective tools for executing spam campaigns. In this paper, we present an online spam filtering system that can be deployed as a component of the OSN platform to inspect messages generated by users in real-time. We propose to reconstruct spam messages into campaigns for classification rather than examine them individually. Although campaign identification has been used for offline spam analysis, we apply this technique to aid the online spam detection problem with sufficiently low overhead. Accordingly, our system adopts a set of novel features that effectively distinguish spam campaigns. It is highly accurate and confidently drops messages classified as "spam" before they reach the intended recipients, thus protecting them from various kinds of fraud. In addition, the system achieves an average throughput of 1580 messages/sec and an average processing latency of 69.7ms for each message. The high throughput and low latency guarantees that it will not become the bottleneck of the whole OSN platform.
- Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., and Zhao, B. Y. Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement (New York, NY, USA, 2010), IMC '10, ACM, pp. 35--47. Google ScholarDigital Library
- Grier, C., Thomas, K., Paxson, V., and Zhang, M. @spam: the underground on 140 characters or less. In Proceedings of the 17th ACM conference on Computer and communications security (New York, NY, USA, 2010), CCS '10, ACM, pp. 27--37. Google ScholarDigital Library
- Lee, K., Caverlee, J., and Webb, S. Uncovering social spammers: social honeypotsGoogle Scholar
- machine learning. In Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval (New York, NY, USA, 2010), SIGIR '10, ACM, pp. 435--442.Google Scholar
- Stringhini, G., Kruegel, C., and Vigna, G. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference (New York, NY, USA, 2010), ACSAC '10, ACM, pp. 1--9. Google ScholarDigital Library
- Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., and Osipkov, I. Spamming botnets: signatures and characteristics. In Proc. of SIGCOMM (2008). Google ScholarDigital Library
- Zadrozny, B., Langford, J., and Abe, N. Cost-sensitive learning by cost-proportionate example weighting. In Proceedings of the Third IEEE International Conference on Data Mining (Washington, DC, USA, 2003), ICDM '03, IEEE Computer Society, pp. 435--. Google ScholarDigital Library
- Zou, C. C., Towsley, D., and Gong, W. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Trans. Dependable Secur. Comput. 4 (April 2007), 105--118. Google ScholarDigital Library
Index Terms
- Poster: online spam filtering in social networks
Recommendations
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath
ACSAC '14: Proceedings of the 30th Annual Computer Security Applications ConferenceIn online social networks (OSNs), spam originating from friends and acquaintances not only reduces the joy of Internet surfing but also causes damage to less security-savvy users. Prior countermeasures combat OSN spam from different angles. Due to the ...
Detecting and characterizing social spam campaigns
IMC '10: Proceedings of the 10th ACM SIGCOMM conference on Internet measurementOnline social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective tools for executing spam campaigns and spreading malware. Intuitively, a ...
Detecting and characterizing social spam campaigns
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityOnline social networks (OSNs) are exceptionally useful collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also extremely effective tools for executing spam campaigns and spreading ...
Comments