SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Privacy and Security in Online
Social Media
Course on NPTEL
NOC-CS07
Week 6.2
Ponnurangam Kumaraguru (“PK”)
Associate Professor
ACM Distinguished Speaker
fb/ponnurangam.kumaraguru, @ponguru
Link farming
⚫Search engines rank websites / webpages
based on graph metrics such as Pagerank
-High in-degree helps to get high Pagerank
⚫Link farming in Web
-Websites exchange reciprocal links with other
sites to improve ranking by search engines
2
Link farming
⚫A link farm is a form of spamming the index
of a search engine (sometimes called
spamdexing or spamexing).
3
Why link farming in Twitter?
⚫Twitter has become a Web within the Web
- Vast amounts of information and real-time news
- Twitter search becoming more and more common
- Search engines rank users by follower-rank,
Pagerank to decide whose tweets to return as
search results
- High indegree (#followers) seen as a metric of
influence
- Klout score influenced by Twitter indegree
⚫Link farming in Twitter
- Spammers follow other users and attempt to get
them to follow back (Reciprocity)
Link farming in Web & Twitter similar?
⚫Motivation is similar
-Higher indegree will give better ranks in search
results
⚫Who engages in link farming?
-Web – spammers
-Twitter – spammers + many legitimate, popular
users !!!
⚫Additional factors in Twitter
-‘Following back’ considered a social etiquette
Spam in Twitter
⚫ “five spam campaigns controlling 145 thousand accounts combined are
able to persist for months at a time, with each campaign enacting a
unique spamming strategy.”
7
Spam in Twitter
⚫ “We find that 8% of 25 million URLs posted to the site point to phishing,
malware, and scams listed on popular blacklists.”
⚫ “We find that Twitter is a highly successful platform for coercing users to visit
spam pages, with a clickthrough rate of 0.13%, compared to much lower rates
previously reported for email spam”
8
Spam in Twitter
⚫ “finding that 16% of active accounts exhibit a high degree of automation.”
⚫ “find that 11% of accounts that appear to publish exclusively through the
browser are in fact automated accounts that spoof the source of the updates.”
9
Dataset
⚫Complete snapshot of Twitter, 2009
⚫54 million users, 1.9 billion links! Largest
dataset!
10
Nodes
11
Spammers
⚫379,340 accounts has been suspended in the
interval, Aug 09 – Feb 11
-Spam-activity or long inactivity
⚫41,352 suspended accounts posted at least
one blacklisted URL shortened by bitly,
tinyurl
12
Spammers
⚫# of spam-targets, spam-followers, their
overlap
⚫82% of spam followers overlap with the
spam-targets
13
Spammers
⚫# of spammers who rank within the top K
according to pagerank
14
Spammers
⚫# of spammers who rank within the top K
according to pagerank
⚫7 spammers rank within 10,000, 304 within
100,000 and 2,131 within 1million
15
Thank you
pk@iiitd.ac.in
precog.iiitd.edu.in
fb/ponnurangam.kumaraguru

Weitere ähnliche Inhalte

Was ist angesagt?

Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
Stu Hirst
 
Digital Editors Network
Digital Editors NetworkDigital Editors Network
Digital Editors Network
guest38a088
 
Google Analytics in the age of not provided Search Fest 2014
Google Analytics in the age of not provided   Search Fest 2014Google Analytics in the age of not provided   Search Fest 2014
Google Analytics in the age of not provided Search Fest 2014
Timothy Resnik
 

Was ist angesagt? (15)

DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
 
Inference attack on browsing history of twitter users using public click anal...
Inference attack on browsing history of twitter users using public click anal...Inference attack on browsing history of twitter users using public click anal...
Inference attack on browsing history of twitter users using public click anal...
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
 
A little bird told me
A little bird told meA little bird told me
A little bird told me
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 ChicagoIf You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
 
The Most Common Failure With Today's Defences
The Most Common Failure With Today's DefencesThe Most Common Failure With Today's Defences
The Most Common Failure With Today's Defences
 
Digital Editors Network
Digital Editors NetworkDigital Editors Network
Digital Editors Network
 
Benefit’s of Tracking Twitter Followers
Benefit’s of  Tracking Twitter FollowersBenefit’s of  Tracking Twitter Followers
Benefit’s of Tracking Twitter Followers
 
ISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better EmailsISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better Emails
 
Google Analytics in the age of not provided Search Fest 2014
Google Analytics in the age of not provided   Search Fest 2014Google Analytics in the age of not provided   Search Fest 2014
Google Analytics in the age of not provided Search Fest 2014
 
Infographic for OragneFizz Social Media Analysis Report
Infographic for OragneFizz Social Media Analysis ReportInfographic for OragneFizz Social Media Analysis Report
Infographic for OragneFizz Social Media Analysis Report
 
How to perform Google Analytics magic
How to perform Google Analytics magicHow to perform Google Analytics magic
How to perform Google Analytics magic
 
Ways to protect your data from hacking
Ways to protect your data from hackingWays to protect your data from hacking
Ways to protect your data from hacking
 

Andere mochten auch

Andere mochten auch (13)

Week 6.1: eCrime
Week 6.1: eCrimeWeek 6.1: eCrime
Week 6.1: eCrime
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 3
Privacy and Security in Online Social Media : Policing and Social Media - Part 3Privacy and Security in Online Social Media : Policing and Social Media - Part 3
Privacy and Security in Online Social Media : Policing and Social Media - Part 3
 
Week 7.2 Nudges
Week 7.2 NudgesWeek 7.2 Nudges
Week 7.2 Nudges
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Week 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear PhishingWeek 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear Phishing
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
 
Privacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : IncidentsPrivacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : Incidents
 
Privacy and Security in Online Social Media : OSM APIs and tools for data col...
Privacy and Security in Online Social Media : OSM APIs and tools for data col...Privacy and Security in Online Social Media : OSM APIs and tools for data col...
Privacy and Security in Online Social Media : OSM APIs and tools for data col...
 
Privacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSMPrivacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSM
 
Privacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social MediaPrivacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social Media
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
 
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to coursePrivacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to course
 
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
 

Ähnlich wie Week 6.2: eCrime

New world of e communications
New world of e communicationsNew world of e communications
New world of e communications
Andy Zellers
 

Ähnlich wie Week 6.2: eCrime (20)

Become A Twitter Ninja
Become A Twitter NinjaBecome A Twitter Ninja
Become A Twitter Ninja
 
Web spam
Web spamWeb spam
Web spam
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
 
Online Marketing 101
Online Marketing 101Online Marketing 101
Online Marketing 101
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
New world of e communications
New world of e communicationsNew world of e communications
New world of e communications
 
Outreach Digital - How to structure a digital PR campaign
Outreach Digital - How to structure a digital PR campaignOutreach Digital - How to structure a digital PR campaign
Outreach Digital - How to structure a digital PR campaign
 
How to structure a digital PR campaign
How to structure a digital PR campaignHow to structure a digital PR campaign
How to structure a digital PR campaign
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011
 
Nonprofit Crowdfunding - How to Win Friends and Influence Donors
Nonprofit Crowdfunding - How to Win Friends and Influence DonorsNonprofit Crowdfunding - How to Win Friends and Influence Donors
Nonprofit Crowdfunding - How to Win Friends and Influence Donors
 
Linkedin And Twitter
Linkedin And TwitterLinkedin And Twitter
Linkedin And Twitter
 
Using Analytics To Investigate, Evaluate & Decide
Using Analytics To Investigate, Evaluate & DecideUsing Analytics To Investigate, Evaluate & Decide
Using Analytics To Investigate, Evaluate & Decide
 

Mehr von IIIT Hyderabad

Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad
 

Mehr von IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Kürzlich hochgeladen

Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 

Kürzlich hochgeladen (20)

Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazine
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 
The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANY
 
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 

Week 6.2: eCrime

  • 1. Privacy and Security in Online Social Media Course on NPTEL NOC-CS07 Week 6.2 Ponnurangam Kumaraguru (“PK”) Associate Professor ACM Distinguished Speaker fb/ponnurangam.kumaraguru, @ponguru
  • 2. Link farming ⚫Search engines rank websites / webpages based on graph metrics such as Pagerank -High in-degree helps to get high Pagerank ⚫Link farming in Web -Websites exchange reciprocal links with other sites to improve ranking by search engines 2
  • 3. Link farming ⚫A link farm is a form of spamming the index of a search engine (sometimes called spamdexing or spamexing). 3
  • 4. Why link farming in Twitter? ⚫Twitter has become a Web within the Web - Vast amounts of information and real-time news - Twitter search becoming more and more common - Search engines rank users by follower-rank, Pagerank to decide whose tweets to return as search results - High indegree (#followers) seen as a metric of influence - Klout score influenced by Twitter indegree ⚫Link farming in Twitter - Spammers follow other users and attempt to get them to follow back (Reciprocity)
  • 5. Link farming in Web & Twitter similar? ⚫Motivation is similar -Higher indegree will give better ranks in search results ⚫Who engages in link farming? -Web – spammers -Twitter – spammers + many legitimate, popular users !!! ⚫Additional factors in Twitter -‘Following back’ considered a social etiquette
  • 6. Spam in Twitter ⚫ “five spam campaigns controlling 145 thousand accounts combined are able to persist for months at a time, with each campaign enacting a unique spamming strategy.” 7
  • 7. Spam in Twitter ⚫ “We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blacklists.” ⚫ “We find that Twitter is a highly successful platform for coercing users to visit spam pages, with a clickthrough rate of 0.13%, compared to much lower rates previously reported for email spam” 8
  • 8. Spam in Twitter ⚫ “finding that 16% of active accounts exhibit a high degree of automation.” ⚫ “find that 11% of accounts that appear to publish exclusively through the browser are in fact automated accounts that spoof the source of the updates.” 9
  • 9. Dataset ⚫Complete snapshot of Twitter, 2009 ⚫54 million users, 1.9 billion links! Largest dataset! 10
  • 11. Spammers ⚫379,340 accounts has been suspended in the interval, Aug 09 – Feb 11 -Spam-activity or long inactivity ⚫41,352 suspended accounts posted at least one blacklisted URL shortened by bitly, tinyurl 12
  • 12. Spammers ⚫# of spam-targets, spam-followers, their overlap ⚫82% of spam followers overlap with the spam-targets 13
  • 13. Spammers ⚫# of spammers who rank within the top K according to pagerank 14
  • 14. Spammers ⚫# of spammers who rank within the top K according to pagerank ⚫7 spammers rank within 10,000, 304 within 100,000 and 2,131 within 1million 15