Serf and turf: crowdturfing for fun and profit

作者: Gang Wang , Christo Wilson , Xiaohan Zhao , Yibo Zhu , Manish Mohanlal

DOI: 10.1145/2187836.2187928

关键词: Computer scienceThe InternetProfit (economics)Computer securityCrowdsourcing

摘要: Popular Internet services in recent years have shown that remarkable things can be achieved by harnessing the power of masses using crowd-sourcing systems. However, systems also pose a real challenge to existing security mechanisms deployed protect services. Many these techniques rely on assumption malicious activity is generated automatically automated programs. Thus they would perform poorly or easily bypassed when attacks are users working system. Through measurements, we found surprising evidence showing not only do exist, but rapidly growing both user base and total revenue. We describe this paper significant effort study understand "crowdturfing" today's Internet. use detailed crawls extract data about size operational structure crowdturfing analyze details campaigns offered performed sites, evaluate their end-to-end effectiveness running active, benign our own. Finally, compare source workers sites different countries. Our results suggest highly effective at reaching users, continuing growth poses concrete threat online communities US elsewhere.

参考文章(24)
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, Virg ´ ilio Almeida, Detecting Spammers on Twitter ,(2010)
Jacob Ratkiewicz, Alessandro Flammini, Mark Meiss, Michael D. Conover, Filippo Menczer Menczer, Bruno Goncalves, Detecting and Tracking Political Abuse in Social Media international conference on weblogs and social media. ,(2011)
Panagiotis G. Ipeirotis, Demographics of Mechanical Turk Social Science Research Network. ,(2010)
Geoffrey M. Voelker, Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Dirty jobs: the role of freelance labor in web service abuse usenix security symposium. pp. 14- 14 ,(2011)
Ben Y. Zhao, Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Detecting and characterizing social spam campaigns internet measurement conference. pp. 35- 47 ,(2010) , 10.1145/1879141.1879147
Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna, Detecting spammers on social networks annual computer security applications conference. pp. 1- 9 ,(2010) , 10.1145/1920261.1920263
Alex Hai Wang, Don't follow me: Spam detection in Twitter international conference on security and cryptography. pp. 142- 151 ,(2010)
Nitin Jindal, Bing Liu, Opinion spam and analysis web search and data mining. pp. 219- 230 ,(2008) , 10.1145/1341531.1341560
Jim Giles, Inside Facebook's massive cyber-security system New Scientist. ,vol. 212, pp. 21- 22 ,(2011) , 10.1016/S0262-4079(11)62643-2
Nitin Jindal, Bing Liu, Ee-Peng Lim, Finding unusual review patterns using unexpected rules Proceedings of the 19th ACM international conference on Information and knowledge management - CIKM '10. pp. 1549- 1552 ,(2010) , 10.1145/1871437.1871669