Network Analysis of Recurring YouTube Spam Campaigns
نویسندگان
چکیده
As the popularity of content sharing websites has increased, they have become targets for spam, phishing and the distribution of malware. On YouTube, the facility for users to post comments can be used by spam campaigns to direct unsuspecting users to malicious third-party websites. In this paper, we demonstrate how such campaigns can be tracked over time using network motif profiling, i.e. by tracking counts of indicative network motifs. By considering all motifs of up to five nodes, we identify discriminating motifs that reveal two distinctly different spam campaign strategies, and present an evaluation that tracks two corresponding active campaigns.
منابع مشابه
Survey On Link Prediction In Facebook And Twitter
Social media have gained increased usage rapidly for a discrepancy of reasons. Participants were asked to view one of six mock Twitter.com pages that varied both the number of followers and the ratio between followers and follows on the page and report their perceived source worthy of trust. This research examines mediocre factors and speculative relevant contextual variables that affect sensat...
متن کاملIdentifying Discriminating Network Motifs in YouTube Spam
Like other social media websites, YouTube is not immune from the attention of spammers. In particular, evidence can be found of attempts to attract users to malicious thirdparty websites. As this type of spam is often associated with orchestrated campaigns, it has a discernible network signature, based on networks derived from comments posted by users to videos. In this paper, we examine exampl...
متن کاملUnder the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks
Cybercriminals abuse Online Social Networks (OSNs) to lure victims into a variety of spam. Among different spam types, a less explored area is OSN abuse that leverages the telephony channel to defraud users. Phone numbers are advertized via OSNs, and users are tricked into calling these numbers. To expand the reach of such scam / spam campaigns, phone numbers are advertised across multiple plat...
متن کاملA Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network resources and obfuscate their messages, an aggregated analysis of spam messages is not enough. Grouping spam messages into campaigns is important to unveil behaviors that cannot be noticed when looking at the whole set o...
متن کاملRestraining transmission of unsolicited bulk e-mail
Filtering large amounts of unsolicited bulk e-mail, also known as spam, is expensive. Either because of the time spent on manual deletion or complex analysis by algorithms putting heavy load on e-mail servers. Due to exponential growth of the volume of spam campaigns, Internet Service Providers (ISP’s) are increasingly forced to use rigorous rejection policies to prevent their filter servers fr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1201.3783 شماره
صفحات -
تاریخ انتشار 2012