Categorizing Social Network Objects Based on User Affiliations
First Claim
1. A computer implemented method for categorizing groups of users in a social networking system based on maliciousness of activity associated with the groups, the method comprising:
- identifying a set of malicious groups associated with a social networking system, the malicious groups predetermined to be associated with a type of malicious activity;
selecting users associated with the malicious groups, wherein each user is selected based on a measure of interactions of the user with the malicious groups exceeding a threshold value;
selecting a set of potentially malicious groups associated with the selected users;
receiving keywords associated with the type of malicious activity and searching for keyword occurrences in information associated with each potentially malicious group;
determining a level of association of each potentially malicious group with the type of malicious activity based on the keyword occurrences; and
storing information describing the association of each potentially malicious group with the type of malicious activity.
2 Assignments
0 Petitions
Accused Products
Abstract
Groups of users of a social networking system are categorized based on their association with a type of malicious activity. A set of predetermined malicious groups is identified. Users associated with the malicious groups are selected based on their level of interactions with the malicious groups. Other groups associated with the selected users are identified as being potentially malicious groups. The potentially malicious groups are further analyzed based on occurrences of keywords associated with the type of malicious activity and manual verification by experts. The potentially malicious groups are either classified as being malicious or non-malicious or assigned a score based on their likelihood of being associated with the type of malicious activity. The methods and system disclosed can be used for categorizing other types of social network objects based on their association with a type of malicious activity, for example, users, events, and content.
-
Citations
34 Claims
-
1. A computer implemented method for categorizing groups of users in a social networking system based on maliciousness of activity associated with the groups, the method comprising:
-
identifying a set of malicious groups associated with a social networking system, the malicious groups predetermined to be associated with a type of malicious activity; selecting users associated with the malicious groups, wherein each user is selected based on a measure of interactions of the user with the malicious groups exceeding a threshold value; selecting a set of potentially malicious groups associated with the selected users; receiving keywords associated with the type of malicious activity and searching for keyword occurrences in information associated with each potentially malicious group; determining a level of association of each potentially malicious group with the type of malicious activity based on the keyword occurrences; and storing information describing the association of each potentially malicious group with the type of malicious activity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer implemented method for categorizing objects stored in a social networking system based on the objects'"'"' relatedness to a subject or interest, the method comprising:
-
identifying a set of objects associated with a social networking system, the identified objects predetermined to be related to a subject or interest; selecting users associated with the objects, wherein each user is selected responsive to a measure of interactions of the user with the objects exceeding a first threshold value; selecting a set of candidate objects associated with the selected users, wherein the candidate objects are potentially related to the subject or interest; receiving keywords associated with the subject or interest and searching for keyword occurrences in information associated with each candidate object; determining a level of association of each candidate malicious object with the subject or interest based on the keyword occurrences; and storing information describing the level of association of one or more of the candidate objects with the subject or interest. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer program product having a computer-readable storage medium storing computer-executable code for categorizing groups of users in a social networking system based on maliciousness of activity associated with the groups, the code comprising:
-
an object classifier module configured to; receive information identifying a set of malicious groups associated with a social networking system, wherein the groups are predetermined to be associated with a type of malicious activity, select users associated with the malicious groups, wherein each user is selected responsive to a measure of interactions of the user with the malicious groups exceeding a threshold value, and select a set of potentially malicious groups associated with the selected users; a keyword search module configured to; receive keywords associated with the type of malicious activity, and search for occurrences of the keywords in information associated with each potentially malicious group; the object classifier module, further configured to; determine a level of associate each potentially malicious group with the type of malicious activity based on the occurrences; and a group store configured to; store information describing the level of association of each potentially malicious group with the type of malicious activity. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34)
-
Specification