WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream

被引:110
作者
Lee, Sangho [1 ]
Kim, Jong [2 ]
机构
[1] Pohang Univ Sci & Technol POSTECH, Dept Comp Sci & Engn, Pohang, South Korea
[2] Pohang Univ Sci & Technol POSTECH, Div IT Convergence Engn, Pohang, South Korea
基金
新加坡国家研究基金会;
关键词
Suspicious URL; twitter; URL redirection; conditional redirection; classification;
D O I
10.1109/TDSC.2013.3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. These detection schemes are ineffective against feature fabrications or consume much time and resources. Conventional suspicious URL detection schemes utilize several features including lexical features of URLs, URL redirection, HTML content, and dynamic behavior. However, evading techniques such as time-based evasion and crawler evasion exist. In this paper, we propose WARNINGBIRD, a suspicious URL detection system for Twitter. Our system investigates correlations of URL redirect chains extracted from several tweets. Because attackers have limited resources and usually reuse them, their URL redirect chains frequently share the same URLs. We develop methods to discover correlated URL redirect chains using the frequently shared URLs and to determine their suspiciousness. We collect numerous tweets from the Twitter public timeline and build a statistical classifier using them. Evaluation results show that our classifier accurately and efficiently detects suspicious URLs. We also present WARNINGBIRD as a near real-time system for classifying suspicious URLs in the Twitter stream.
引用
收藏
页码:183 / 195
页数:13
相关论文
共 40 条
[1]  
[Anonymous], 2008, P 15 NETW DISTR SYST
[2]  
[Anonymous], 2011, P 8 ANN COLL EL MESS
[3]  
[Anonymous], 2010, P 19 INT WORLD WID W
[4]  
[Anonymous], 2011, P 14 INT S REC ADV I
[5]  
[Anonymous], 2009, P 26 INT C MACH LEAR
[6]  
Antoniades D., 2011, P 20 INT WORLD WID W
[7]  
Benevenuto F., 2010, P 7 COLL EL MESS ANT
[8]  
Canali Davide, 2011, P 20 INT WORLD WID W
[9]  
Chen YW, 2006, STUD FUZZ SOFT COMP, V207, P315
[10]  
Chu Z, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P21