SlideShare a Scribd company logo
1 of 15
Download to read offline
Privacy and Security in Online
Social Media
Course on NPTEL
NOC-CS07
Week 6.2
Ponnurangam Kumaraguru (“PK”)
Associate Professor
ACM Distinguished Speaker
fb/ponnurangam.kumaraguru, @ponguru
Link farming
⚫Search engines rank websites / webpages
based on graph metrics such as Pagerank
-High in-degree helps to get high Pagerank
⚫Link farming in Web
-Websites exchange reciprocal links with other
sites to improve ranking by search engines
2
Link farming
⚫A link farm is a form of spamming the index
of a search engine (sometimes called
spamdexing or spamexing).
3
Why link farming in Twitter?
⚫Twitter has become a Web within the Web
- Vast amounts of information and real-time news
- Twitter search becoming more and more common
- Search engines rank users by follower-rank,
Pagerank to decide whose tweets to return as
search results
- High indegree (#followers) seen as a metric of
influence
- Klout score influenced by Twitter indegree
⚫Link farming in Twitter
- Spammers follow other users and attempt to get
them to follow back (Reciprocity)
Link farming in Web & Twitter similar?
⚫Motivation is similar
-Higher indegree will give better ranks in search
results
⚫Who engages in link farming?
-Web – spammers
-Twitter – spammers + many legitimate, popular
users !!!
⚫Additional factors in Twitter
-‘Following back’ considered a social etiquette
Spam in Twitter
⚫ “five spam campaigns controlling 145 thousand accounts combined are
able to persist for months at a time, with each campaign enacting a
unique spamming strategy.”
7
Spam in Twitter
⚫ “We find that 8% of 25 million URLs posted to the site point to phishing,
malware, and scams listed on popular blacklists.”
⚫ “We find that Twitter is a highly successful platform for coercing users to visit
spam pages, with a clickthrough rate of 0.13%, compared to much lower rates
previously reported for email spam”
8
Spam in Twitter
⚫ “finding that 16% of active accounts exhibit a high degree of automation.”
⚫ “find that 11% of accounts that appear to publish exclusively through the
browser are in fact automated accounts that spoof the source of the updates.”
9
Dataset
⚫Complete snapshot of Twitter, 2009
⚫54 million users, 1.9 billion links! Largest
dataset!
10
Nodes
11
Spammers
⚫379,340 accounts has been suspended in the
interval, Aug 09 – Feb 11
-Spam-activity or long inactivity
⚫41,352 suspended accounts posted at least
one blacklisted URL shortened by bitly,
tinyurl
12
Spammers
⚫# of spam-targets, spam-followers, their
overlap
⚫82% of spam followers overlap with the
spam-targets
13
Spammers
⚫# of spammers who rank within the top K
according to pagerank
14
Spammers
⚫# of spammers who rank within the top K
according to pagerank
⚫7 spammers rank within 10,000, 304 within
100,000 and 2,131 within 1million
15
Thank you
pk@iiitd.ac.in
precog.iiitd.edu.in
fb/ponnurangam.kumaraguru

More Related Content

What's hot

DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!Stu Hirst
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRSucuri
 
Inference attack on browsing history of twitter users using public click anal...
Inference attack on browsing history of twitter users using public click anal...Inference attack on browsing history of twitter users using public click anal...
Inference attack on browsing history of twitter users using public click anal...Shakas Technologies
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Stu Hirst
 
A little bird told me
A little bird told meA little bird told me
A little bird told meBrendan Ihmig
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsSucuri
 
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 ChicagoIf You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 ChicagoPunchkick Interactive
 
The Most Common Failure With Today's Defences
The Most Common Failure With Today's DefencesThe Most Common Failure With Today's Defences
The Most Common Failure With Today's DefencesMark Nunnikhoven
 
Digital Editors Network
Digital Editors NetworkDigital Editors Network
Digital Editors Networkguest38a088
 
Benefit’s of Tracking Twitter Followers
Benefit’s of  Tracking Twitter FollowersBenefit’s of  Tracking Twitter Followers
Benefit’s of Tracking Twitter FollowersJimmy Finch
 
ISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better EmailsISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better EmailsSparkPost
 
Google Analytics in the age of not provided Search Fest 2014
Google Analytics in the age of not provided   Search Fest 2014Google Analytics in the age of not provided   Search Fest 2014
Google Analytics in the age of not provided Search Fest 2014Timothy Resnik
 
Infographic for OragneFizz Social Media Analysis Report
Infographic for OragneFizz Social Media Analysis ReportInfographic for OragneFizz Social Media Analysis Report
Infographic for OragneFizz Social Media Analysis ReportMengyu Chen
 
How to perform Google Analytics magic
How to perform Google Analytics magicHow to perform Google Analytics magic
How to perform Google Analytics magicInviqa
 

What's hot (15)

DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
 
Inference attack on browsing history of twitter users using public click anal...
Inference attack on browsing history of twitter users using public click anal...Inference attack on browsing history of twitter users using public click anal...
Inference attack on browsing history of twitter users using public click anal...
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
 
A little bird told me
A little bird told meA little bird told me
A little bird told me
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 ChicagoIf You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
 
The Most Common Failure With Today's Defences
The Most Common Failure With Today's DefencesThe Most Common Failure With Today's Defences
The Most Common Failure With Today's Defences
 
Digital Editors Network
Digital Editors NetworkDigital Editors Network
Digital Editors Network
 
Benefit’s of Tracking Twitter Followers
Benefit’s of  Tracking Twitter FollowersBenefit’s of  Tracking Twitter Followers
Benefit’s of Tracking Twitter Followers
 
ISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better EmailsISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better Emails
 
Google Analytics in the age of not provided Search Fest 2014
Google Analytics in the age of not provided   Search Fest 2014Google Analytics in the age of not provided   Search Fest 2014
Google Analytics in the age of not provided Search Fest 2014
 
Infographic for OragneFizz Social Media Analysis Report
Infographic for OragneFizz Social Media Analysis ReportInfographic for OragneFizz Social Media Analysis Report
Infographic for OragneFizz Social Media Analysis Report
 
How to perform Google Analytics magic
How to perform Google Analytics magicHow to perform Google Analytics magic
How to perform Google Analytics magic
 
Ways to protect your data from hacking
Ways to protect your data from hackingWays to protect your data from hacking
Ways to protect your data from hacking
 

Viewers also liked

Privacy and Security in Online Social Media : Policing and Social Media - Part 3
Privacy and Security in Online Social Media : Policing and Social Media - Part 3Privacy and Security in Online Social Media : Policing and Social Media - Part 3
Privacy and Security in Online Social Media : Policing and Social Media - Part 3IIIT Hyderabad
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
 
Week 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear PhishingWeek 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear PhishingIIIT Hyderabad
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1IIIT Hyderabad
 
Privacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : IncidentsPrivacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : IncidentsIIIT Hyderabad
 
Privacy and Security in Online Social Media : OSM APIs and tools for data col...
Privacy and Security in Online Social Media : OSM APIs and tools for data col...Privacy and Security in Online Social Media : OSM APIs and tools for data col...
Privacy and Security in Online Social Media : OSM APIs and tools for data col...IIIT Hyderabad
 
Privacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSMPrivacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSMIIIT Hyderabad
 
Privacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social MediaPrivacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social MediaIIIT Hyderabad
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2IIIT Hyderabad
 
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to coursePrivacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to courseIIIT Hyderabad
 
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...IIIT Hyderabad
 

Viewers also liked (13)

Week 6.1: eCrime
Week 6.1: eCrimeWeek 6.1: eCrime
Week 6.1: eCrime
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 3
Privacy and Security in Online Social Media : Policing and Social Media - Part 3Privacy and Security in Online Social Media : Policing and Social Media - Part 3
Privacy and Security in Online Social Media : Policing and Social Media - Part 3
 
Week 7.2 Nudges
Week 7.2 NudgesWeek 7.2 Nudges
Week 7.2 Nudges
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Week 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear PhishingWeek 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear Phishing
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
 
Privacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : IncidentsPrivacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : Incidents
 
Privacy and Security in Online Social Media : OSM APIs and tools for data col...
Privacy and Security in Online Social Media : OSM APIs and tools for data col...Privacy and Security in Online Social Media : OSM APIs and tools for data col...
Privacy and Security in Online Social Media : OSM APIs and tools for data col...
 
Privacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSMPrivacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSM
 
Privacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social MediaPrivacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social Media
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
 
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to coursePrivacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to course
 
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
 

Similar to Week 6.2: eCrime

IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET Journal
 
Online Marketing 101
Online Marketing 101Online Marketing 101
Online Marketing 101Hoeun Ros
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkIRJET Journal
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxWeb Scraping Expert
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxRaj Yadav
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxRaj Yadav
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxRaj Yadav
 
New world of e communications
New world of e communicationsNew world of e communications
New world of e communicationsAndy Zellers
 
Outreach Digital - How to structure a digital PR campaign
Outreach Digital - How to structure a digital PR campaignOutreach Digital - How to structure a digital PR campaign
Outreach Digital - How to structure a digital PR campaignBranded3
 
How to structure a digital PR campaign
How to structure a digital PR campaignHow to structure a digital PR campaign
How to structure a digital PR campaignOutreach Digital
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxWeb Scraping Expert
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxWeb Scraping Expert
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxWeb Scraping Expert
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxWeb Scraping Expert
 
Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011Rob Garner
 
Nonprofit Crowdfunding - How to Win Friends and Influence Donors
Nonprofit Crowdfunding - How to Win Friends and Influence DonorsNonprofit Crowdfunding - How to Win Friends and Influence Donors
Nonprofit Crowdfunding - How to Win Friends and Influence DonorsBloomerang
 
Linkedin And Twitter
Linkedin And TwitterLinkedin And Twitter
Linkedin And Twitterlifesmark
 
Using Analytics To Investigate, Evaluate & Decide
Using Analytics To Investigate, Evaluate & DecideUsing Analytics To Investigate, Evaluate & Decide
Using Analytics To Investigate, Evaluate & DecideTunheim
 

Similar to Week 6.2: eCrime (20)

Become A Twitter Ninja
Become A Twitter NinjaBecome A Twitter Ninja
Become A Twitter Ninja
 
Web spam
Web spamWeb spam
Web spam
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
 
Online Marketing 101
Online Marketing 101Online Marketing 101
Online Marketing 101
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
New world of e communications
New world of e communicationsNew world of e communications
New world of e communications
 
Outreach Digital - How to structure a digital PR campaign
Outreach Digital - How to structure a digital PR campaignOutreach Digital - How to structure a digital PR campaign
Outreach Digital - How to structure a digital PR campaign
 
How to structure a digital PR campaign
How to structure a digital PR campaignHow to structure a digital PR campaign
How to structure a digital PR campaign
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011
 
Nonprofit Crowdfunding - How to Win Friends and Influence Donors
Nonprofit Crowdfunding - How to Win Friends and Influence DonorsNonprofit Crowdfunding - How to Win Friends and Influence Donors
Nonprofit Crowdfunding - How to Win Friends and Influence Donors
 
Linkedin And Twitter
Linkedin And TwitterLinkedin And Twitter
Linkedin And Twitter
 
Using Analytics To Investigate, Evaluate & Decide
Using Analytics To Investigate, Evaluate & DecideUsing Analytics To Investigate, Evaluate & Decide
Using Analytics To Investigate, Evaluate & Decide
 

More from IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayIIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesIIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasIIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityIIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceIIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesIIIT Hyderabad
 

More from IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Recently uploaded

Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for siteAshtonCains
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Delhi Call girls
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...SocioCosmos
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...anilsa9823
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECall girl Jaipur
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxvemusae
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsPooja Nehwal
 
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrSapana Sha
 
O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenSapana Sha
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRDelhi Call girls
 

Recently uploaded (20)

Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
 
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
 
O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking Men
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
 

Week 6.2: eCrime

  • 1. Privacy and Security in Online Social Media Course on NPTEL NOC-CS07 Week 6.2 Ponnurangam Kumaraguru (“PK”) Associate Professor ACM Distinguished Speaker fb/ponnurangam.kumaraguru, @ponguru
  • 2. Link farming ⚫Search engines rank websites / webpages based on graph metrics such as Pagerank -High in-degree helps to get high Pagerank ⚫Link farming in Web -Websites exchange reciprocal links with other sites to improve ranking by search engines 2
  • 3. Link farming ⚫A link farm is a form of spamming the index of a search engine (sometimes called spamdexing or spamexing). 3
  • 4. Why link farming in Twitter? ⚫Twitter has become a Web within the Web - Vast amounts of information and real-time news - Twitter search becoming more and more common - Search engines rank users by follower-rank, Pagerank to decide whose tweets to return as search results - High indegree (#followers) seen as a metric of influence - Klout score influenced by Twitter indegree ⚫Link farming in Twitter - Spammers follow other users and attempt to get them to follow back (Reciprocity)
  • 5. Link farming in Web & Twitter similar? ⚫Motivation is similar -Higher indegree will give better ranks in search results ⚫Who engages in link farming? -Web – spammers -Twitter – spammers + many legitimate, popular users !!! ⚫Additional factors in Twitter -‘Following back’ considered a social etiquette
  • 6. Spam in Twitter ⚫ “five spam campaigns controlling 145 thousand accounts combined are able to persist for months at a time, with each campaign enacting a unique spamming strategy.” 7
  • 7. Spam in Twitter ⚫ “We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blacklists.” ⚫ “We find that Twitter is a highly successful platform for coercing users to visit spam pages, with a clickthrough rate of 0.13%, compared to much lower rates previously reported for email spam” 8
  • 8. Spam in Twitter ⚫ “finding that 16% of active accounts exhibit a high degree of automation.” ⚫ “find that 11% of accounts that appear to publish exclusively through the browser are in fact automated accounts that spoof the source of the updates.” 9
  • 9. Dataset ⚫Complete snapshot of Twitter, 2009 ⚫54 million users, 1.9 billion links! Largest dataset! 10
  • 11. Spammers ⚫379,340 accounts has been suspended in the interval, Aug 09 – Feb 11 -Spam-activity or long inactivity ⚫41,352 suspended accounts posted at least one blacklisted URL shortened by bitly, tinyurl 12
  • 12. Spammers ⚫# of spam-targets, spam-followers, their overlap ⚫82% of spam followers overlap with the spam-targets 13
  • 13. Spammers ⚫# of spammers who rank within the top K according to pagerank 14
  • 14. Spammers ⚫# of spammers who rank within the top K according to pagerank ⚫7 spammers rank within 10,000, 304 within 100,000 and 2,131 within 1million 15