Can You Spot the Fakes? On the Limitations of User Feedback in Online Social Networks

被引:13
作者
Freeman, David Mandell [1 ]
机构
[1] Linkedln Corp, Sunnyvale, CA 94085 USA
来源
PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17) | 2017年
关键词
Social networks; spam detection; online trust; fake accounts; reputation systems; TRUST;
D O I
10.1145/3038912.3052706
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks (OSNs) are appealing platforms for spammers and fraudsters, who typically use fake or compromised accounts to connect with and defraud real users. To combat such abuse, OSNs allow users to report fraudulent profiles or activity. The OSN can then use reporting data to review and/or limit activity of reported accounts. Previous authors have suggested that an OSN can augment its takedown algorithms by identifying a "trusted set" of users whose reports are weighted more heavily in the disposition of flagged accounts. Such identification would allow the OSN to improve both speed and accuracy of fake account detection and thus reduce the impact of spam on users. In this work we provide the first public, data-driven assessment of whether the above assumption is true: are some users better at reporting than others? Specifically, is reporting skill both measurable, i.e., possible to distinguish from random guessing; and repeatable, i.e., persistent over repeated sampling? Our main contributions are to develop a statistical framework that describes these properties and to apply this framework to data from LinkedIn, the professional social network. Our data includes member reports of fake profiles as well as the more voluminous, albeit weaker, signal of member responses to connection requests. We find that members demonstrating measurable, repeatable skill in identifying fake profiles do exist but are rare: at most 2.4% of those reporting fakes and at most 1.3% of those rejecting connection requests. We conclude that any reliable "trusted set" of members will be too small to have noticeable impact on spam metrics.
引用
收藏
页码:1093 / 1102
页数:10
相关论文
共 30 条
[1]  
[Anonymous], 2004, P 13 INT C WORLD WID, DOI DOI 10.1145/988672.988727
[2]  
[Anonymous], 2015, P 8 ACM WORKSH ART I, DOI DOI 10.1145/2808769.2808779
[3]  
[Anonymous], 2009, NDSS
[4]   A NEW TEST FOR 2X2 TABLES [J].
BARNARD, GA .
NATURE, 1945, 156 (3954) :177-177
[5]  
Bonneau J., 2015, COMMUN ACM
[6]   Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google [J].
Bonneau, Joseph ;
Bursztein, Elie ;
Caron, Ilan ;
Jackson, Rob ;
Williamson, Mike .
PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW 2015), 2015, :141-150
[7]   Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild [J].
Bursztein, Elie ;
Benko, Borbala ;
Margolis, Daniel ;
Pietraszek, Tadek ;
Archer, Andy ;
Aquino, Allan ;
Pitsillidis, Andreas ;
Savage, Stefan .
PROCEEDINGS OF THE 2014 ACM INTERNET MEASUREMENT CONFERENCE (IMC'14), 2014, :347-358
[8]  
Cao Q., 2012, NDSI
[9]  
Cao Q., 2013, CSTR201205
[10]   TruSMS: A trustworthy SMS spam control system based on trust management [J].
Chen, Liang ;
Yan, Zheng ;
Zhang, Weidong ;
Kantola, Raimo .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 :77-93