Understanding and Combating Link Farming in the Twitter Social Network

Understanding and Combating Link Farming in the Twitter Social Network

WWW 2012 – Session: Security and Fraud in Social Networks April 16–20, 2012, Lyon, France Understanding and Combating Link Farming in the Twitter Social Network Saptarshi Ghosh Bimal Viswanath Farshad Kooti IIT Kharagpur, India MPI-SWS, Germany MPI-SWS, Germany Naveen K. Sharma Gautam Korlam Fabricio Benevenuto IIT Kharagpur, India IIT Kharagpur, India UFOP, Brazil Niloy Ganguly Krishna P. Gummadi IIT Kharagpur, India MPI-SWS, Germany ABSTRACT Web, such as current events, news stories, and people’s opin- Recently, Twitter has emerged as a popular platform for ion about them. Traditional media, celebrities, and mar- discovering real-time information on the Web, such as news keters are increasingly using Twitter to directly reach au- stories and people’s reaction to them. Like the Web, Twitter diences in the millions. Furthermore, millions of individual has become a target for link farming, where users, especially users are sharing the information they discover over Twit- spammers, try to acquire large numbers of follower links in ter, making it an important source of breaking news during the social network. Acquiring followers not only increases emergencies like revolutions and disasters [17, 23]. Recent the size of a user’s direct audience, but also contributes to estimates suggest that 200 million active Twitter users post the perceived influence of the user, which in turn impacts 150 million tweets (messages) containing more than 23 mil- the ranking of the user’s tweets by search engines. lion URLs (links to web pages) daily [3, 28]. In this paper, we first investigate link farming in the Twit- As the information shared over Twitter grows rapidly, ter network and then explore mechanisms to discourage the search is increasingly being used to find interesting trending activity. To this end, we conducted a detailed analysis of topics and recent news [26]. As Twitter becomes more acces- links acquired by over 40,000 spammer accounts suspended sible via search, it has also started to attract the attention by Twitter. We find that link farming is wide spread and of spammers, who strive to get their tweets appear near the that a majority of spammers’ links are farmed from a small top of the search results. Search engines rank tweets based fraction of Twitter users, the social capitalists, who are not only on the content of the tweet, but also on how influen- themselves seeking to amass social capital and links by fol- tial the user who posted the tweet is [25]. The exact details lowing back anyone who follows them. Our findings shed of the influence metric depend on the search engine, but all light on the social dynamics that are at the root of the link of them critically depend on the user’s connectivity in the farming problem in Twitter network and they have impor- social graph. The more followers a user has, the more likely tant implications for future designs of link spam defenses. In his tweets are to be ranked highly. So spammers attempt to particular, we show that a simple user ranking scheme that enhance their influence score (and thus the ranking of their penalizes users for connecting to spammers can effectively tweets) by acquiring links in the social network. Similar address the problem by disincentivizing users from linking to the Web, where some websites exchange reciprocal links with other users simply to gain influence. with other sites to improve their ranking by search engines, spammers try to infiltrate the Twitter network by building social relationships – they follow other users and try to get Categories and Subject Descriptors others to follow them. We refer to this process of reciprocal H.3.5 [Online Information Services]: Web-based ser- exchange of links between unrelated users to gain influence vices; C.2.0 [Computer-Communication Networks]: in the network as link farming. General—Security and protection While link farming in the Web graph has been well stud- ied and understood [8, 14, 30], there is no existing work on Keywords link farming in the Twitter social network to the best of our knowledge. Furthermore, unlike the Web, where a link Twitter, spam, link farming, Pagerank, Collusionrank from web page A to web-page B implies that B’s content is relevant to A’s content, the meaning of (or the reason for 1. INTRODUCTION establishing) a social link between two users is unknown to Recently, the Twitter social network has emerged as a pop- anyone but the users themselves. This makes it consider- ular platform for discovering real-time information on the ably harder to detect and analyze link farming activities in Twitter. Copyright is held by the International World Wide Web Conference Com- mittee (IW3C2). Distribution of these papers is limited to classroom use, In this paper, we investigate the vulnerability of the Twit- and personal use by others. ter social network to link farming. Specifically, we focus WWW 2012, April 16–20, 2012, Lyon, France ACM 978-1-4503-1229-5/12/04. 61 WWW 2012 – Session: Security and Fraud in Social Networks April 16–20, 2012, Lyon, France on better understanding the users who establish links to studied the structure of link farms and how the pages in the spammers and the potential reasons for their behavior. To farms can be interconnected to optimize rankings [14]. this end, we gathered data of 41,352 spammer accounts sus- Several solutions to counter link farming have also been pended by Twitter and conduct a detailed analysis of the proposed; these solutions fall under two main categories – users who connect to them.1 We also used extensive data techniques which leverage only the properties of the link from a previous measurement study that included a com- structure, and those which use the content of the web-pages plete snapshot of the Twitter network and the complete his- along with the link structure. tory of tweets posted by all users as of August 2009 [9]. Link-based statistics were used by Becchetti et al. [5] to Our analysis reveals surprising social dynamics that drive build a classifier for automatic detection of Web-spam. Gy- link farming in Twitter. When we started the study, we ex- ongyi et al. proposed the Trustrank algorithm [15] to combat pected that spammers in Twitter would be farming links in web spam, where the basic assumption is that good pages two ways: first, by targeting (following) lay Twitter users usually link to other good pages; hence they start by assign- with very few followers, who then reciprocate out of social ing high scores to a set of known good pages, and then prop- etiquette [12], and second, from other spammers and fake agate the good ranks in a way similar to Pagerank. Some accounts (Sybils) that have been explicitly created for the algorithms that are inversions of Trustrank have also been purpose of farming links. In sharp contrast to our expecta- proposed to identify bad (spam) pages. An algorithm known tion, we found that a majority of farmed links come from as BadRank is believed to be used by a commercial search a small number (100,000 or so) of legitimate, popular, and engine to identify and blacklist pages which link to spam highly active Twitter users. This is very different from the pages [24]. Wu et al. [30] proposed an algorithm that ini- Web, where popular pages would rarely point to spam pages. tially identifies a set of bad pages based on the common link We conjecture that the Twitter users engaging in link set between incoming and outgoing links of webpages, and farming are social capitalists, whose goal is to amass so- then expands this set by marking a page as bad if it links cial capital and promote their legitimate content on Twitter. to more than a certain number of other bad pages. Wu et Examples of social capitalists range from popular bloggers al. also proposed methods of combining the trust and dis- of social media and Internet technologies to celebrities like trust scores of pages to demote spam pages in the Web [31]. Britney Spears and from politicians like Barack Obama to In Section 5, we show that a similar approach is effective businesses like JetBlue airways. We show that social capi- in the Twitter social network as well, in demoting not only talists tend to reciprocate (i.e., follow back) to anyone who spammers but also the link-farmers who frequently follow connects to them, to increase their social capital. Unfortu- spammers. nately, spammers exploit this behavior of capitalists to farm Examples of methods to counter link-farms, that utilize links in the Twitter network and promote spam content. both the link structure and webpage content, include [10] Finally, we explore mechanisms to deter link farming in which uses the Document Object Model along with the hy- the future. We argue that any effective solution to fight perlinks to beat nepotistic ‘clique attacks’. Davison identi- link spam should take into consideration the current incen- fied nepotistic links on the web by using a rule-based clas- tive structure of the Twitter network that encourages social sifier on features based on the content and link structure of capitalists to collude with other social capitalists, includ- the pages [11]. Castillo et al. [8] also combined link-based ing users who they might not know. Inspired by ideas from and content-based features to build a spam classifier using spam-defense strategies proposed for the Web graph, we pro- the idea that hosts that are well-linked together are likely pose a ranking system, called Collusionrank that penalizes to have the same class label (spam or non-spam).

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us