skip to main content
10.1145/3097286.3097301acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmsocietyConference Proceedingsconference-collections
research-article
Open Access

Can We Trust Social Media Data? Social Network Manipulation by an IoT Botnet

Published:28 July 2017Publication History

ABSTRACT

The size of a social media account's audience -- in terms of followers or friends count -- is believed to be a good measure of its influence and popularity. To gain quick artificial popularity on online social networks (OSN), one can buy likes, follows and views, from social media fraud (SMF) services. SMF is the generation of likes, follows and views on OSN such as Facebook, Twitter, YouTube, and Instagram. Using a research method that combines computer sciences and social sciences, this paper provides a deeper understanding of the illicit market for SMF. It conducts a market price analysis for SMF, describes the operations of a supplier -- an Internet of things (IoT) botnet performing SMF -- and provides a profile of the potential customers of such fraud. The paper explains how an IoT botnet conducts social network manipulation and illustrates that the fraud is driven by OSN users, mainly entertainers, small online shops and private users. It also illustrates that OSN strategy to suspend fake accounts only cleans the networks a posteriori of the fraud and does not deter the crime -- the botnet -- or the fraud -- SMF -- from happening. Several solutions to deter the fraud are provided.

References

  1. Alsaleh, M., Alarifi A., Al-Salman, A. M., Alfayez, M. and Almuhaysin, A. 2014. TSD: Detecting Sybil Accounts in Twitter. In Proceedings of the 13th International Conference on Machine Learning and Applications. IEEE, Detroit, MI, 463--469. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Beutel, A., Xu, W., Guruswami, V., Palow, C. and Faloutsos, C. 2013. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. In Proceedings of the 22nd international conference on World Wide Web. ACM, New York, NY, 119--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bilge, L., Strufe T., Balzarotti, D. and Kirda E. 2009. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web. WWW, Madrid, Spain, 551--560. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bilodeau, O. 2015. Telnet Support for Cowrie. Cowrie GitHub Repository, available at: https://github.com/micheloosterhof/cowrie/pull/222.Google ScholarGoogle Scholar
  5. Bilodeau, O. and Dupuy, T. 2015. Dissecting Linux/Moose: The Analysis of a Linux Router-Based Worm Hungry for Social Networks. ESET Research Technical Report, Montreal, QC, available at: http://www.welivesecurity.com/2016/11/02/linuxmoose-still-breathing/.Google ScholarGoogle Scholar
  6. Boshmaf, Y., Muslukhov, I., Beznosov, K., and Ripeanu, M. 2011. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th annual computer security applications conference, ACM, Florida, USA, 93--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cao, Q., Yang, X., Yu, J. and Palow, C. 2014. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, Scottsdale, Arizona, 477--488. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cha, M., Haddadi, H., Benevenuto, F. and Gummadi, K. P. 2013. Measuring user influence in Twitter: The million follower fallacy. In Proceedings of the Fourth International Conference on Weblogs and Social Media. AAAI, Washington, DC, 30. Available at: http://www.aaai.org/Library/ICWSM/icwsm10contents.php.Google ScholarGoogle Scholar
  9. De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M. A. and Shafiq, M. Z. 2014. Paying for likes?: Understanding Facebook like fraud using honeypots. In Proceedings of the 2014 Conference on Internet Measurement Conference. ACM, Vancouver, BC, 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. De Vries, L., Gensler, S. and Leeflang, P. S. 2012. Popularity of brand posts on brand fan pages: an investigation of the effects of social media marketing. Journal of Interactive Marketing, 26 (01-04-2012), 83--91.Google ScholarGoogle ScholarCross RefCross Ref
  11. ESET Research. 2016. Linux/Moose: Still Breathing. Blog We Live Security, ESET, Montreal, QC, available at: http://www.welivesecurity.com/2016/11/02/linuxmoose-still-breathing/Google ScholarGoogle Scholar
  12. Forelle, M. C., Howard, P. N., Monroy-Hernández, A., and Savage, S. 2015. Political bots and the manipulation of public opinion in Venezuela. Available at SSRN: https://ssrn.com/abstract=2635800Google ScholarGoogle Scholar
  13. Freitas, C., Benevenuto, F., Ghosh, S. and Veloso, A. 2015. Reverse engineering socialbot infiltration strategies in Twitter. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. ACM, Paris, France, 25--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Gurajala, S., White, J. S., Hudson, B. and Matthews, J. N., 2015. Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach. In Proceedings of the 2015 International Conference on Social Media & Society. ACM, Toronto, ON, 9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ikram, M., Onwuzurike, L., Farooqi, S., De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M. A. and Shafiq, M. Z. 2015. Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms. Available at: https://arxiv.org/abs/1506.00506v3.Google ScholarGoogle Scholar
  16. Nguyen, C. 2016. What Life for a Bangladeshi Click Farmer Looks Like. Motherboard--Vice. Published 30 March 2016 at: http://motherboard.vice.com/read/what-life-for-a-bangladeshi-click-farmer-looks-like.Google ScholarGoogle Scholar
  17. Paquet-Clouston M., Bilodeau, O., Décary-Hétu, D. and Dupuy, T. 2016. EGO MARKET: When Greed for Fame Benefits Large-Scale Botnets. GoSecure Technical Report, Montreal, QC, available at: http://gosecure.net/wpcontent/uploads/2016/11/Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets.pdf.Google ScholarGoogle Scholar
  18. SC Magazines. 2015. Global efforts take down 37,000 websites selling counterfeit goods, Published 4 December at: https://www.scmagazine.com/global-efforts-take-down-37000-websites-selling-counterfeit-goods/article/533253/Google ScholarGoogle Scholar
  19. Stringhini, G., Egele, M., Kruegel, C. and Vigna, G. 2012. Poultry markets: on the underground economy of Twitter followers. In Proceedings of the 2012 ACM Workshop on Online Social Networks. ACM, Helsinki, Finland, 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Thomas, K., Iatskiv, D., Bursztein, E., Pietraszek, T., Grier, C. and McCoy, D. 2014, November. Dialing back abuse on phone verified accounts. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, Scottsdale, AZ, 465--476. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Thomas, K., McCoy, D., Grier, C., Kolcz, A. and Paxson, V. 2013. Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse. In Proceedings of the 22nd USENIX Security Symposium. USENIX Security, Washington, DC, 195--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Zhang, J., Zhang, R., Zhang, Y., and Yan, G. 2016. The rise of social botnets: Attacks and countermeasures. IEEE Transactions on Dependable and Secure Computing, 99 (06-04-2016), 1--14.Google ScholarGoogle Scholar
  23. Zhang, J., Zhang, R., Zhang, Y., and Yan, G. 2013. On the impact of social botnets for spam distribution and digital-influence manipulation. In Proceedings of the 2013 Communications and Network Security (CNS), Chicago, USA, 46--54.Google ScholarGoogle Scholar

Index Terms

  1. Can We Trust Social Media Data? Social Network Manipulation by an IoT Botnet

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          #SMSociety17: Proceedings of the 8th International Conference on Social Media & Society
          July 2017
          414 pages
          ISBN:9781450348478
          DOI:10.1145/3097286

          Copyright © 2017 Owner/Author

          This work is licensed under a Creative Commons Attribution International 4.0 License.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 July 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          #SMSociety17 Paper Acceptance Rate58of142submissions,41%Overall Acceptance Rate78of189submissions,41%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader