Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Attacking Social Media via Behavior Poisoning

Published: 19 June 2024 Publication History
  • Get Citation Alerts
  • Abstract

    Since social media such as Facebook and X (formerly known as Twitter) have permeated various aspects of daily life, people have strong incentives to influence information dissemination on these platforms and differentiate their content from the fierce competition. Existing dissemination strategies typically employ marketing techniques, such as seeking publicity through renowned actors or targeted advertising placements. Despite their various forms, most simply spread information to strengthen user impressions without conducting formal analyses of specific influence enhancement. And coupled with high costs, most fall short of expectations. To this end, we ingeniously formulate the task of social media dissemination as poisoning attacks, which influence specified content’s dissemination among target users by intervening in some users’ social media behaviors (including retweeting, following, and profile modifying). Correspondingly, we propose a novel poisoning attack, Influence-based Social Media Attack (ISMA) to generate discrete poisoning behaviors, which is difficult to achieve with existing attacks. In ISMA, we first contribute an efficient influence evaluator to quantify the spread influence of poisoning behaviors. Based on the estimated influence, we then present an imperceptible hierarchical selector and a profile modification method ProMix to select influential behaviors to poison. Notably, our attack is driven by custom attack objectives, which allows one to flexibly design different optimization goals to change the information flow, which could solve the blindness of existing influence maximization methods. Besides, behaviors such as retweeting are gentle and simple to implement. These properties make our attack more cost-effective and practical. Extensive experiments on two large-scale real-world datasets demonstrate the superiority of our method as it significantly outperforms baselines, and additionally, the proposed evaluator’s analysis of user influence provides new insights for influence maximization on social media.

    References

    [1]
    Naman Agarwal, Brian Bullins, and Elad Hazan. 2016. Second-order stochastic optimization in linear time. Stat 1050 (2016), 15.
    [2]
    Rand H. Al-Dmour, Hani H. Al-Dmour, and Eatedalameen Ahmadamin. 2023. The influence of social marketing drives on customer satisfaction via demographic variables as moderating factors. Int. J. E-Bus. Res. 19, 1 (2023), 1–13.
    [3]
    Sinan Aral and Dylan Walker. 2012. Identifying influential and susceptible members of social networks. Science 337, 6092 (2012), 337–341.
    [4]
    David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent dirichlet allocation. J. Mach.Learn. Res. 3 (2003), 993–1022.
    [5]
    Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and Krishna Gummadi. 2010. Measuring user influence in twitter: The million follower fallacy. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 4.
    [6]
    Jin Chen, Ju Xu, Gangwei Jiang, Tiezheng Ge, Zhiqiang Zhang, Defu Lian, and Kai Zheng. 2021. Automated creative optimization for e-commerce advertising. In Proceedings of the Web Conference 2021. 2304–2313.
    [7]
    Wei Chen, Tian Lin, Zihan Tan, Mingfei Zhao, and Xuren Zhou. 2016. Robust influence maximization. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 795–804.
    [8]
    Matteo Cinelli, Walter Quattrociocchi, Alessandro Galeazzi, Carlo Michele Valensise, Emanuele Brugnoli, Ana Lucia Schmidt, Paola Zola, Fabiana Zollo, and Antonio Scala. 2020. The COVID-19 social media infodemic. Sci. Rep. 10, 1 (2020), 1–10.
    [9]
    Marijke De Veirman, Veroline Cauberghe, and Liselot Hudders. 2017. Marketing through Instagram influencers: The impact of number of followers and product divergence on brand attitude. Int. J. Advert. 36, 5 (2017), 798–828.
    [10]
    Leyan Deng, Chenwang Wu, Defu Lian, Yongji Wu, and Enhong Chen. 2022. Markov-driven graph convolutional networks for social spammer detection. IEEE Trans. Knowl. Data Eng. 35, 12 (2022), 12310–12323.
    [11]
    Pedro Domingos and Matt Richardson. 2001. Mining the network value of customers. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD ’01). 57–66.
    [12]
    Changjun Fan, Li Zeng, Yizhou Sun, and Yang-Yu Liu. 2020. Finding key players in complex networks through deep reinforcement learning. Nat. Mach. Intell. 2, 6 (2020), 317–324.
    [13]
    Shuman Fang, Jie Li, Xianming Lin, and Rongrong Ji. 2022. Learning to learn transferable attack. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 36. 571–579.
    [14]
    Wei Feng and Jianyong Wang. 2013. Retweet or not? Personalized tweet re-ranking. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM ’13). 577–586.
    [15]
    Syeda Nadia Firdaus, Chen Ding, and Alireza Sadeghian. 2021. Retweet prediction based on topic, emotion and personality. Online Soc. Netw. Media 25 (2021), 100165.
    [16]
    Jonas Geiping, Liam H. Fowl, W. Ronny Huang, Wojciech Czaja, Gavin Taylor, Michael Moeller, and Tom Goldstein. 2020. Witches’ brew: Industrial scale data poisoning via gradient matching. In International Conference on Learning Representations. 2020.
    [17]
    Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. Proceedings of the International Conference on Learning Representations (ICLR ’15) (2015).
    [18]
    Taher H. Haveliwala. 2003. Topic-sensitive pagerank: A context-sensitive ranking algorithm for web search. IEEE Trans. Knowl. Data Eng. 15, 4 (2003), 784–796.
    [19]
    Rui Hu, Yuanxiong Guo, Miao Pan, and Yanmin Gong. 2019. Targeted poisoning attacks on social recommender systems. In Proceedings of the IEEE Global Communications Conference (GLOBECOM ’19). IEEE, 1–6.
    [20]
    Yanqing Hu, Shenggong Ji, Yuliang Jin, Ling Feng, H Eugene Stanley, and Shlomo Havlin. 2018. Local structure can identify and quantify influential global spreaders in large scale social networks. Proc. Natl. Acad. Sci. U.S.A. 115, 29 (2018), 7468–7472.
    [21]
    W Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, and Tom Goldstein. 2020. Metapoison: Practical general-purpose clean-label data poisoning. In Advances in Neural Information Processing Systems, Vol. 33, 12080–12091.
    [23]
    Bo Jiang, Zhigang Lu, Ning Li, Jianjun Wu, and Zhengwei Jiang. 2018. Retweet prediction using social-aware probabilistic matrix factorization. In International Conference on Computational Science. Springer, 316–327.
    [24]
    Jonas L. Juul and Johan Ugander. 2021. Comparing information diffusion mechanisms by matching on cascade size. Proc. Natl. Acad. Sci. U.S.A. 118, 46 (2021), e2100786118.
    [25]
    K. D. D. CUP. 2012. Predict Which Users (or Information Sources) One User Might Follow in Tencent Weibo. Retrieved from https://www.kaggle.com/c/kddcup2012-track1
    [26]
    Moein Khajehnejad, Ahmad Asgharian Rezaei, Mahmoudreza Babaei, Jessica Hoffmann, Mahdi Jalili, and Adrian Weller. 2021. Adversarial graph embeddings for fair influence maximization over social networks. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI ’21). 4306–4312.
    [27]
    Dam Hee Kim, S Mo Jones-Jang, and Kate Kenski. 2021. Why do people share political information on social media? Digit. Journal. 9, 8 (2021), 1123–1140.
    [28]
    Thomas N. Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. In Proceedings of the International Conference on Learning Representations (2015), 1–14.
    [29]
    Maksim Kitsak, Lazaros K. Gallos, Shlomo Havlin, Fredrik Liljeros, Lev Muchnik, H Eugene Stanley, and Hernán A. Makse. 2010. Identification of influential spreaders in complex networks. Nat. Phys. 6, 11 (2010), 888–893.
    [30]
    Pang Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. In Proceedings of the International Conference on Machine Learning (ICML ’17). PMLR, 1885–1894.
    [31]
    Stephan Lewandowsky, Ullrich K. H. Ecker, Colleen M. Seifert, Norbert Schwarz, and John Cook. 2012. Misinformation and its correction: Continued influence and successful debiasing. Psychol. Sci. Publ. Interest 13, 3 (2012), 106–131.
    [32]
    Jingxuan Li, Wei Peng, Tao Li, Tong Sun, Qianmu Li, and Jian Xu. 2014. Social network user influence sense-making and dynamics prediction. Expert Syst. Appl. 41, 11 (2014), 5115–5124.
    [33]
    Jiaying Li, Hanxuan Zhao, and Yanhong Zheng. 2022. The analysis on strategies of building enterprises’ brand image under the background of rising network stream media platform. In Proceedings of the 8th International Conference on Humanities and Social Science Research (ICHSSR ’22). Atlantis Press, 1071–1077.
    [34]
    Rebecca Lieb. 2012. Content Marketing: Think Like a Publisher—How to Use Content to Market Online and in Social Media. Que.
    [35]
    Zhunchen Luo, Miles Osborne, Jintao Tang, and Ting Wang. 2013. Who will retweet me? Finding retweeters in Twitter. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR ’13). 869–872.
    [36]
    Renfeng Ma, Xiangkun Hu, Qi Zhang, Xuanjing Huang, and Yu-Gang Jiang. 2019. Hot topic-aware retweet prediction with masked self-attentive model. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR ’19). 525–534.
    [37]
    Kevin Makice. 2009. Twitter API: Up and Running: Learn How to Build Applications with the Twitter API. O’Reilly Media, Inc.
    [38]
    Hangyu Mao, Yang Xiao, Yuan Wang, Jiakang Wang, and Zhen Xiao. 2018. Topic-specific retweet count ranking for weibo. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 625–637.
    [39]
    Eli Meirom, Haggai Maron, Shie Mannor, and Gal Chechik. 2021. Controlling graph dynamics with reinforcement learning and graph neural networks. In Proceedings of the International Conference on Machine Learning. PMLR, 7565–7577.
    [40]
    Flaviano Morone and Hernán A. Makse. 2015. Influence maximization in complex networks through optimal percolation. Nature 524, 7563 (2015), 65–68.
    [41]
    Rubathee Nadaraja and Rashad Yazdanifard. 2013. Social media marketing: Advantages and disadvantages. Social Media Marketing. 1–10.
    [42]
    Nasir Naveed, Thomas Gottron, Jérôme Kunegis, and Arifah Che Alhadi. 2011. Bad news travel fast: A content-based analysis of interestingness on twitter. In Proceedings of the 3rd International Web Science Conference. 1–7.
    [43]
    Huan-Kai Peng, Jiang Zhu, Dongzhen Piao, Rong Yan, and Ying Zhang. 2011. Retweet modeling using conditional random fields. In Proceedings of the IEEE 11th International Conference on Data Mining Workshops. IEEE, 336–343.
    [44]
    Fabián Riquelme and Pablo González-Cantergiani. 2016. Measuring user influence on Twitter: A survey. Inf. Process. Manage. 52, 5 (2016), 949–975.
    [45]
    Everett M. Rogers. 1962. Bibliography on the diffusion of innovations. Mimeo bulletin. Department of agricultural exonomics and rural sociology. Ohio Agricultural Experiment Station (no. AE 328) (1962).
    [46]
    Gwendolyn Seidman. 2013. Self-presentation and belonging on Facebook: How personality influences social media use and motivations. Pers. Indiv. Dif. 54, 3 (2013), 402–407.
    [47]
    Constantino Stavros, Matthew D. Meng, Kate Westberg, and Francis Farrelly. 2014. Understanding fan motivation for interacting on social media. Sport Manage. Rev. 17, 4 (2014), 455–469.
    [48]
    Stefan Stieglitz and Linh Dang-Xuan. 2013. Emotions and information diffusion in social media—Sentiment of microblogs and sharing behavior. J. Manage. Inf. Syst. 29, 4 (2013), 217–248.
    [49]
    Caihong Sun, Lu Zhang, and Qian Li. 2013. Who are influentials on micro-blogging services: Evidence from social network analysis. In Proceedings of the 17th Pacific Asia Conference on Information Systems. 1–25.
    [50]
    Zhiyi Tian, Lei Cui, Jie Liang, and Shui Yu. 2022. A comprehensive survey on poisoning attacks and countermeasures in machine learning. Comput. Surv. 55, 8 (2022), 1–35.
    [51]
    Jing Wang and Yue Yang. 2021. Tweet retweet prediction based on deep multitask learning. Neural Process. Lett. (2021), 1–14.
    [52]
    Shiyao Wang, Qi Liu, Yicheng Zhong, Zhilong Zhou, Tiezheng Ge, Defu Lian, and Yuning Jiang. 2022. CreaGAN: An automatic creative generation framework for display advertising. In Proceedings of the 30th ACM International Conference on Multimedia. 7261–7269.
    [53]
    Bo Wu, Wen-Huang Cheng, Yongdong Zhang, Juan Cao, Jintao Li, and Tao Mei. 2018. Unlocking author power: On the exploitation of auxiliary author-retweeter relations for predicting key retweeters. IEEE Trans. Knowl. Data Eng. 32, 3 (2018), 547–559.
    [54]
    Chenwang Wu, Defu Lian, Yong Ge, Zhihao Zhu, and Enhong Chen. 2021. Triple adversarial learning for influence based poisoning attack in recommender systems. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD ’21). 1830–1840.
    [55]
    Chenwang Wu, Defu Lian, Yong Ge, Zhihao Zhu, and Enhong Chen. 2023. Influence-driven data poisoning for robust recommender systems. IEEE Trans. Pattern Anal. Mach. Intell. (2023).
    [56]
    Wenwen Xia, Yuchen Li, Jun Wu, and Shenghong Li. 2021. Deepis: Susceptibility estimation on social networks. In Proceedings of the 14th ACM International Conference on Web Search and Data Mining. 761–769.
    [57]
    Jiarong Xie, Xiangrong Wang, Ling Feng, Jin-Hua Zhao, Wenyuan Liu, Yamir Moreno, and Yanqing Hu. 2022. Indirect influence in social networks as an induced percolation phenomenon. Proc. Nat.l Acad. Sci. U.S.A. 119, 9 (2022), e2100151119.
    [58]
    Jaewon Yang and Jure Leskovec. 2011. Patterns of temporal variation in online media. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM ’11). 177–186.
    [59]
    Meng Yu, Zhiyong Li, Zhicheng Yu, Jiaxin He, and Jingyan Zhou. 2021. Communication related health crisis on social media: A case of COVID-19 outbreak. Curr. Iss. Tour. 24, 19 (2021), 2699–2705.
    [60]
    Nicholas Jing Yuan, Yuan Zhong, Fuzheng Zhang, Xing Xie, Chin-Yew Lin, and Yong Rui. 2016. Who will reply to/retweet this tweet? The dynamics of intimacy from online social interactions. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM ’16). 3–12.
    [61]
    Sangdoo Yun, Dongyoon Han, Seong Joon Oh, Sanghyuk Chun, Junsuk Choe, and Youngjoon Yoo. 2019. Cutmix: Regularization strategy to train strong classifiers with localizable features. In Proceedings of the Conference on Computer Vision and Pattern Recognition (CVPR ’19). 6023–6032.
    [62]
    Jing Zhang, Biao Liu, Jie Tang, Ting Chen, and Juanzi Li. 2013. Social influence locality for modeling retweeting behaviors. In Proceeding of the International Joint Conference on Artificial Intelligence (IJCAI ’13).
    [63]
    Qi Zhang, Yeyun Gong, Ya Guo, and Xuanjing Huang. 2015. Retweet behavior prediction using hierarchical dirichlet process. In Proceedings of the AAAI International Conference on Artificial Intelligence (AAAI ’15), Vol. 29.
    [64]
    Qi Zhang, Yeyun Gong, Jindou Wu, Haoran Huang, and Xuanjing Huang. 2016. Retweet prediction with attention-based deep neural network. In Proceedings of the Conference on Information and Knowledge Management (CIKM ’16). 75–84.
    [65]
    Ping Zhao, Haojun Huang, Xiaohui Zhao, and Daiyu Huang. 2020. P 3: Privacy-preserving scheme against poisoning attacks in mobile-edge computing. IEEE Trans. Comput. Soc. Syst. 7, 3 (2020), 818–826.
    [66]
    Zhengyu Zhao, Zhuoran Liu, and Martha Larson. 2021. On success and simplicity: A second look at transferable targeted attacks. In Advances in Neural Information Processing Systems 34, 6115–6128.
    [67]
    Xiaokang Zhou, Wei Liang, Zijia Luo, and Yi Pan. 2021. Periodic-aware intelligent prediction model for information diffusion in social networks. IEEE Trans. Netw. Sci. Eng. 8, 2 (2021), 894–904.
    [68]
    Jianming Zhu, Smita Ghosh, and Weili Wu. 2019. Group influence maximization problem in social networks. IEEE Trans. Comput. Soc. Syst. 6, 6 (2019), 1156–1164.

    Index Terms

    1. Attacking Social Media via Behavior Poisoning

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Knowledge Discovery from Data
      ACM Transactions on Knowledge Discovery from Data  Volume 18, Issue 7
      August 2024
      505 pages
      ISSN:1556-4681
      EISSN:1556-472X
      DOI:10.1145/3613689
      • Editor:
      • Jian Pei
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 June 2024
      Online AM: 27 March 2024
      Accepted: 17 March 2024
      Revised: 28 February 2024
      Received: 30 August 2023
      Published in TKDD Volume 18, Issue 7

      Check for updates

      Author Tags

      1. Social media
      2. poisoning attacks
      3. social activity

      Qualifiers

      • Research-article

      Funding Sources

      • National Key R&D Program of China
      • National Natural Science Foundation of China

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 146
        Total Downloads
      • Downloads (Last 12 months)146
      • Downloads (Last 6 weeks)37

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media