Access the full text.
Sign up today, get DeepDyve free for 14 days.
Marti Motoyama, Damon McCoy, Kirill Levchenko, S. Savage, G. Voelker (2011)
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse
Steve Webb, James Caverlee, C. Pu (2008)
Social Honeypots: Making Friends With A Spammer Near You
G. Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, M. Mohanlal, Haitao Zheng, Ben Zhao (2011)
Serf and turf: crowdturfing for fun and profitProceedings of the 21st international conference on World Wide Web
Tao Stein, Erdong Chen, Karan Mangla (2011)
Facebook immune system
2008 IEEE Symposium on Security and Privacy SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Kyumin Lee, Brian Eoff, James Caverlee (2011)
Seven Months with the Devils: A Long-Term Study of Content Polluters on TwitterProceedings of the International AAAI Conference on Web and Social Media
Dinh Tran, Bonan Min, Jinyang Li, L. Subramanian (2009)
Sybil-Resilient Online Content Voting
Gabriel Magno, Tiago Rodrigues, Virgílio Almeida (2010)
Detecting Spammers on Twitter
Atif Nazir, Saqib Raza, C. Chuah, Burkhard Schipper (2010)
Ghostbusting Facebook: Detecting and Characterizing Phantom Profiles in Online Social Gaming Applications
Qiao Lian, Zheng Zhang, Mao Yang, Ben Zhao, Yafei Dai, Xiaoming Li (2007)
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System27th International Conference on Distributed Computing Systems (ICDCS '07)
Haifeng Yu, M. Kaminsky, Phillip Gibbons, A. Flaxman (2006)
SybilGuard: Defending Against Sybil Attacks via Social NetworksIEEE/ACM Transactions on Networking, 16
John Douceur (2002)
The Sybil Attack
J. Newsome, E. Shi, D. Song, A. Perrig (2004)
The Sybil attack in sensor networks: analysis & defensesThird International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004
Kurt Thomas, Chris Grier, D. Song, V. Paxson (2011)
Suspended accounts in retrospect: an analysis of twitter spam
Kevin Bauer, Damon McCoy, D. Grunwald, Tadayoshi Kohno, D. Sicker (2007)
Low-resource routing attacks against tor
G. Stringhini, Christopher Krügel, G. Vigna (2010)
Detecting spammers on social networks
B. Martin, Chris Moore, Colin Salter (2010)
Sharing music files: Tactics of a challenge to the industryFirst Monday, 15
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Zhao (2010)
Detecting and characterizing social spam campaigns
(2007)
Sophos Facebook ID probe shows 41% of users happy to reveal all to potential identity thieves
Bimal Viswanath, Ansley Post, K. Gummadi, A. Mislove (2010)
An analysis of social network-based Sybil defenses
A. Lenhart, Kristen Purcell, Aaron Smith, K. Zickuhr (2010)
Social Media & Mobile Internet Use among Teens and Young Adults. Millennials.
(2012)
Received September
V. Blondel, Jean-Loup Guillaume, R. Lambiotte, E. Lefebvre (2008)
Fast unfolding of communities in large networksJournal of Statistical Mechanics: Theory and Experiment, 2008
(2010)
Social media and young adults
Jing Jiang, Christo Wilson, Xiao Wang, Wenpeng Sha, Peng Huang, Yafei Dai, Ben Zhao (2010)
Understanding latent interactions in online social networks
G. Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Zhao (2013)
You Are How You Click: Clickstream Analysis for Sybil Detection
G. Danezis, Prateek Mittal (2009)
SybilInfer: Detecting Sybil Nodes using Social Networks
(2010)
Teens ditch e-mail for texting and Facebook
Aziz Mohaisen, Aaram Yun, Yongdae Kim (2010)
Measuring the mixing time of social graphs
A. Wang (2010)
Don't follow me: Spam detection in Twitter2010 International Conference on Security and Cryptography (SECRYPT)
Fabrício Benevenuto, Tiago Rodrigues, M. Cha, Virgílio Almeida (2009)
Characterizing user behavior in online social networks
Haewoon Kwak, Changhyun Lee, Hosung Park, S. Moon (2010)
What is Twitter, a social network or a news media?
Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Zhao, Yafei Dai (2011)
Uncovering social network sybils in the wild
S. Schoenebeck, Daniel Romero, G. Schoenebeck, D. Boyd (2009)
Detecting Spam in a Twitter NetworkFirst Monday, 15
Chris Kanich, C. Kreibich, Kirill Levchenko, Brandon Enright, G. Voelker, V. Paxson, S. Savage (2009)
Spamalytics: an empirical analysis of spam marketing conversionCommun. ACM, 52
Q. Cao, Michael Sirivianos, Xiaowei Yang, Tiago Pregueiro (2012)
Aiding the Detection of Fake Accounts in Large Scale Social Online Services
Christo Wilson, B. Boe, A. Sala, Krishna Puttaswamy, Ben Zhao (2009)
User interactions in social networks and their implications
Chris Grier, Kurt Thomas, V. Paxson, C. Zhang (2010)
@spam: the underground on 140 characters or less
Uncovering Social Network Sybils in the Wild ZHI YANG, Peking University CHRISTO WILSON, University of California, Santa Barbara XIAO WANG, Peking University TINGTING GAO, Renren Inc. BEN Y. ZHAO, University of California, Santa Barbara YAFEI DAI, Peking University Sybil accounts are fake identities created to unfairly increase the power or resources of a single malicious user. Researchers have long known about the existence of Sybil accounts in online communities such as file-sharing systems, but they have not been able to perform large-scale measurements to detect them or measure their activities. In this article, we describe our efforts to detect, characterize, and understand Sybil account activity in the Renren Online Social Network (OSN). We use ground truth provided by Renren Inc. to build measurement-based Sybil detectors and deploy them on Renren to detect more than 100,000 Sybil accounts. Using our full dataset of 650,000 Sybils, we examine several aspects of Sybil behavior. First, we study their link creation behavior and find that contrary to prior conjecture, Sybils in OSNs do not form tight-knit communities. Next, we examine the fine-grained behaviors of Sybils on Renren using clickstream data. Third, we investigate behind-the-scenes collusion between large groups of Sybils. Our results
ACM Transactions on Knowledge Discovery from Data (TKDD) – Association for Computing Machinery
Published: Feb 1, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.