Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3292522.3326015acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

RTbust: Exploiting Temporal Patterns for Botnet Detection on Twitter

Published: 26 June 2019 Publication History

Abstract

Within OSNs, many of our supposedly online friends may instead be fake accounts called social bots, part of large groups that purposely re-share targeted content. Here, we study retweeting behaviors on Twitter, with the ultimate goal of detecting retweeting social bots.We collect a dataset of 10M retweets. We design a novel visualization that we leverage to highlight benign and malicious patterns of retweeting activity. In this way, we uncover a ?normal" retweeting pattern that is peculiar of human-operated accounts, and suspicious patterns related to bot activities. Then, we propose a bot detection technique that stems from the previous exploration of retweeting behaviors. Our technique, called Retweet-Buster (RTbust), leverages unsupervised feature extraction and clustering. An LSTM autoencoder converts the retweet time series into compact and informative latent feature vectors, which are then clustered with a hierarchical density-based algorithm. Accounts belonging to large clusters characterized by malicious retweeting patterns are labeled as bots. RTbust obtains excellent detection results, with F1=0.87, whereas competitors achieve F1?0.76.Finally, we apply RTbust to a large dataset of retweets, uncovering 2 previously unknown active botnets with hundreds of accounts.

References

[1]
Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K Singh, Abdulrahman Alarifi, Anas Alfaris, and Alex Sandy Pentland. 2014. Twitter: who gets caught? observed trends in social microblogging spam. In ACM WebSci.
[2]
Marco Avvenuti, Salvatore Bellomo, Stefano Cresci, Mariantonietta Noemi La Polla, and Maurizio Tesconi. 2017. Hybrid crowdsensing: A novel paradigm to combine the strengths of opportunistic and participatory crowdsensing. In ACM WWW Companion.
[3]
Alessandro Bessi, Mauro Coletto, George Alexandru Davidescu, Antonio Scala, Guido Caldarelli, and Walter Quattrociocchi. 2015. Science vs conspiracy: Collective narratives in the age of misinformation. PloS one 10, 2 (2015).
[4]
Ricardo JGB Campello, Davoud Moulavi, and Jörg Sander. 2013. Density-based clustering based on hierarchical density estimates. In PAKDD.
[5]
Nikan Chavoshi, Hossein Hamooni, and Abdullah Mueen. 2016. DeBot: Twitter Bot Detection via Warped Correlation. In IEEE ICDM.
[6]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2015. Fame for sale: Efficient detection of fake Twitter followers. Decision Support Systems 80 (2015).
[7]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2016. DNA-inspired online behavioral modeling and its application to spambot detection. IEEE Intelligent Systems 31, 5 (2016).
[8]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race. In ACM WWW Companion.
[9]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2018. Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE TDSC 15, 4 (2018).
[10]
Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, and Stefano Tognazzi. 2019. On the capability of evolved spambots to evade detection via genetic engineering. Online Social Networks and Media 9 (2019).
[11]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. Exploiting digital DNA for the analysis of similarities in Twitter behaviours. In IEEE DSAA.
[12]
Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. BotOrNot: A System to Evaluate Social Bots. In ACM WWW Companion.
[13]
Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio Scala, Guido Caldarelli, H Eugene Stanley, and Walter Quattrociocchi. 2016. The spreading of misinformation online. PNAS 113, 3 (2016).
[14]
Michela Del Vicario, Gianna Vivaldo, Alessandro Bessi, Fabiana Zollo, Antonio Scala, Guido Caldarelli, and Walter Quattrociocchi. 2016. Echo chambers: Emotional contagion and group polarization on facebook. Scientific reports 6 (2016).
[15]
Pedro Domingos. 2012. A few useful things to know about machine learning. Commun. ACM 55, 10 (2012).
[16]
Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016).
[17]
Syeda Nadia Firdaus, Chen Ding, and Alireza Sadeghian. 2018. Retweet: A popular information diffusion mechanism--A survey paper. Online Social Networks and Media 6 (2018).
[18]
Maria Giatsoglou, Despoina Chatzakou, Neil Shah, Christos Faloutsos, and Athena Vakali. 2015. Retweeting activity on twitter: Signs of deception. In PAKDD.
[19]
Zafar Gilani, Ekaterina Kochmar, and Jon Crowcroft. 2017. Classification of twitter accounts into automated agents and human users. In IEEE/ACM ASONAM.
[20]
Manuel Gomez-Rodriguez, Krishna P Gummadi, and Bernhard Schoelkopf. 2014. Quantifying Information Overload in Social Media and Its Impact on Social Contagions. In AAAI ICWSM.
[21]
Christian Grimme, Dennis Assenmacher, and Lena Adam. 2018. Changing Perspectives: Is It Sufficient to Detect Social Bots?. In SCSM.
[22]
Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, and Dino Pedreschi. 2018. A survey of methods for explaining black box models. ACM CSUR 51, 5 (2018).
[23]
Tian Guo, Zhao Xu, Xin Yao, Haifeng Chen, Karl Aberer, and Koichi Funaya. 2016. Robust online time series prediction with recurrent neural networks. In IEEE DSAA.
[24]
Sonu Gupta, Ponnurangam Kumaraguru, and Tanmoy Chakraborty. 2019. Mal- ReG: Detecting and Analyzing Malicious Retweeter Groups. In ACM CoDSCOMAD.
[25]
Carlos X Hernández, Hannah KWayment-Steele, MohammadMSultan, Brooke E Husic, and Vijay S Pande. 2018. Variational encoding of complex dynamics. Physical Review E 97, 6 (2018).
[26]
Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang. 2016. Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach. ACM TKDD 10, 4 (2016).
[27]
Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang. 2016. Inferring lockstep behavior from connectivity pattern in large graphs. KAIS 48, 2 (2016).
[28]
Christian Kater and Robert Jäschke. 2016. You shall not pass: detecting malicious users at registration time. In ACM WebSci Workshops.
[29]
Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. In IEEE ICML.
[30]
Sangho Lee and Jong Kim. 2014. Early filtering of ephemeral malicious accounts on Twitter. Computer Communications 54 (2014).
[31]
Shenghua Liu, Bryan Hooi, and Christos Faloutsos. 2017. HoloScope: Topologyand- Spike Aware Fraud Detection. In ACM CIKM.
[32]
Shenghua Liu, Bryan Hooi, and Christos Faloutsos. 2018. A Contrast Metric for Fraud Detection in Rich Graphs. IEEE TKDE (2018).
[33]
Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research (2008).
[34]
Gregory Maus. 2017. A Typology of Socialbots (Abbrev.). In ACM WebSci.
[35]
Qinxue Meng, Daniel Catchpoole, David Skillicom, and Paul J Kennedy. 2017. Relational autoencoder for feature extraction. In IEEE IJCNN.
[36]
Zachary Miller, Brian Dickinson, William Deitrick, Wei Hu, and Alex Hai Wang. 2014. Twitter spammer detection using data stream clustering. Information Sciences 260 (2014).
[37]
David Martin Ward Powers. 2011. Evaluation: from Precision, Recall and FMeasure to ROC, informedness, markedness and correlation. International Journal of Machine Learning Technologies 2, 1 (2011).
[38]
Walter Quattrociocchi. 2017. Inside the echo chamber. Scientific American 316, 4 (2017).
[39]
Saiph Savage, Andres Monroy-Hernandez, and Tobias Höllerer. 2016. Botivist: Calling volunteers to action using online bots. In ACM CSCW.
[40]
Massimo Stella, Emilio Ferrara, and Manlio De Domenico. 2018. Bots increase exposure to negative and inflammatory content in online social systems. PNAS 115, 49 (2018).
[41]
L Steward, Ahmer Arif, and Kate Starbird. 2018. Examining Trolls and Polarization with a Retweet Network. In ACM WSDM Workshops.
[42]
Stefano Tognazzi, Stefano Cresci, Marinella Petrocchi, and Angelo Spognardi. 2018. From Reaction to Proaction: UnexploredWays to the Detection of Evolving Spambots. In ACM WWW Companion.
[43]
Nguyen Vo, Kyumin Lee, Cheng Cao, Thanh Tran, and Hongkyu Choi. 2017. Revealing and detecting malicious retweeter groups. In IEEE/ACM ASONAM.
[44]
Kai-Cheng Yang, Onur Varol, Clayton A Davis, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2019. Arming the public with AI to counter social bots. Human Behavior and Emerging Technologies (2019).
[45]
Fabiana Zollo, Alessandro Bessi, Michela Del Vicario, Antonio Scala, Guido Caldarelli, Louis Shekhtman, Shlomo Havlin, and Walter Quattrociocchi. 2017. Debunking in a world of tribes. PloS one 12, 7 (2017).

Cited By

View all
  • (2024)Post-hoc Evaluation of Nodes Influence in Information Cascades: The Case of Coordinated AccountsACM Transactions on the Web10.1145/3700644Online publication date: 17-Oct-2024
  • (2024)Unsupervised Social Bot Detection via Structural Information TheoryACM Transactions on Information Systems10.1145/366052242:6(1-42)Online publication date: 19-Aug-2024
  • (2024)Networks and Influencers in Online Propaganda Events: A Comparative Study of Three Cases in IndiaProceedings of the ACM on Human-Computer Interaction10.1145/36537098:CSCW1(1-27)Online publication date: 26-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WebSci '19: Proceedings of the 10th ACM Conference on Web Science
June 2019
395 pages
ISBN:9781450362023
DOI:10.1145/3292522
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. osn security
  2. retweet patterns
  3. social bots
  4. twitter

Qualifiers

  • Research-article

Conference

WebSci '19
Sponsor:
WebSci '19: 11th ACM Conference on Web Science
June 30 - July 3, 2019
Massachusetts, Boston, USA

Acceptance Rates

WebSci '19 Paper Acceptance Rate 41 of 130 submissions, 32%;
Overall Acceptance Rate 245 of 933 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)114
  • Downloads (Last 6 weeks)11
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Post-hoc Evaluation of Nodes Influence in Information Cascades: The Case of Coordinated AccountsACM Transactions on the Web10.1145/3700644Online publication date: 17-Oct-2024
  • (2024)Unsupervised Social Bot Detection via Structural Information TheoryACM Transactions on Information Systems10.1145/366052242:6(1-42)Online publication date: 19-Aug-2024
  • (2024)Networks and Influencers in Online Propaganda Events: A Comparative Study of Three Cases in IndiaProceedings of the ACM on Human-Computer Interaction10.1145/36537098:CSCW1(1-27)Online publication date: 26-Apr-2024
  • (2024)On the Influence and Political Leaning of Overlap between Propaganda CommunitiesACM Journal on Computing and Sustainable Societies10.1145/36407902:2(1-24)Online publication date: 17-Jan-2024
  • (2024)Unmasking the Web of Deceit: Uncovering Coordinated Activity to Expose Information Operations on TwitterProceedings of the ACM Web Conference 202410.1145/3589334.3645529(2530-2541)Online publication date: 13-May-2024
  • (2024)Early Detection and Prevention of Malicious User Behavior on Twitter Using Deep Learning TechniquesIEEE Transactions on Computational Social Systems10.1109/TCSS.2024.341917111:5(6649-6661)Online publication date: Oct-2024
  • (2024)Improving IoT Security With Explainable AI: Quantitative Evaluation of Explainability for IoT Botnet DetectionIEEE Internet of Things Journal10.1109/JIOT.2024.336062611:10(18237-18254)Online publication date: 15-May-2024
  • (2024)Fine-Tuned Understanding: Enhancing Social Bot Detection With Transformer-Based ClassificationIEEE Access10.1109/ACCESS.2024.344065712(118250-118269)Online publication date: 2024
  • (2024)A Hybrid Deep Learning Architecture for Social Media Bots Detection Based on BiGRU-LSTM and GloVe Word EmbeddingIEEE Access10.1109/ACCESS.2024.343085912(100278-100294)Online publication date: 2024
  • (2024)Detection and impact estimation of social bots in the Chilean Twitter networkScientific Reports10.1038/s41598-024-57227-314:1Online publication date: 19-Mar-2024
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media