Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks

作者: Haojin Zhu , Xiaohui Liang , Minhui Xue , Keith Ross , Shuang Hao

DOI:

关键词:

摘要: Popular User-Review Social Networks (URSNs)---such as Dianping, Yelp, and Amazon---are often the targets of reputation attacks in which fake reviews are posted order to boost or diminish ratings listed products services. These emanate from a collection accounts, called Sybils, collectively managed by group real users. A new advanced scheme, we term elite Sybil attacks, recruits organically highly-rated accounts generate seemingly-trustworthy realistic-looking reviews. taken together form large-scale sparsely-knit network for existing fake-review defense systems unlikely succeed. In this paper, conduct first study define, characterize, detect attacks. We show that contemporary have hybrid architecture, with tier recruiting workers distributing tasks organizers, second posting profit workers. design ElsieDet, three-stage detection separates out suspicious groups users, then identifies campaign windows, finally users participating campaigns. perform empirical on ten million far most popular URSN service China. Our results more spread temporally, craft convincing reviews, higher filter bypass rates. also measure impact campaigns various industries (such cinemas, hotels, restaurants) well chain stores, demonstrate monitoring over time can provide valuable early alerts against

参考文章(23)
Chandra Erdman, John W. Emerson, bcp: An R Package for Performing a Bayesian Analysis of Change Point Problems Journal of Statistical Software. ,vol. 23, pp. 1- 13 ,(2007) , 10.18637/JSS.V023.I03
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu, The socialbot network: when bots socialize for fame and money annual computer security applications conference. pp. 93- 102 ,(2011) , 10.1145/2076732.2076746
Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao, Innocent by association Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 353- 364 ,(2012) , 10.1145/2382196.2382235
Abigail Paradise, Rami Puzis, Asaf Shabtai, Anti-Reconnaissance Tools: Detecting Targeted Socialbots IEEE Internet Computing. ,vol. 18, pp. 11- 19 ,(2014) , 10.1109/MIC.2014.81
Fei Zhang, Patrick P. K. Chan, Battista Biggio, Daniel S. Yeung, Fabio Roli, Adversarial Feature Selection Against Evasion Attacks IEEE Transactions on Systems, Man, and Cybernetics. ,vol. 46, pp. 766- 777 ,(2016) , 10.1109/TCYB.2015.2415032
Michael Brückner, Tobias Scheffer, Christian Kanzow, Static prediction games for adversarial learning problems Journal of Machine Learning Research. ,vol. 13, pp. 2617- 2654 ,(2012)
Kurt Thomas, Chris Grier, Dawn Song, Vern Paxson, Suspended accounts in retrospect Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC '11. pp. 243- 258 ,(2011) , 10.1145/2068816.2068840
Anirudh Ramachandran, Nick Feamster, Santosh Vempala, Filtering spam with behavioral blacklisting computer and communications security. pp. 342- 351 ,(2007) , 10.1145/1315245.1315288
Paul Heymann, Georgia Koutrika, Hector Garcia-Molina, Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges IEEE Internet Computing. ,vol. 11, pp. 36- 45 ,(2007) , 10.1109/MIC.2007.125
Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim, Measuring the mixing time of social graphs internet measurement conference. pp. 383- 389 ,(2010) , 10.1145/1879141.1879191