Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3132847.3133050acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
short-paper

Detecting Social Bots by Jointly Modeling Deep Behavior and Content Information

Published: 06 November 2017 Publication History

Abstract

Bots are regarded as the most common kind of malwares in the era of Web 2.0. In recent years, Internet has been populated by hundreds of millions of bots, especially on social media. Thus, the demand on effective and efficient bot detection algorithms is more urgent than ever. Existing works have partly satisfied this requirement by way of laborious feature engineering. In this paper, we propose a deep bot detection model aiming to learn an effective representation of social user and then detect social bots by jointly modeling social behavior and content information. The proposed model learns the representation of social behavior by encoding both endogenous and exogenous factors which affect user behavior. As to the representation of content, we regard the user content as temporal text data instead of just plain text as be treated in other existing works to extract semantic information and latent temporal patterns. To the best of our knowledge, this is the first trial that applies deep learning in modeling social users and accomplishing social bot detection. Experiments on real world dataset collected from Twitter demonstrate the effectiveness of the proposed model.

References

[1]
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. 2013. Design and analysis of a social botnet. Computer Networks, Vol. 57, 2 (2013), 556--578.
[2]
Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 197--210.
[3]
Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia. 2010. Who is tweeting on Twitter: human, bot, or cyborg? Proceedings of the 26th annual computer security applications conference. ACM, 21--30.
[4]
John P Dickerson, Vadim Kagan, and VS Subrahmanian. 2014. Using sentiment to detect bots on Twitter: Are humans more opinionated than bots? Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on. IEEE, 620--627.
[5]
Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2014. The rise of social bots. arXiv preprint arXiv:1407.5225 (2014).
[6]
Alceu Ferraz Costa, Yuto Yamaguchi, Agma Juci Machado Traina, Caetano Traina Jr, and Christos Faloutsos. 2015. Rsc: Mining and modeling temporal activity in social media Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 269--278.
[7]
Zafar Gilani, Liang Wang, Jon Crowcroft, Mario Almeida, and Reza Farahbakhsh. 2016. Stweeler: A Framework for Twitter Bot Analysis. In Proceedings of the 25th International Conference Companion on World Wide Web. International World Wide Web Conferences Steering Committee, 37--38.
[8]
Yuede Ji, Qiang Li, Yukun He, and Dong Guo. 2015. BotCatch: leveraging signature and behavior for bot detection. Security and Communication Networks Vol. 8, 6 (2015), 952--969.
[9]
Kyumin Lee, James Caverlee, and Steve Webb. 2010. Uncovering social spammers: social honeypots
[10]
machine learning Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval. ACM, 435--442.
[11]
Kyumin Lee, Brian David Eoff, and James Caverlee. 2011. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. ICWSM.
[12]
Juan Martinez-Romo and Lourdes Araujo. 2013. Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Systems with Applications Vol. 40, 8 (2013), 2992--3000.
[13]
Fred Morstatter, Liang Wu, Tahora H Nazer, Kathleen M Carley, and Huan Liu. 2016. A new approach to bot detection: striking the balance between precision and recall Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE, 533--540.
[14]
Iren Tankova, Ana Adan, and Gualberto Buela-Casal. 1994. Circadian typology and individual differences. A review. Personality and individual differences Vol. 16, 5 (1994), 671--684.
[15]
Bimal Viswanath, Ansley Post, Krishna P Gummadi, and Alan Mislove. 2010. An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review Vol. 40, 4 (2010), 363--374.
[16]
Matthew D Zeiler. 2012. ADADELTA: an adaptive learning rate method. arXiv preprint arXiv:1212.5701 (2012).

Cited By

View all
  • (2024)Networks and Influencers in Online Propaganda Events: A Comparative Study of Three Cases in IndiaProceedings of the ACM on Human-Computer Interaction10.1145/36537098:CSCW1(1-27)Online publication date: 26-Apr-2024
  • (2024)Multimodal Detection of Bots on X (Twitter) Using TransformersIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.343513819(7320-7334)Online publication date: 1-Jan-2024
  • (2024)Performance evaluation of lightweight network-based bot detection using mouse movementsEngineering Applications of Artificial Intelligence10.1016/j.engappai.2024.108801135(108801)Online publication date: Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '17: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management
November 2017
2604 pages
ISBN:9781450349185
DOI:10.1145/3132847
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. behavior factors
  2. bot detection
  3. deep learning
  4. temporal content

Qualifiers

  • Short-paper

Funding Sources

Conference

CIKM '17
Sponsor:

Acceptance Rates

CIKM '17 Paper Acceptance Rate 171 of 855 submissions, 20%;
Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)51
  • Downloads (Last 6 weeks)10
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Networks and Influencers in Online Propaganda Events: A Comparative Study of Three Cases in IndiaProceedings of the ACM on Human-Computer Interaction10.1145/36537098:CSCW1(1-27)Online publication date: 26-Apr-2024
  • (2024)Multimodal Detection of Bots on X (Twitter) Using TransformersIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.343513819(7320-7334)Online publication date: 1-Jan-2024
  • (2024)Performance evaluation of lightweight network-based bot detection using mouse movementsEngineering Applications of Artificial Intelligence10.1016/j.engappai.2024.108801135(108801)Online publication date: Sep-2024
  • (2024)GNNRI: detecting anomalous social network users through heterogeneous information networks and user relevance explorationInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02392-0Online publication date: 26-Sep-2024
  • (2024)Social media bot detection using Dropout-GANJournal of Computer Virology and Hacking Techniques10.1007/s11416-024-00521-5Online publication date: 2-May-2024
  • (2024)A Social Bot Detection Method Using Multi-features Fusion and Model Optimization StrategyWeb and Big Data10.1007/978-981-97-2390-4_24(347-362)Online publication date: 28-Apr-2024
  • (2023)SqueezeGCN: Adaptive Neighborhood Aggregation with Squeeze Module for Twitter Bot Detection Based on GCNElectronics10.3390/electronics1301005613:1(56)Online publication date: 21-Dec-2023
  • (2023)Evolving Bots: The New Generation of Comment Bots and their Underlying Scam Campaigns in YouTubeProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624822(297-312)Online publication date: 24-Oct-2023
  • (2023)Fighting False Information from Propagation Process: A SurveyACM Computing Surveys10.1145/356338855:10(1-38)Online publication date: 2-Feb-2023
  • (2023)AI-based MultiModal to Identify State-linked Social Media Accounts in the Middle East: A Study on Twitter2023 IEEE International Conference on Intelligence and Security Informatics (ISI)10.1109/ISI58743.2023.10297235(1-6)Online publication date: 2-Oct-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media