TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… ·...

48
Towards Detecting Anomalous User Behavior in Online Social Networks Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi Presented By: Hadi Abdullah And Omar Farooq

Transcript of TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… ·...

Page 1: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Towards  Detecting  Anomalous    

User  Behavior  in  Online  Social  Networks  

     

Bimal  Viswanath,  M.  Ahmad  Bashir,  Mark  Crovella,  Saikat  Guha,  Krishna  Gummadi

Presented By: Hadi Abdullah And Omar Farooq

Page 2: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Service  abuse  in  social  networks   today  

•  Several black-market services are available today to o  Manipulate content ratings o  Manipulate popularity of a user

•  Like spammers try to boost popularity of Facebook pages

Page 3: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Service  abuse  in  social  networks  today

•  Service abuse can have significant economic consequences

•  Social advertising services also seem to be targeted by attackers

Page 4: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Goal  of  this  Paper •  Detect misbehaving identities in a social networking

service.

•  Suspend the misbehaving user or nullify their actions

Page 5: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Related  Work •  Relies on detecting specific known patterns of

misbehavior.

•  Attackers mutate and use diverse strategies today. •  RAHMAN, M. S., HUANG, T.-K., MADHYASTHA, H. V., AND FALOUTSOS, M.

Efficient and Scalable Socware Detection in Online Social Networks.

•  EGELE, M., STRINGHINI, G., KRUEGEL, C., AND VIGNA, G. COMPA: Detecting Compromised Accounts on Social Networks. In Proc. of NDSS (2013).

Page 6: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Adversarial  cycle  today

“Facebook  Immune  System”,  SNS’10

Page 7: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Limitations •  Existing approaches are vulnerable against an

adaptive attacker.

Page 8: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Related  Work Relies on detecting specific known patterns of misbehavior Attackers mutate and use diverse strategies today: o  Fake accounts are created for Sybil attacks o  Some real users tend to collude to boost each other’s

popularity o  Real user accounts are compromised for better social reach

Existing approaches are vulnerable against an adaptive attacker

Page 9: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Solution: •  Use anomaly detection on user behavior

Page 10: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

High  Level  Approach •  Build an Anomaly classifier that learns normal

patterns of user behavior

•  The technique is unsupervised

•  This approach has the potential to catch diverse attacker strategies

Page 11: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

High  Level  Approach •  We build an Anomaly classifier

o  That learns normal patterns of user behavior o  Any behavior that deviates significantly from normal is anomalous

•  Our technique is unsupervised o  Learning only requires behavior of unlabeled random sample of users

•  This approach has the potential to catch diverse attacker strategies o  Because we do not require any a prior knowledge of attacker strategy

Page 12: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Contributions 1.  An approach to identify anomalous user behavior

2.  Detect like spammers on Facebook who use diverse strategies:

3.  Detect fraudulent clicks in the Facebook social ad platform

Page 13: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Contributions •  An approach to identify anomalous user behavior

o  Without requiring any a priori knowledge of attacker strategy

•  Detect like spammers on Facebook who use diverse strategies: o  Using Sybil accounts o  Compromised accounts o  Colluding accounts

•  Detect fraudulent clicks in the Facebook social ad platform o  Observe that a significant fraction of clicks look anomalous

Page 14: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Contents 1. Methodology

2. Detecting like spammers on Facebook

3. Detecting click-spam on Facebook ads

4. Corroboration by Facebook

Page 15: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Learning  normal  paQerns  of  behavior

•  For this approach to work: o  We have to learn normal patterns of user behavior

•  If user behavior is too noisy - i.e., everyone behaves very differently o  Attacker can potentially hide in the noise and evade detection

•  We want to see if there are a few patterns of behavior that are dominant among normal users

Page 16: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Why  would  this  work  against  aQackers?

•  To evade detection, attacker would have to behave normally

•  Will have to limit himself to the few patterns of normal behavior

•  This constrains the attacker and bounds the scale of the attack

Page 17: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Normal  User        vs.        AQacker

Name Likes  

Soccer 2

Shoes 10

Coats 3

Name Likes   Cars 33 Shoes 21 Body  Building 46 Medicine 23 Bedsheets 43 Computers 13 Pillows 24 Toys 45 Dolls 65 Foods 22 Cats 34

Normal Anomalous

Page 18: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Challenges  in  modeling  behavior

•  How do you model complex user behavior in social networks?

•  User behavior can be high dimensional

•  User behavior can change over time

•  User behavior can be noisy

Page 19: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Principal  Component  Analysis  (PCA)

•  Technique to extract patterns from high dimensional data.

•  Input Features: o  Spatial: number of Likes for different page categories o  Temporal: Time-series of number of likes per day. o  Spatio-Temporal: Capture evolution of the spatial features.

Page 20: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

User  Behavior  Datasets •  Facebook:

o  14K Users

o  181 temporal dimensions over 6 month period.

o  224 spatial features for each of 224 Facebook categories

o  181 x 224= 40544 spatio-temporal features

Page 21: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Anomaly  detection  using  PCA

Page 22: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Anomaly  detection  using  PCA

Page 23: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Anomaly  detection  using  PCA

Page 24: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Anomaly  detection  using  PCA

PC-­‐‑I (Normal  space)

Page 25: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Anomaly  detection  using  PCA

PC-­‐‑I (Normal  space)

PC-­‐‑2 (Residual  space)

Page 26: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Anomaly  detection  using  PCA

PC-­‐‑I (Normal  space)

PC-­‐‑2 (Residual  space)

ynorm

yres If    yres  is  unusually  high,  user  is  anomalous

Page 27: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Capturing  normal  behavior  paQerns

•  Are there a few patterns of behavior that are dominant?

Page 28: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Capturing  normal  behavior  paQerns

•  Are there a few patterns of behavior that are dominant? o  Can be answered by looking at variance captured by each PC.

Facebook  like  behavior  defined over  224  page categories

Page 29: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Capturing  normal  behavior  paQerns

•  Are there a few patterns of behavior that are dominant? o  Can be found by looking at variance captured by each PC.

Facebook  like  behavior  defined over  224  page categories

Page 30: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Capturing  normal  behavior  paQerns

•  Are there a few patterns of behavior that are dominant? o  Can be answered by looking at variance captured by each PC.

Facebook  like  behavior  defined over  224  page categories

Top  5  components  

account  for  85%  variance    

Remaining  components  capture  small  amount  of  

variance

Page 31: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Rest  of  the  talk 1. Methodology

2. Detecting like spammers on Facebook

3. Detecting click-spam on Facebook ads

4. Corroboration by Facebook

Page 32: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Data  Collected

Identity  Type Number  of  Users  ~ User    Source  Verification

Black-­‐‑market 3200 Signing  up  on  black-­‐‑market  services

Compromised 1000 Monitored  Febipos.A    web-­‐‑malware

Colluding 900 Signing  up  on  colluding  services

Normal 1200 Friends,  SIGCOMM,  COSN  groups,  and  small  random  sampling

Training data: •  Random users: ~12k random users sampled from

Facebook Testing data:

Page 33: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

User  Type Number  of  users #Likes Average  Likes  

Per  User

Random 11,851 561,559 49

Normal 1,274 73,388 60

Black-­‐‑market 3,254 1,544,107 474

Compromised 1040 209591 201

Colluding 902 277,600 307

Data  Collected

Page 34: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Detected  anomalous  behavior

•  When tested on normal users, detector flags 3.3% of them (false positives)

Identity  Type Likes  flagged

Black-­‐‑market 99%

Compromised 64%

Colluding 92%

Page 35: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Rest  of  the  talk 1. Methodology

2. Detecting like spammers on Facebook

3. Detecting click-spam on Facebook ads

4. Corroboration by Facebook

Page 36: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Click-­‐‑spam  on  Facebook •  Advertisers lose money on spam clicks

o  They might lose confidence in the advertising platform

•  Preliminary experiment: Set up a real ad and a bluff ad targeting users in USA.

Page 37: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Click-­‐‑spam  on  Facebook •  Preliminary experiment: Set up a real ad and a bluff

ad targeting users in USA.

Page 38: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Click-­‐‑spam  on  Facebook •  Preliminary experiment: Set up a real ad and a bluff

ad targeting users in USA.

Page 39: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Click-­‐‑spam  on  Facebook •  Preliminary experiment: Set up a real ad and a bluff

ad targeting users in USA.

Near identical clicks for both ads

Page 40: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Experiment  to  detect  click-­‐‑spam

•  Step 1: Create ad to get likes to our Facebook page

Facebook then targets users who are more likely to like the ad/page

Page 41: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Experiment  to  detect  click-­‐‑spam

•  Step 2. Apply anomaly classifier to users who clicked (liked) on the ad

Page 42: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Experiment  to  detect  click-­‐‑spam

•  10 such ad campaigns were set up, targeting 7 countries

•  USA, UK, Australia, Egypt, Philippines, Malaysia, India

Page 43: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Click-­‐‑spam  identified •  1,867/2,767 (67%) users who click on ads look

anomalous

•  8 out of 10 campaigns have a majority of clicks that look anomalous

•  US,UK campaigns have more than 39% anomalous clicks

Page 44: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Rest  of  the  talk 1. Methodology

2. Detecting like spammers on Facebook

3. Detecting click-spam on Facebook ads

4. Corroboration by Facebook

Page 45: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Corroboration  by  Facebook •  Analyzed the state of flagged users and their likes in

June 2014 •  Users: •  Most of the flagged users still exist •  92% of black-market and 93% of ad spam users are still

alive

Page 46: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Corroboration  by  Facebook •  Likes: •  Confirms click-spam findings (where there was no ground-

truth) •  More than 85% of all likes by ad users were removed after 4

months •  But Facebook’s system is still behind on removing a lot of

misbehavior •  Over 48% of likes by black-market users still exist after 10

months

Page 47: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

Conclusion •  Service abuse is a huge problem in social networks

today.

•  Attackers use diverse strategies.

•  This paper takes a unique approach to use PCA to model behavior and detect anomalous ones.

•  The approach successfully detects click-spam in a social ad platform

Page 48: TowardsDetecting( Anomalous(( UserBehaviorin ...dszajda/classes/cs334/Fall_2014/slides… · TowardsDetecting(Anomalous((UserBehaviorin(OnlineSocialNetworks(((! Bimal!Viswanath,M.AhmadBashir,Mark!

QUESTIONS?