Skip to main content

On URL Changes and Handovers in Social Media

  • Conference paper
  • First Online:
Social Informatics (SocInfo 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10046))

Included in the following conference series:

Abstract

Social media sites (e.g. Twitter and Pinterest) allow users to change the name of their accounts. A change in the account name results in a change in the URL of the user’s homepage. We develop an algorithm that extracts such changes from streaming data and discover that a large number of social media accounts are performing synchronous and collaborative URL changes. We identify various types of URL changes such as handover, exchange, serial handover and loop exchange. All such behaviors are likely to be automated behavior and, thus, indicate accounts that are either already involved in malicious activities or being prepared to do so.

In this paper, we focus on URL handovers where a URL is released by a user and claimed by another user. We find interesting association between handovers and temporal, textual and network behaviors of users. We show several anomalous behaviors from suspicious users for each of these associations. We identify that URL handovers are instantaneous automated operations. We further investigate to understand the benefits of URL handovers, and identify that handovers are strongly associated with reusable internal links and successful avoidance of suspension by the host site. Our handover detection algorithm, which makes such analysis possible, is scalable to process millions of posts (e.g. tweets, pins) and shared publicly online.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Twitter users can mention other users by using the ‘@’ symbol which creates a link to the profile page of the mentioned user. For example @thanks is a link to the address twitter.com/thanks.

  2. 2.

    Although our data collection seed contained 40,000 users, in total we collected tweets from 5.7 million different users.

  3. 3.

    At this stage of the algorithm, the start time and the end time of the objects are still the same.

  4. 4.

    The word “RT” appears at the beginning of all retweets and has nothing to do with the content.

  5. 5.

    We specifically are interested in URL changes that were part of a handover.

References

  1. Project repository. http://cs.unm.edu/~hamooni/papers/handover

  2. The Twitter rules. https://support.twitter.com/articles/18311

  3. Twitter streaming API. https://dev.twitter.com/tags/streaming-api

  4. Akoglu, L., Chandy, R., Faloutsos, C.: Opinion fraud detection in online reviews by network effects. In: ICWSM, pp. 2–11 (2013)

    Google Scholar 

  5. Asur, S., Huberman, B.A.: Predicting the future with social media. In: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, vol. 1, pp. 492–499. IEEE (2010)

    Google Scholar 

  6. Cheng, J., Danescu-Niculescu-Mizil, C., Leskovec, J.: Antisocial behavior in online discussion communities. In: Proceedings of ICWSM (2015)

    Google Scholar 

  7. Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of Twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Secure Comput. 9(6), 811–824 (2012)

    Article  Google Scholar 

  8. Costa, A.F., Yamaguchi, Y., Traina, A.J.M., Traina Jr., C., Faloutsos, C.: RSC: mining and modeling temporal activity in social media. In: Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2015. ACM (2015)

    Google Scholar 

  9. Dhillon, I.S.: Co-clustering documents and words using bipartite co-clustering documents and words using bipartite spectral graph partitioning. In: Proceedings of 7th ACM SIGKDD Conference, pp. 269–274 (2001)

    Google Scholar 

  10. Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers. In: Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR 2010, p. 435. ACM Press (2010)

    Google Scholar 

  11. Li, H., Mukherjee, A., Liu, B., Kornfield, R., Emery, S.: Detecting campaign promoters on Twitter using Markov random fields. In: IEEE International Conference on Data Mining (ICDM), pp. 290–299 (2014)

    Google Scholar 

  12. Matsubara, Y., Sakurai, Y., Ueda, N., Yoshikawa, M.: Fast and exact monitoring of co-evolving data streams. In: IEEE International Conference on Data Mining, pp. 390–399. IEEE (2014)

    Google Scholar 

  13. Mueen, A.: Enumeration of time series motifs of all lengths. In: Proceedings - IEEE International Conference on Data Mining, ICDM, ICDM, pp. 547–556 (2013)

    Google Scholar 

  14. Ratkiewicz, J., Conover, M., Meiss, M., Goncalves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media (2011)

    Google Scholar 

  15. Subrahmanian, V., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., Zhu, L., Ferrara, E., Flammini, A., Menczer, F., Waltzman, R., Stevens, A., Dekhtyar, A., Gao, S., Hogg, T., Kooti, F., Liu, Y., Varol, O., Shiralkar, P., Vydiswaran, V., Mei, Q., Huang, T.: The DARPA Twitter bot challenge. IEEE Computer (2016, in press)

    Google Scholar 

  16. Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of Twitter spam. In: Proceedings of the ACM, IMC 2011, pp. 243–258 (2011)

    Google Scholar 

  17. Thomas, K., Li, F., Grier, C., Paxson, V.: Consequences of connectivity: characterizing account hijacking on Twitter. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security - CCS 2014, pp. 489–500. ACM Press (2014)

    Google Scholar 

  18. Thomas, K., Paxson, V., Mccoy, D., Grier, C.: Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse trafficking fraudulent accounts. In: USENIX Security Symposium, SEC 2013, pp. 195–210 (2013)

    Google Scholar 

  19. Vlachos, M., Gunopulos, D., Das, G.: Rotation invariant distance measures for trajectories. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 2004, p. 707. ACM Press (2004)

    Google Scholar 

  20. Wikipedia. Jaccard index – wikipedia, the free encyclopedia. https://en.wikipedia.org/w/index.php?title=Jaccard_index&oldid=688763411

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hossein Hamooni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Hamooni, H., Chavoshi, N., Mueen, A. (2016). On URL Changes and Handovers in Social Media. In: Spiro, E., Ahn, YY. (eds) Social Informatics. SocInfo 2016. Lecture Notes in Computer Science(), vol 10046. Springer, Cham. https://doi.org/10.1007/978-3-319-47880-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47880-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47879-1

  • Online ISBN: 978-3-319-47880-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics