WarningBird: Detecting Suspicious URLs in Twitter Stream

نویسندگان

  • Sangho Lee
  • Jong Kim
چکیده

Twitter can suffer from malicious tweets containing suspicious URLs for spam, phishing, and malware distribution. Previous Twitter spam detection schemes have used account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. Malicious users, however, can easily fabricate account features. Moreover, extracting relation features from the Twitter graph is time and resource consuming. Previous suspicious URL detection schemes have classified URLs using several features including lexical features of URLs, URL redirection, HTML content, and dynamic behavior. However, evading techniques exist, such as time-based evasion and crawler evasion. In this paper, we propose WARNINGBIRD, a suspicious URL detection system for Twitter. Instead of focusing on the landing pages of individual URLs in each tweet, we consider correlated redirect chains of URLs in a number of tweets. Because attackers have limited resources and thus have to reuse them, a portion of their redirect chains will be shared. We focus on these shared resources to detect suspicious URLs. We have collected a large number of tweets from the Twitter public timeline and trained a statistical classifier with features derived from correlated URLs and tweet context information. Our classifier has high accuracy and low false-positive and falsenegative rates. We also present WARNINGBIRD as a realtime system for classifying suspicious URLs in the Twitter stream. ∗This research was supported by the MKE (The Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the NIPA (National IT Industry Promotion Agency) (NIPA-2011-C1090-1131-0009) and World Class University program funded by the Ministry of Education, Science and Technology through the National Research Foundation of Korea(R31-10100).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed System for Detecting Phishing and Mail Alert based Malicious Tweet URLs Blocker in a Twitter Stream

Twitter is a hugely well-liked famous social network where people exchanges messages of 140 characters called tweets. Because of short content size, and use of URL, it is difficult to detect phishing on Twitter unlike emails. Ease of information exchange large audience makes Twitter as a popular medium to spread external content like articles, videos, and photographs by embedding URLs in tweets...

متن کامل

Mail_Alert: Online Suspicious URL Detection of Tweets from Twitter Public Timeline

Twitter, a famous social networking site where thousands of users use it to tweet to the world, is prone to spam, phishing, and malware distribution. Tweets are the atomic building blocks of Twitter, 140-character status updates with additional associated metadata. People tweet for a variety of reasons about a multitude of topics. Traditional spam detection scheme for twitter are ineffective ag...

متن کامل

Suspicious URL detection system using SGD Algorithm for twitter stream

Twitter is a one of the most popular social networking site used by millions of people in the world. As the usage growing rapidly in the recent years, attackers are concentrating more on twitter to gather personnel data and made changes to. It leads to the diminishing the privacy of the users. The attacker tweets suspicious URLs on the user’s timeline. These URLs contains spam, phishing and mal...

متن کامل

Performance Analysis of Classification Techniques for Suspicious URL Detection in Social Networks

Social network services (SNSs) are increasing popular. Now a day’s most of the people in all over the world use Facebook, twitter for sharing their ideas. Though suspicious users collectively use by them to embed to harmful activities that may be tricky in securing user's personal information and data. This is challenge for social networks to rectify this type of security breach. The social net...

متن کامل

Detecting Non-personal and Spam Users on Geo-tagged Twitter Network

With the rapid growth and popularity of mobile devices and location-aware technologies, online social networks such as Twitter have become an important data source for scientists to conduct geo-social network research. Non-personal accounts, spam users and junk tweets, however, pose severe problems to the extraction of meaningful information and the validation of any research findings on tweets...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012