Characterizing and detecting malicious crowdsourcing

Tianyi Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Popular Internet services in recent years have shown that remarkable things can be achieved by harnessing the power of the masses. However, crowd-sourcing systems also pose a real challenge to existing security mechanisms deployed to protect Internet services, particularly those tools that identify malicious activity by detecting activities of automated programs such as CAPTCHAs. In this work, we leverage access to two large crowdturfing sites to gather a large corpus of ground-truth data generated by crowdturfing campaigns. We compare and contrast this data with "organic" content generated by normal users to identify unique characteristics and potential signatures for use in real-time detectors. This poster describes first steps taken focused on crowdturfing campaigns targeting the Sina Weibo microblogging system. We describe our methodology, our data (over 290K campaigns, 34K worker accounts, 61 million tweets...), and some initial results.

Original languageEnglish (US)
Title of host publicationProceedings of the SIGCOMM 2013 and Best Papers of the Co-Located Workshops
Pages537-538
Number of pages2
Edition4
DOIs
StatePublished - Dec 1 2013
Externally publishedYes
EventACM SIGCOMM 2013 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 2013 - Hong Kong, China
Duration: Aug 12 2013Aug 16 2013

Publication series

NameComputer Communication Review
Number4
Volume43
ISSN (Print)0146-4833
ISSN (Electronic)1943-5819

Conference

ConferenceACM SIGCOMM 2013 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 2013
Country/TerritoryChina
CityHong Kong
Period8/12/138/16/13

Keywords

  • crowdturfing
  • malicious crowdsourcing
  • user behavior

ASJC Scopus subject areas

  • Computer Science Applications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Characterizing and detecting malicious crowdsourcing'. Together they form a unique fingerprint.

Cite this