{"id":"https://openalex.org/W2898177168","doi":"https://doi.org/10.1109/asonam.2018.8508708","title":"Full Cycle Analysis of a Large-Scale Botnet Attack on Twitter","display_name":"Full Cycle Analysis of a Large-Scale Botnet Attack on Twitter","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2898177168","doi":"https://doi.org/10.1109/asonam.2018.8508708","mag":"2898177168"},"language":"en","primary_location":{"id":"doi:10.1109/asonam.2018.8508708","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam.2018.8508708","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://discovery.ucl.ac.uk/10074237/1/BotnetSpammingAttack_plain%20format.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040799968","display_name":"Christoph Besel","orcid":null},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Christoph Besel","raw_affiliation_strings":["Department of Computer Science, University College London (UCL), London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University College London (UCL), London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103729956","display_name":"Juan Echeverr\u00eda","orcid":null},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Juan Echeverria","raw_affiliation_strings":["Department of Computer Science, University College London (UCL), London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University College London (UCL), London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027701257","display_name":"Shi Zhou","orcid":"https://orcid.org/0000-0001-9658-9195"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shi Zhou","raw_affiliation_strings":["Department of Computer Science, University College London (UCL), London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University College London (UCL), London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040799968"],"corresponding_institution_ids":["https://openalex.org/I45129253"],"apc_list":null,"apc_paid":null,"fwci":4.9341,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.95801996,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"170","last_page":"177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9632068872451782},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.621035099029541},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.5503949522972107},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4746844470500946},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24651086330413818},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14667761325836182},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.08502349257469177}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9632068872451782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.621035099029541},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.5503949522972107},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4746844470500946},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24651086330413818},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14667761325836182},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.08502349257469177},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/asonam.2018.8508708","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam.2018.8508708","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:10074237","is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10074237/","pdf_url":"https://discovery.ucl.ac.uk/10074237/1/BotnetSpammingAttack_plain%20format.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"     In: Brandes, U and Reddy, C and Tagarelli, A, (eds.) Proceedings of 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).  (pp. pp. 170-177).  IEEE: Barcelona, Spain. (2018)     ","raw_type":"Proceedings paper"}],"best_oa_location":{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:10074237","is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10074237/","pdf_url":"https://discovery.ucl.ac.uk/10074237/1/BotnetSpammingAttack_plain%20format.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"     In: Brandes, U and Reddy, C and Tagarelli, A, (eds.) Proceedings of 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).  (pp. pp. 170-177).  IEEE: Barcelona, Spain. (2018)     ","raw_type":"Proceedings paper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2898177168.pdf","grobid_xml":"https://content.openalex.org/works/W2898177168.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W1517046895","https://openalex.org/W1671965234","https://openalex.org/W1815362064","https://openalex.org/W1837843568","https://openalex.org/W1986678144","https://openalex.org/W2020264290","https://openalex.org/W2074835059","https://openalex.org/W2091692346","https://openalex.org/W2092277251","https://openalex.org/W2098395374","https://openalex.org/W2133591726","https://openalex.org/W2153644028","https://openalex.org/W2163764145","https://openalex.org/W2165701072","https://openalex.org/W2168508162","https://openalex.org/W2187089797","https://openalex.org/W2236870451","https://openalex.org/W2263846226","https://openalex.org/W2278635123","https://openalex.org/W2509798866","https://openalex.org/W2573614998","https://openalex.org/W2595521492","https://openalex.org/W2610773131","https://openalex.org/W2619677552","https://openalex.org/W2724523750","https://openalex.org/W2759330608","https://openalex.org/W2949072505","https://openalex.org/W2963706081","https://openalex.org/W3098249847","https://openalex.org/W3098586381","https://openalex.org/W3104378754","https://openalex.org/W3122934970","https://openalex.org/W3125182500","https://openalex.org/W4232900735","https://openalex.org/W4240802145","https://openalex.org/W4298252438","https://openalex.org/W6631157121","https://openalex.org/W6638343385","https://openalex.org/W6684716366","https://openalex.org/W6689807881","https://openalex.org/W6697689927","https://openalex.org/W6731838549","https://openalex.org/W6743971886","https://openalex.org/W6929481427"],"related_works":["https://openalex.org/W3159690896","https://openalex.org/W1989286518","https://openalex.org/W2124456408","https://openalex.org/W2945572725","https://openalex.org/W2921012173","https://openalex.org/W2758517546","https://openalex.org/W4230824443","https://openalex.org/W3134680667","https://openalex.org/W2804396347","https://openalex.org/W2185943007"],"abstract_inverted_index":{"This":[0,153],"work":[1,140,154],"presents":[2],"an":[3],"in-depth":[4],"forensic":[5],"analysis":[6,158],"of":[7,15,31,66,108,114,145,164,200],"a":[8,64],"large-scale":[9],"spam":[10,44,147],"attack":[11],"launched":[12],"by":[13],"one":[14],"the":[16,61,74,98,103,109,115,142,146,162,169,182,189,196],"largest":[17],"Twitter":[18,56,135],"botnets":[19],"reported":[20],"in":[21,92,156],"academic":[22],"literature.":[23],"The":[24,37],"Bursty":[25,110,190],"botnet":[26,62,111,202],"contains":[27],"over":[28,41,52],"500,000;":[29],"many":[30],"which":[32,119],"have":[33,39],"not":[34],"been":[35],"suspended.":[36],"bots":[38,191],"generated":[40],"2.8":[42],"million":[43,48,54],"tweets,":[45],"with":[46],"2.2":[47],"mentions":[49],"directly":[50],"targeting":[51],"1.3":[53],"distinct":[55],"users.":[57],"We":[58,78,95],"reveal":[59],"that":[60,80,128,174],"used":[63],"network":[65],"URL":[67],"shortening":[68],"services":[69],"and":[70,91,112,159,168,172,198],"redirections":[71],"to":[72,121,151],"obfuscate":[73],"real":[75],"landing":[76,117],"pages.":[77],"show":[79],"users":[81],"clicked":[82],"on":[83,166],"these":[84],"URLs":[85],"shortly":[86],"after":[87],"they":[88,175],"were":[89],"published":[90],"large":[93],"numbers.":[94],"even":[96],"discovered":[97],"botmaster":[99,130],"who":[100],"was":[101],"behind":[102],"whole":[104],"operation,":[105],"including":[106],"creation":[107],"registration":[113],"several":[116],"pages,":[118],"happen":[120],"be":[122],"phishing":[123],"websites.":[124],"Furthermore,":[125],"we":[126,179],"found":[127],"this":[129],"is":[131],"still":[132],"active":[133],"selling":[134],"bot":[136,184],"related":[137],"services.":[138],"Our":[139],"reconstructs":[141],"complete":[143],"course":[144],"attacks,":[148],"from":[149,192],"planning":[150],"execution.":[152],"provides":[155],"depth":[157],"insight":[160],"into":[161],"operation":[163],"cybercriminals":[165],"Twitter,":[167],"cyberspace":[170],"infrastructure":[171],"black-markets":[173],"rely":[176],"on.":[177],"Finally,":[178],"address":[180],"how":[181],"state-of-the-art":[183],"classifiers":[185],"are":[186],"unable":[187],"differentiate":[188],"normal":[193],"users,":[194],"highlighting":[195],"need":[197],"importance":[199],"individual":[201],"analysis.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
