Characterizing and automatically detecting crowdturfing in Fiverr and Twitter

作者: Kyumin Lee , Steve Webb , Hancheng Ge

DOI: 10.1007/S13278-014-0241-1

关键词:

摘要: As human computation on crowdsourcing systems has become popular and powerful for performing tasks, malicious users have started misusing these by posting propagating manipulated contents, targeting web services such as online social networks search engines. Recently, moved to Fiverr, a fast growing micro-task marketplace, where workers can post crowdturfing tasks (i.e., astroturfing campaigns run crowd workers) customers purchase those only $5. In this manuscript, we present comprehensive analysis of in Fiverr Twitter develop predictive models detect prevent Twitter. First, identify the most types found conduct case studies tasks. Second, build task detection classifiers filter them from becoming active marketplace. Our experimental results show that proposed classification approach effectively detects achieving 97.35 % accuracy. Third, analyze real-world impact purchasing quantifying their target site (Twitter). part analysis, current security inadequately crowdsourced manipulation, which confirms necessity our approach. Finally, characteristics paid workers, find distinguishing features between legitimate accounts, use workers. are able effectively, 99.29 %

参考文章(23)
James Caverlee, Kyumin Lee, Prithivi Tamilarasan, Crowdturfers, Campaigns, and Social Media: Tracking and Revealing Crowdsourced Manipulation of Social Media international conference on weblogs and social media. ,(2013)
Kyumin Lee, Brian David Eoff, James Caverlee, Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter international conference on weblogs and social media. ,(2011)
Mark A. Hall, Ian H. Witten, Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques ,(1999)
Vern Paxson, Chris Grier, Damon McCoy, Alek Kolcz, Kurt Thomas, Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse usenix security symposium. pp. 195- 210 ,(2013)
Geoffrey M. Voelker, Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Dirty jobs: the role of freelance labor in web service abuse usenix security symposium. pp. 14- 14 ,(2011)
Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao, Follow the green: growth and dynamics in twitter follower markets internet measurement conference. pp. 163- 176 ,(2013) , 10.1145/2504730.2504731
Yukino Baba, Hisashi Kashima, Kei Kinoshita, Goushi Yamaguchi, Yosuke Akiyoshi, Leveraging non-expert crowdsourcing workers for improper task detection in crowdsourcing marketplaces Expert Systems With Applications. ,vol. 41, pp. 2678- 2687 ,(2014) , 10.1016/J.ESWA.2013.11.011
Lisa A. Fast, David C. Funder, Personality as manifest in word use: correlations with self-report, acquaintance report, and behavior. Journal of Personality and Social Psychology. ,vol. 94, pp. 334- 346 ,(2008) , 10.1037/0022-3514.94.2.334
M. Allahbakhsh, B. Benatallah, A. Ignjatovic, H. R. Motahari-Nezhad, E. Bertino, S. Dustdar, Quality Control in Crowdsourcing Systems: Issues and Directions IEEE Internet Computing. ,vol. 17, pp. 76- 81 ,(2013) , 10.1109/MIC.2013.20
Cheng Chen, Kui Wu, Venkatesh Srinivasan, Xudong Zhang, Battling the internet water army: detection of hidden paid posters advances in social networks analysis and mining. pp. 116- 120 ,(2013) , 10.1145/2492517.2492637