towards detecting anomalous user behavior in online social...

37
Towards Detecting Anomalous User Behavior in Online Social Networks Bimal Viswanath M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander Krishnamurthy, Alan Mislove Usenix Security’14

Upload: others

Post on 06-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Towards Detecting Anomalous User Behavior in Online Social Networks

Bimal Viswanath

M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander Krishnamurthy, Alan Mislove

Usenix Security’14

Page 2: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Service abuse in social networks today

Several black-market services are available today toManipulate content ratingsManipulate influence/popularity of a user

One can buy likes for their Facebook page on the black-market

Quality of traffic on social ad platforms is also questionable

2

Page 3: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Our goal

Detect misbehaving identities in the serviceSuspend the misbehaving user or nullify their actions

3

Page 4: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Existing approaches for defense

4

Attacker controls

Begin attack

Defenderresponds

Attackerdetects

Initialdetection

Attack Detect

DefenseMutate

“Facebook Immune System”, SNS’10

Defender controls

Page 5: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Existing approaches for defense

4

Attacker controls

Begin attack

Defenderresponds

Attackerdetects

Initialdetection

Attack Detect

DefenseMutate

“Facebook Immune System”, SNS’10

Defender controls

Page 6: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Existing approaches for defense

4

Attacker controls

Begin attack

Defenderresponds

Attackerdetects

Initialdetection

Attack Detect

DefenseMutate

“Facebook Immune System”, SNS’10

Defender controls

Page 7: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Existing approaches for defense

4

Attacker controls

Begin attack

Defenderresponds

Attackerdetects

Initialdetection

Attack Detect

DefenseMutate

“Facebook Immune System”, SNS’10

Defender controls

Page 8: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Existing approaches for defense

4

Attacker controls

Begin attack

Defenderresponds

Attackerdetects

Initialdetection

Attack Detect

DefenseMutate

“Facebook Immune System”, SNS’10

Defender controls

Page 9: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Limitations of existing approaches

Relies on detecting specific known patterns of misbehavior

Attackers mutate and use diverse strategies today:Fake accounts are created for Sybil attacksSome real users tend to collude to boost each other’s popularityReal user accounts are compromised for better social reach

Existing approaches are vulnerable against an adaptive attacker

5

Page 10: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Idea: Use unsupervised anomaly detection

6

Page 11: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

7

Our approach at a high level

We use an unsupervised anomaly detection technique

We build an Anomaly classifierThat learns normal paterns of behaviorAny behavior that deviates significantly from normal is anomalous

For learning phase:Input only includes behavior of unlabeled random sample of users

This approach has the potential to catch diverse attack strategies

Page 12: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Key contributions

An approach to identify anomalous user behavior

Detect Like spammers on FacebookOur approach detects diverse attack strategies

Using Sybil accountsCompromised accountsColluding accounts

Detect fraudulent clicks in the Facebook social ad platformObserve that a significant fraction of clicks look anomalous

8

Page 13: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Methodology

9

Page 14: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Learning normal patterns of behavior

For our approach to work:We have to learn normal patterns of user behavior

If user behavior is too noisy - i.e., everyone behaves very differentlyAttacker can potentially hide in the noise and evade detection

We want to see if there are a few patterns of behavior that are dominant among normal users

10

Page 15: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Why would this work against attackers?

To evade detection, attacker would have to behave normallyWill have to limit himself to the few patterns of normal behaviorThis constrains the attacker and bounds the scale of the attack

11

Spatial feature: Distribution of #page categories liked

Normal user Anomalous user

Football 2

Cricket 3

Photography 10

Body building 30Dolls 32

Rock climbing 41Beauty care 29

Medicine 30Motorcycle 35

Cartoons 51

Page 16: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Challenges in modeling behavior

How do you model complex user behavior in social networks?User behavior is high dimensional

Spatial feature: Behavior defined as distribution of topic categoriesTemporal feature: Time-series of number of likes per day

User behavior can change over time

User behavior can be noisy

12

Page 17: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Anomaly detection using PCA

13

Number of likes on topic 1

Num

ber o

f lik

es o

n to

pic

2

Page 18: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Anomaly detection using PCA

13

Number of likes on topic 1

Num

ber o

f lik

es o

n to

pic

2

Page 19: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Anomaly detection using PCA

13

Number of likes on topic 1

Num

ber o

f lik

es o

n to

pic

2

Normal users

Anomalous user

Page 20: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Anomaly detection using PCA

13

Number of likes on topic 1

Num

ber o

f lik

es o

n to

pic

2

Page 21: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Anomaly detection using PCA

13

Number of likes on topic 1

Num

ber o

f lik

es o

n to

pic

2

PC-1(Normal space)

Page 22: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Anomaly detection using PCA

13

Number of likes on topic 1

Num

ber o

f lik

es o

n to

pic

2

PC-1(Normal space)

PC-2(Residual space)

Page 23: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Anomaly detection using PCA

13

Number of likes on topic 1

Num

ber o

f lik

es o

n to

pic

2

PC-1(Normal space)

PC-2(Residual space)

y

yres

ynorm If yres > Threshold, user is anomalous

Page 24: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Capturing normal behavior patterns

Are there a few patterns of behavior that are dominant?Can be answered by looking at variance captured by each PC

We apply PCA to user behavior defined over 224 page topics

14

Page 25: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Capturing normal behavior patterns

Are there a few patterns of behavior that are dominant?Can be answered by looking at variance captured by each PC

We apply PCA to user behavior defined over 224 page topics

14

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0 50 100 150 200

Frac

tion

of to

tal v

aria

nce

Principal Component

Facebook - Spatial

0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08

1 3 5 7 9 11 13 15 17 19

Page 26: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Capturing normal behavior patterns

Are there a few patterns of behavior that are dominant?Can be answered by looking at variance captured by each PC

We apply PCA to user behavior defined over 224 page topics

14

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0 50 100 150 200

Frac

tion

of to

tal v

aria

nce

Principal Component

Facebook - Spatial

0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08

1 3 5 7 9 11 13 15 17 19 0

0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08

1 3 5 7 9 11 13 15 17 19

Page 27: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Capturing normal behavior patterns

Are there a few patterns of behavior that are dominant?Can be answered by looking at variance captured by each PC

We apply PCA to user behavior defined over 224 page topics

14

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0 50 100 150 200

Frac

tion

of to

tal v

aria

nce

Principal Component

Facebook - Spatial

0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08

1 3 5 7 9 11 13 15 17 19 0

0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08

1 3 5 7 9 11 13 15 17 19

Top 5 components account for more than 85% of

data variance

Each of the remaining components

capture very small variance

Page 28: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Capturing normal behavior patterns

Are there a few patterns of behavior that are dominant?Can be answered by looking at variance captured by each PC

We apply PCA to user behavior defined over 224 page topics

14

We observe such patterns in other social networks too

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0 50 100 150 200

Frac

tion

of to

tal v

aria

nce

Principal Component

Facebook - Spatial

0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08

1 3 5 7 9 11 13 15 17 19 0

0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08

1 3 5 7 9 11 13 15 17 19

Top 5 components account for more than 85% of

data variance

Each of the remaining components

capture very small variance

Page 29: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Evaluation: Detecting Like spammers on Facebook

15

Page 30: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Data collected

Training data:Random users: 12k random users sampled from Facebook

Testing data:

16

Identity type #Users

Black-market 3.2k

Compromised 1k

Colluding 900

Normal 1.2k

Page 31: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Detected anomalous behavior

Estimating threshold for anomalous behaviorFind threshold such that 3% of random users are flagged

Facebook reported in 2013 that 3% of all users are suspicious

We observe a false positive rate of 3.3%

17

Identity type Likes flagged

Black-market 99%

Compromised 64%

Colluding 92%

Page 32: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Evaluation: Detecting click-spam on Facebook ads

18

Page 33: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Click-spam on Facebook

Advertisers lose money on spam clicksThey might lose confidence in the advertising platformAffects the sustainability of the social networking service

Preliminary experiment to understand click-spam in Facebook adsSet up bluff ad and a real ad targeting users in USAHeavily instrumented the landing page to capture user activity

Both bluff and real ad performed nearly identicallye.g., similar number of clicks and similar levels of activity on landing page

19

Page 34: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Experiment to catch anomalous clicks

20

Set up ad to get likes to our page

Find identity of user who liked our page

Page 35: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Click-spam identified

We set up 10 ad campaigns targeting 7 countriesUSA, UK, Australia, Egypt, Philippines, Malaysia, India

1,867/2,767 (67%) users who click on ads look anomalous8 out of 10 campaigns have a majority of clicks that look anomalousUS,UK campaigns have more than 39% anomalous clicks

21

Page 36: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Corroboration by Facebook

We analyzed the state of flagged users and their likes in June 2014

Users:Most of the flagged users still exist

92% of black-market and 93% of ad users are still alive

Likes:More than 85% of all likes by ad users were removed after 4 months

Confirms our findings of click-spam

But a lot of likes by known misbehaving users still existOver 48% of likes by black-market users still exist after 10 months

22

Page 37: Towards Detecting Anomalous User Behavior in Online Social ...saikat.guha.cc/pub/usesec14-fblikespam-talk.pdf · M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna Gummadi, Balachander

Conclusion

Service abuse is a huge problem in social networks todayAttackers use diverse strategies and also tend to adapt

We propose an unsupervised anomaly detection schemePCA serves as a nice tool to model behavior and detect anomalous ones

We evaluate our technique on extensive ground-truth data of anomalous behavior

We apply our approach to detect click-spam in a social ad platform

23