Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics //

Security Monitoring

4/19/2013
09:56 PM
50%
50%

Machine Learning Susses Out Social-Network Fraud

Machine-learning techniques can be used to detect fraud and spies on social networks based on certain features, such as the number of followers and devices used to access the network

Certain characteristics of social-network accounts have a high correlation with fraud and can be used to differentiate between real and fake accounts, a researcher presenting at the SOURCE Boston Conference said this week.

Using machine-learning techniques, Vicente Diaz, a senior security analyst with security software firm Kaspersky Lab, found that seven characteristics of Twitter profiles could identify fraudulent accounts 91 percent of the time. The number of devices from which a user accesses the service, the ratio of followers to people following an account, the average number of tweets to each person, and the number of tweets to an unknown receiver are all features that correlate strongly to fraudulent accounts, he says.

"Surprisingly, it was quite easy to identify the malicious profiles," Diaz says. "The most important thing for you to keep in mind is to select a smart set of features."

As social networks have become more popular, the questionable uses of the highly connected social circles has rapidly grown. Twitter, Facebook, and other networks are increasingly used for spam as a way to gather information on users and to distribute malware. Fake accounts controlled by a single user are an essential part of the fraud schemes. In many cases, the accounts are created, built up, and then harvested and sold off, says Chris Porter, principal with Verizon's RISK group.

"They are trying to amass a lot of followers, and then they will sell the account off to other parties," Porter says. "Organized crime could use that information to pump links to potential victims to spread malware or other schemes."

Last year, Facebook estimated that almost 9 percent of the accounts on its network are fraudulent. One security firm, Impermium, has put the number much higher: As many as [Using the social context of posts, researchers from UC Riverside create prototype Facebook app that detects social malware with 97 percent accuracy. See Application Detects Social Network Spam, Malware.]

Yet while spam and fraud are a problem, malware is far less of an issue, according to Palo Alto Networks, a network security provider. In a recent report, the company found that while 20 percent of average traffic on the network is due to social networks, malicious traffic emanating from social networks accounted for less than 0.2 percent of all threat logs.

"Facebook and Twitter have some pretty good security teams in house," says Michael Sutton, vice president of research for Web-security firm Zscaler. "Most of the scams that we see have a shelf life of about an hour. They are doing a good job."

Kaspersky's Diaz agreed. By looking at almost 13,500 profiles with 6.5 million relationships, the researcher found that most fake accounts were engaged in fraud -- not malicious attacks. The researchers used a number of machine learning techniques, such as radial-basis function (RBF) neural networks and Bayesian filtering, to recognize patterns, including 36 malicious campaigns.

In addition, he found that he could identify hacked accounts with an 80 percent accuracy rate. By monitoring accounts using a small time window, Diaz's system could detect changes in behavior that indicated an account had become compromised.

To continue his research, Diaz wants to apply his models to the large population of accounts that follow corporations and celebrities, trying to find fake accounts and understand how fraudsters use the popular crowd to fuel their own schemes.

"It will be interesting to see how many followers are real and how many are fake profiles used to boost the apparent fans of a celebrity," Diaz says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11937
PUBLISHED: 2020-08-06
In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.
CVE-2020-15114
PUBLISHED: 2020-08-06
In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting i...
CVE-2020-15136
PUBLISHED: 2020-08-06
In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints func...
CVE-2020-15701
PUBLISHED: 2020-08-06
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.1...
CVE-2020-15702
PUBLISHED: 2020-08-06
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges....