Exploration of gaps in Bitly's spam detection and relevant counter measures
نویسندگان
چکیده
Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening gained a lot of traction. URL shorteners take as input a long URL and give a short URL with the same landing page in return. With its immense popularity over time, it has become a prime target for the attackers giving them an advantage to conceal malicious content. Bitly, a leading service in this domain alone shortens close to 80 million links each day, and marks 2-3 million as suspicious every week. 1 Some recent research highlights that services from Bitly are being exploited heavily to carry out phishing attacks, work from home scams, pornographic content propagation, etc. In year 2012, one major attack happened in which the U.S. federal government’s official short link service usa.gov (in collaboration with Bitly) was hijacked to spread work from home scam. 2 Such attacks which targets seemingly secure and highly trusted web sources look alarming and also bring to light the massive impact of exploiting the shortening services. All this imposes additional performance pressure on Bitly and other URL shorteners to be able to detect and take a timely action against the illegitimate content. It therefore becomes important to inspect and identify the root cause and gaps in the implementation of Bitly leading to such attacks. Over the years, multiple defense mechanisms have been set up to handle traditional long URL spam but detection of short URL spam at zero hour still remains a challenging task. In this study, we analyzed a dataset marked as suspicious by Bitly in the month of October 2013 to highlight some ground issues in their spam detection mechanism. Our results reveal the inefficiency of Bitly in using some spam detection services that it claims to use. We also show as to how a suspicious Bitly account goes unnoticed despite of a prolonged recurrent illegitimate activity. Bitly only displays a warning page on identification of suspicious links, but we observed this approach to be weak in controlling the overall problem of spam. In addition, we identified some short URL based features and coupled them with two domain specific features to classify a Bitly URL as malicious / benign. Short URL based feature set that we used comprises of click dependent as well as click independent metrics, thus our algorithm can also identify a malicious Bitly URL even before it is actually clicked. The proposed solution is independent of any available blacklists or lexical URL based features. We used standard machine learning classification techniques and were able to detect malicious Bitly URLs with a maximum accuracy of 86.41%. Although our algorithm is designed specific to Bitly, but we believe that it can be easily extended and used by any other URL shortening services. To the best of our knowledge, this is the first attempt to underline loopholes in security mechanisms of the most popular URL shortening service by analyzing only content the service itself marks as suspicious, and proposing a suitable countermeasure. 3 http://blog.bitly.com/post/138381844/spam-and-malware-protection http://www.pcworld.com/article/2012800/spammers-abuse-gov-url-shortener-service-in-workathome-scams. html We have also interacted with ‘Brian Eoff’ (Lead Data Scientist at Bitly) by sharing our analysis and getting his reactions.
منابع مشابه
An Effective Model for SMS Spam Detection Using Content-based Features and Averaged Neural Network
In recent years, there has been considerable interest among people to use short message service (SMS) as one of the essential and straightforward communications services on mobile devices. The increased popularity of this service also increased the number of mobile devices attacks such as SMS spam messages. SMS spam messages constitute a real problem to mobile subscribers; this worries telecomm...
متن کاملExploration of gaps in Bitly ’ s spam detection and relevant counter measures Student
Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening gained a lot of traction. URL shorteners take as input a long URL and give a short URL with the same landing page in return. With ...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملA New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection
Emails are one of the fastest economic communications. Increasing email users has caused the increase of spam in recent years. As we know, spam not only damages user’s profits, time-consuming and bandwidth, but also has become as a risk to efficiency, reliability, and security of a network. Spam developers are always trying to find ways to escape the existing filters therefore new filters to de...
متن کاملMoving dispersion method for statistical anomaly detection in intrusion detection systems
A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1405.1511 شماره
صفحات -
تاریخ انتشار 2014