Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective

被引:41
作者
Shah, Neil [1 ]
Beutel, Alex [1 ]
Gallagher, Brian [2 ]
Faloutsos, Christos [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Lawrence Livermore Lab, Livermore, CA USA
来源
2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM) | 2014年
关键词
D O I
10.1109/ICDM.2014.36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales. Web services and social networks which incentivize popularity thus suffer from a major problem of fake connections from link fraudsters looking to make a quick buck. Typical methods of catching this suspicious behavior use spectral techniques to spot large groups of often blatantly fraudulent (but sometimes honest) users. However, small-scale, stealthy attacks may go unnoticed due to the nature of low-rank eigenanalysis used in practice. In this work, we take an adversarial approach to find and prove claims about the weaknesses of modern, state-of-the-art spectral methods and propose FBOX, an algorithm designed to catch small-scale, stealth attacks that slip below the radar. Our algorithm has the following desirable properties: (a) it has theoretical underpinnings, (b) it is shown to be highly effective on real data and (c) it is scalable (linear on the input size). We evaluate FBOX on a large, public 41.7 million node, 1.5 billion edge who-follows-whom social graph from Twitter in 2010 and with high precision identify many suspicious accounts which have persisted without suspension even to this day.
引用
收藏
页码:959 / 964
页数:6
相关论文
共 15 条
[1]  
Akoglu L, 2010, LECT NOTES ARTIF INT, V6119, P410
[2]  
[Anonymous], 2013, PROC 7 ACM C RECOMME
[3]  
Beutel A., 2013, P 22 INT C WORLD WID, P119, DOI DOI 10.1145/2488388.2488400
[4]  
Erdos P., 1959, PUBL MATH-DEBRECEN, V6, P290, DOI DOI 10.5486/PMD.1959.6.3-4.12
[5]  
Ghosh S., 2012, P 21 INT C WORLD WID, P61, DOI DOI 10.1145/2187836.2187846
[6]   @spam: The Underground on 140 Characters or Less [J].
Grier, Chris ;
Thomas, Kurt ;
Paxson, Vern ;
Zhang, Michael .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :27-37
[7]  
Jiang M., 2014, PAKDD
[8]  
Kwak H, 2010, P 19 INT C WORLD WID, P591, DOI DOI 10.1145/1772690.1772751
[9]  
Leskovec J, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1361
[10]  
Lowd D., 2005, P 11 ACM SIGKDD INT, P641