Full Cycle Analysis of a Large-scale Botnet Attack on Twitter

被引:0
|
作者
Besel, Christoph [1 ]
Echeverria, Juan [1 ]
Zhou, Shi [1 ]
机构
[1] UCL, Dept Comp Sci, London, England
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This work presents an in-depth forensic analysis of a large-scale spam attack launched by one of the largest Twitter botnets reported in academic literature. The Bursty botnet contains over 500,000; many of which have not been suspended. The bots have generated over 2.8 million spam tweets, with 2.2 million mentions directly targeting over 1.3 million distinct Twitter users. We reveal that the botnet used a network of URL shortening services and redirections to obfuscate the real landing pages. We show that users clicked on these URLs shortly after they were published and in large numbers. We even discovered the botmaster who was behind the whole operation, including creation of the Bursty botnet and registration of the several landing pages, which happen to be phishing websites. Furthermore, we found that this botmaster is still active selling Twitter bot related services. Our work reconstructs the complete course of the spam attacks, from planning to execution. This work provides in depth analysis and insight into the operation of cybercriminals on Twitter, and the cyberspace infrastructure and black-markets that they rely on. Finally, we address how the state-of-the-art bot classifiers are unable differentiate the Bursty bots from normal users, highlighting the need and importance of individual botnet analysis.
引用
收藏
页码:170 / 177
页数:8
相关论文
共 50 条
  • [1] A Large-scale Behavioural Analysis of Bots and Humans on Twitter
    Gilani, Zafar
    Farahbakhsh, Reza
    Tyson, Gareth
    Crowcroft, Jon
    [J]. ACM TRANSACTIONS ON THE WEB, 2019, 13 (01)
  • [2] Nostalgia on Twitter: Detection and Analysis of a Large-Scale Dataset
    Stanley Jothiraj, Fiona Victoria
    Hong, Lingzi
    Mashhadi, Afra
    [J]. Proceedings of the Association for Information Science and Technology, 2024, 61 (01) : 349 - 360
  • [3] Twitter Sentiment Analysis for Large-Scale Data: An Unsupervised Approach
    Rafeeque Pandarachalil
    Selvaraju Sendhilkumar
    G. S. Mahalakshmi
    [J]. Cognitive Computation, 2015, 7 : 254 - 262
  • [4] Twitter Sentiment Analysis for Large-Scale Data: An Unsupervised Approach
    Pandarachalil, Rafeeque
    Sendhilkumar, Selvaraju
    Mahalakshmi, G. S.
    [J]. COGNITIVE COMPUTATION, 2015, 7 (02) : 254 - 262
  • [5] Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection
    Bottazzi, Giovanni
    Italiano, Giuseppe F.
    Rutigliano, Giuseppe G.
    [J]. SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 76 - 80
  • [6] COVID-19 and Misinformation: A Large-Scale Lexical Analysis on Twitter
    Antypas, Dimosthenis
    Rogers, David
    Preece, Alun
    Camacho-Collados, Jose
    [J]. ACL-IJCNLP 2021: THE 59TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS AND THE 11TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING: PROCEEDINGS OF THE STUDENT RESEARCH WORKSHOP, 2021, : 119 - 126
  • [7] DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis
    Bilge, Leyla
    Balzarotti, Davide
    Robertson, William
    Kirda, Engin
    Kruegel, Christopher
    [J]. 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 129 - 138
  • [8] Large-scale identification and characterization of scholars on Twitter
    Costas, Rodrigo
    Mongeon, Philippe
    Ferreira, Marcia R.
    van Honk, Jeroen
    Franssen, Thomas
    [J]. QUANTITATIVE SCIENCE STUDIES, 2020, 1 (02): : 771 - 791
  • [9] Towards Situational Awareness of Large-Scale Botnet Probing Events
    Li, Zhichun
    Goyal, Anup
    Chen, Yan
    Paxson, Vern
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 175 - 188
  • [10] Mining Botnet Behaviors on the Large-scale Web Application Community
    Garant, Dan
    Lu, Wei
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 185 - 190