{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:23:00Z","timestamp":1775899380808,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T00:00:00Z","timestamp":1355097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,10]]},"DOI":"10.1145\/2413176.2413214","type":"proceedings-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T15:12:21Z","timestamp":1355757141000},"page":"325-336","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Defending against large-scale crawls in online social networks"],"prefix":"10.1145","author":[{"given":"Mainack","family":"Mondal","sequence":"first","affiliation":[{"name":"MPI-SWS, Saarbruecken, Germany"}]},{"given":"Bimal","family":"Viswanath","sequence":"additional","affiliation":[{"name":"MPI-SWS, Saarbruecken, Germany"}]},{"given":"Allen","family":"Clement","sequence":"additional","affiliation":[{"name":"MPI-SWS, Saarbruecken, Germany"}]},{"given":"Peter","family":"Druschel","sequence":"additional","affiliation":[{"name":"MPI-SWS, Saarbruecken, Germany"}]},{"given":"Krishna P.","family":"Gummadi","sequence":"additional","affiliation":[{"name":"MPI-SWS, Saarbruecken, Germany"}]},{"given":"Alan","family":"Mislove","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Ansley","family":"Post","sequence":"additional","affiliation":[{"name":"MPI-SWS, Saarbruecken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,12,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"45 000 Facebook accounts compromised: What to know. http:\/\/bit.ly\/TUY3i8.  45 000 Facebook accounts compromised: What to know. http:\/\/bit.ly\/TUY3i8."},{"key":"e_1_3_2_1_2_1","unstructured":"Crawl packages for social networks. http:\/\/80legs.com\/crawl-packages-social-networks.html.  Crawl packages for social networks. http:\/\/80legs.com\/crawl-packages-social-networks.html."},{"key":"e_1_3_2_1_3_1","unstructured":"83\n    million Facebook accounts are fakes and dupes. http:\/\/bit.ly\/Np3seb.  83 million Facebook accounts are fakes and dupes. http:\/\/bit.ly\/Np3seb."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/www.robotstxt.org\/orig.html","author":"A","year":"1994","unstructured":"A standard for robot exclusion. http:\/\/www.robotstxt.org\/orig.html , 1994 . A standard for robot exclusion. http:\/\/www.robotstxt.org\/orig.html, 1994."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766196"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM'11)","author":"Backstrom L.","year":"2011","unstructured":"L. Backstrom , E. Bakshy , J. M. Kleinberg , T. M. Lento , and I. Rosenn . Center of attention: How Facebook users allocate attention across friends . In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM'11) , 2011 . L. Backstrom, E. Bakshy, J. M. Kleinberg, T. M. Lento, and I. Rosenn. Center of attention: How Facebook users allocate attention across friends. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM'11), 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644900"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the International Workshop on Services and Open Sources (SOS'11)","author":"Canali C.","year":"2011","unstructured":"C. Canali , M. Colajanni , and R. Lancellotti . Data acquisition in social networks: Issues and proposals . In Proceedings of the International Workshop on Services and Open Sources (SOS'11) , 2011 . C. Canali, M. Colajanni, and R. Lancellotti. Data acquisition in social networks: Issues and proposals. In Proceedings of the International Workshop on Services and Open Sources (SOS'11), 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 4TH International AAAI Conference on Weblogs and Social Media(ICWSM'10)","author":"Cha M.","year":"2010","unstructured":"M. Cha , H. Haddadi , F. Benevenuto , and K. P. Gummadi . Measuring user influence in twitter:The million follower fallacy . In Proceedings of the 4TH International AAAI Conference on Weblogs and Social Media(ICWSM'10) , 2010 . M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi. Measuring user influence in twitter:The million follower fallacy. In Proceedings of the 4TH International AAAI Conference on Weblogs and Social Media(ICWSM'10), 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993574.1993597"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 16th Network and Distributed System Security Symposium (NDSS'09)","author":"Danezis G.","year":"2009","unstructured":"G. Danezis and P. Mittal . SybilInfer: Detecting Sybil nodes using social networks . In Proceedings of the 16th Network and Distributed System Security Symposium (NDSS'09) , 2009 . G. Danezis and P. Mittal. SybilInfer: Detecting Sybil nodes using social networks. In Proceedings of the 16th Network and Distributed System Security Symposium (NDSS'09), 2009."},{"key":"e_1_3_2_1_12_1","unstructured":"Details of 100 million Facebook users published online. http:\/\/on.msnbc.com\/qvLkX2.  Details of 100 million Facebook users published online. http:\/\/on.msnbc.com\/qvLkX2."},{"key":"e_1_3_2_1_13_1","volume-title":"Doklady Akademii Nauk SSSR","author":"Dinic E. A.","year":"1970","unstructured":"E. A. Dinic . An algorithm for the solution of the max-flow problem with the polynomial estimation . Doklady Akademii Nauk SSSR , 1970 . E. A. Dinic. An algorithm for the solution of the max-flow problem with the polynomial estimation. Doklady Akademii Nauk SSSR, 1970."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2005.98"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1781894.1781925"},{"key":"e_1_3_2_1_16_1","volume-title":"Selected Areas in Communications","author":"Gjoka M.","year":"2011","unstructured":"M. Gjoka , M. Kurant , C. Butts , and A. Markopoulou . Practical recommendations on crawling online social networks . In Selected Areas in Communications , IEEE Journal on Measurement of Internet Topologies , 2011 . M. Gjoka, M. Kurant, C. Butts, and A. Markopoulou. Practical recommendations on crawling online social networks. In Selected Areas in Communications, IEEE Journal on Measurement of Internet Topologies, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12144"},{"key":"e_1_3_2_1_18_1","unstructured":"Google Plus rate limiting. https:\/\/developers.google.com\/console\/help\/#cappingusage.  Google Plus rate limiting. https:\/\/developers.google.com\/console\/help\/#cappingusage."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Parallel Object-Oriented Scientific Computing (POOSC)","author":"Gregor D.","year":"2005","unstructured":"D. Gregor and A. Lumsdaine . The parallel BGL: A generic library for distributed graph computations . In Proceedings of the Parallel Object-Oriented Scientific Computing (POOSC) , 2005 . D. Gregor and A. Lumsdaine. The parallel BGL: A generic library for distributed graph computations. In Proceedings of the Parallel Object-Oriented Scientific Computing (POOSC), 2005."},{"key":"e_1_3_2_1_20_1","unstructured":"Hacker proves Facebook's public data Is public. http:\/\/tcrn.ch\/9JvvmU.  Hacker proves Facebook's public data Is public. http:\/\/tcrn.ch\/9JvvmU."},{"key":"e_1_3_2_1_21_1","unstructured":"Inside a Facebook botnet. http:\/\/bit.ly\/JSeRYs.  Inside a Facebook botnet. http:\/\/bit.ly\/JSeRYs."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879190"},{"key":"e_1_3_2_1_23_1","author":"Kolek E. A.","year":"2008","unstructured":"E. A. Kolek and D. Saunders . Online disclosure: An empirical examination of undergraduate Facebook profiles. Journal of Student Affairs Research and Practice , 2008 . E. A. Kolek and D. Saunders. Online disclosure: An empirical examination of undergraduate Facebook profiles. Journal of Student Affairs Research and Practice, 2008.","journal-title":"Journal of Student Affairs Research and Practice"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807184"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397742"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI'08)","author":"Mislove A.","year":"2008","unstructured":"A. Mislove , A. Post , K. P. Gummadi , and P. Druschel . Ostra: Leveraging trust to thwart unwanted communication . In Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI'08) , 2008 . A. Mislove, A. Post, K. P. Gummadi, and P. Druschel. Ostra: Leveraging trust to thwart unwanted communication. In Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI'08), 2008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879191"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 19th USENIX conference on Security (SEC'10)","author":"Motoyama M.","year":"2010","unstructured":"M. Motoyama , K. Levchenko , C. Kanich , D. McCoy , G. M. Voelker , and S. Savage . Re: Captchas: Understanding CAPTCHA-solving services in an economic context . In Proceedings of the 19th USENIX conference on Security (SEC'10) , 2010 . M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re: Captchas: Understanding CAPTCHA-solving services in an economic context. In Proceedings of the 19th USENIX conference on Security (SEC'10), 2010."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 20th USENIX conference on Security (SEC'11)","author":"Motoyama M.","year":"2011","unstructured":"M. Motoyama , D. McCoy , K. Levchenko , S. Savage , and G. M. Voelker . Dirty jobs: The role of freelance labor in web service abuse . In Proceedings of the 20th USENIX conference on Security (SEC'11) , 2011 . M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. Dirty jobs: The role of freelance labor in web service abuse. In Proceedings of the 20th USENIX conference on Security (SEC'11), 2011."},{"key":"e_1_3_2_1_34_1","unstructured":"Netflix-AOL data leak. http:\/\/cnet.co\/6JiHr8.  Netflix-AOL data leak. http:\/\/cnet.co\/6JiHr8."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 8th Symposium on Networked Systems Design and Implementation (NSDI'11)","author":"Post A.","year":"2011","unstructured":"A. Post , V. Shah , and A. Mislove . Bazaar: Strengthening user reputations in online marketplaces . In Proceedings of the 8th Symposium on Networked Systems Design and Implementation (NSDI'11) , 2011 . A. Post, V. Shah, and A. Mislove. Bazaar: Strengthening user reputations in online marketplaces. In Proceedings of the 8th Symposium on Networked Systems Design and Implementation (NSDI'11), 2011."},{"key":"e_1_3_2_1_36_1","unstructured":"Public posting now the default on Facebook. http:\/\/bit.ly\/RkoIWR.  Public posting now the default on Facebook. http:\/\/bit.ly\/RkoIWR."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833583"},{"key":"e_1_3_2_1_38_1","unstructured":"Rate limiting for yahoo! search web services. http:\/\/developer.yahoo.com\/search\/rate.html.  Rate limiting for yahoo! search web services. http:\/\/developer.yahoo.com\/search\/rate.html."},{"key":"e_1_3_2_1_39_1","unstructured":"Renren. http:\/\/www.renren.com.  Renren. http:\/\/www.renren.com."},{"key":"e_1_3_2_1_40_1","unstructured":"Spokeo privacy and safety concerns. http:\/\/en.wikipedia.org\/wiki\/Spokeo#Privacy_and_safety_concerns.  Spokeo privacy and safety concerns. http:\/\/en.wikipedia.org\/wiki\/Spokeo#Privacy_and_safety_concerns."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1531514.1531530"},{"key":"e_1_3_2_1_43_1","unstructured":"The day has come: Facebook pushes people to Go public. http:\/\/rww.to\/7Zhc6N.  The day has come: Facebook pushes people to Go public. http:\/\/rww.to\/7Zhc6N."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935171"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1558977.1558979"},{"key":"e_1_3_2_1_46_1","unstructured":"Twitter rate limiting. https:\/\/dev.twitter.com\/docs\/rate-limiting-faq#measurement.  Twitter rate limiting. https:\/\/dev.twitter.com\/docs\/rate-limiting-faq#measurement."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2012.6151333"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168867"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851226"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 3rd ACM SIGCOMM Workshop on Social Networks (WOSN'10)","author":"Wilson C.","year":"2010","unstructured":"C. Wilson , A. Sala , J. Bonneau , R. Zablit , and B. Y. Zhao . Don't tread on me: Moderating access to osn data with spikestrip . In Proceedings of the 3rd ACM SIGCOMM Workshop on Social Networks (WOSN'10) , 2010 . C. Wilson, A. Sala, J. Bonneau, R. Zablit, and B. Y. Zhao. Don't tread on me: Moderating access to osn data with spikestrip. In Proceedings of the 3rd ACM SIGCOMM Workshop on Social Networks (WOSN'10), 2010."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"}],"event":{"name":"CoNEXT '12: Conference on emerging Networking Experiments and Technologies","location":"Nice France","acronym":"CoNEXT '12","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 8th international conference on Emerging networking experiments and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413176.2413214","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2413176.2413214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:28Z","timestamp":1750234708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413176.2413214"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,10]]},"references-count":53,"alternative-id":["10.1145\/2413176.2413214","10.1145\/2413176"],"URL":"https:\/\/doi.org\/10.1145\/2413176.2413214","relation":{},"subject":[],"published":{"date-parts":[[2012,12,10]]},"assertion":[{"value":"2012-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}