skip to main content
10.1145/3217804.3217919acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmsocietyConference Proceedingsconference-collections
short-paper

Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example

Published:18 July 2018Publication History

ABSTRACT

Recent studies have revealed that cyber criminals tend to exchange knowledge about cyber attacks in online social networks (OSNs). Cyber security experts are another set of information providers on OSNs who frequently share information about cyber security incidents and their personal opinions and analyses. Therefore, in order to improve our knowledge about evolving cyber attacks and the underlying human behavior for different purposes (e.g., crime investigation, understanding career development of cyber criminals and cyber security professionals, detection of impeding cyber attacks), it will be very useful to detect cyber security related accounts on OSNs automatically, and monitor their activities. This paper reports our preliminarywork on automatic detection of cyber security related accounts on OSNs using Twitter as an example. Three machine learning based classification algorithms were applied and compared: decision trees, random forests, and SVM (support vector machines). Experimental results showed that both decision trees and random forests had performed well with an overall accuracy over 95%, and when random forests were used with behavioral features the accuracy had reached as high as 97.877%.

References

  1. Zahra Ashktorab, Christopher Brown, Manojit Nandi, and Aron Culotta. Tweedr: Mining Twitter to inform disaster response. In Proceedings of the 11th International Conference on Information Systems for Crisis Response and Management Conference (ISCRAM 2014), 2014.Google ScholarGoogle Scholar
  2. Kathy Lee, Ankit Agrawal, and Alok Choudhary. Real-time disease surveillance using Twitter data: Demonstration on flu and cancer. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2013), pages 1474--1477. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alan Ritter, Oren Etzioni, and Sam Clark. Open domain event extraction from Twitter. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2012), pages 1104--1112. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Marco Pennacchiotti and Ana-Maria Popescu. Democrats, republicans and Starbucks afficionados: User classification in Twitter. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2011), pages 430--438. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC 2010), pages 1--9. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Kyumin Lee, James Caverlee, and Steve Webb. Uncovering social spammers: Social honeypots + machine learning. In Proceedings of the 33rd International ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR 2010), pages 435--442. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. Detecting spammers on Twitter. In Proceedings of 7th Annual Collaboration, Electronic messaging, Anti- Abuse and Spam Conference (CEAS 2010), 2010.Google ScholarGoogle Scholar
  8. Bo Wang, Arkaitz Zubiaga, Maria Liakata, and Rob Procter. Making the most of tweet-inherent features for social spam detection on Twitter. ArXiv e-prints, 2015.Google ScholarGoogle Scholar
  9. Reema Aswani, Arpan Kumar Kar, and P. Vigneswara Ilavarasan. Detection of spammers in Twitter marketing: A hybrid approach using social media analytics and bio inspired computing. Information Systems Frontiers, 2017:1--16, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kayode Sakariyah Adewole, Nor Badrul Anuar, Amirrudin Kamsin, and Arun Kumar Sangaiah. SMSAD: a framework for spam message and spam account detection. Multimedia Tools and Applications, pages 1--36, 2017.Google ScholarGoogle Scholar
  11. Kuo-Chan Lee, Chih-Hung Hsieh, Li-Jia Wei, Ching-Hao Mao, Jyun-Han Dai, and Yu-Ting Kuang. Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation. Soft Computing, 21(11):2883--2896, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Raymond Y. K. Lau, Yunqing Xia, and Yunming Ye. A probabilistic generative model for mining cybercriminal networks from online social media. IEEE Computational Intelligence Magazine, 9(1):31--43, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825--2830, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Raymond Y. K. Lau, Yunqing Xia, and Yunming Ye. A probabilistic generative model for mining cybercriminal networks from online social media. IEEE Computational Intelligence Magazine, 9(1):31--43, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SMSociety '18: Proceedings of the 9th International Conference on Social Media and Society
          July 2018
          405 pages
          ISBN:9781450363341
          DOI:10.1145/3217804

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 July 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate78of189submissions,41%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader