Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Attacking Social Media via Behavior Poisoning

Published: 19 June 2024 Publication History

Abstract

Since social media such as Facebook and X (formerly known as Twitter) have permeated various aspects of daily life, people have strong incentives to influence information dissemination on these platforms and differentiate their content from the fierce competition. Existing dissemination strategies typically employ marketing techniques, such as seeking publicity through renowned actors or targeted advertising placements. Despite their various forms, most simply spread information to strengthen user impressions without conducting formal analyses of specific influence enhancement. And coupled with high costs, most fall short of expectations. To this end, we ingeniously formulate the task of social media dissemination as poisoning attacks, which influence specified content’s dissemination among target users by intervening in some users’ social media behaviors (including retweeting, following, and profile modifying). Correspondingly, we propose a novel poisoning attack, Influence-based Social Media Attack (ISMA) to generate discrete poisoning behaviors, which is difficult to achieve with existing attacks. In ISMA, we first contribute an efficient influence evaluator to quantify the spread influence of poisoning behaviors. Based on the estimated influence, we then present an imperceptible hierarchical selector and a profile modification method ProMix to select influential behaviors to poison. Notably, our attack is driven by custom attack objectives, which allows one to flexibly design different optimization goals to change the information flow, which could solve the blindness of existing influence maximization methods. Besides, behaviors such as retweeting are gentle and simple to implement. These properties make our attack more cost-effective and practical. Extensive experiments on two large-scale real-world datasets demonstrate the superiority of our method as it significantly outperforms baselines, and additionally, the proposed evaluator’s analysis of user influence provides new insights for influence maximization on social media.

References

[1]
Naman Agarwal, Brian Bullins, and Elad Hazan. 2016. Second-order stochastic optimization in linear time. Stat 1050 (2016), 15.
[2]
Rand H. Al-Dmour, Hani H. Al-Dmour, and Eatedalameen Ahmadamin. 2023. The influence of social marketing drives on customer satisfaction via demographic variables as moderating factors. Int. J. E-Bus. Res. 19, 1 (2023), 1–13.
[3]
Sinan Aral and Dylan Walker. 2012. Identifying influential and susceptible members of social networks. Science 337, 6092 (2012), 337–341.
[4]
David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent dirichlet allocation. J. Mach.Learn. Res. 3 (2003), 993–1022.
[5]
Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and Krishna Gummadi. 2010. Measuring user influence in twitter: The million follower fallacy. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 4.
[6]
Jin Chen, Ju Xu, Gangwei Jiang, Tiezheng Ge, Zhiqiang Zhang, Defu Lian, and Kai Zheng. 2021. Automated creative optimization for e-commerce advertising. In Proceedings of the Web Conference 2021. 2304–2313.
[7]
Wei Chen, Tian Lin, Zihan Tan, Mingfei Zhao, and Xuren Zhou. 2016. Robust influence maximization. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 795–804.
[8]
Matteo Cinelli, Walter Quattrociocchi, Alessandro Galeazzi, Carlo Michele Valensise, Emanuele Brugnoli, Ana Lucia Schmidt, Paola Zola, Fabiana Zollo, and Antonio Scala. 2020. The COVID-19 social media infodemic. Sci. Rep. 10, 1 (2020), 1–10.
[9]
Marijke De Veirman, Veroline Cauberghe, and Liselot Hudders. 2017. Marketing through Instagram influencers: The impact of number of followers and product divergence on brand attitude. Int. J. Advert. 36, 5 (2017), 798–828.
[10]
Leyan Deng, Chenwang Wu, Defu Lian, Yongji Wu, and Enhong Chen. 2022. Markov-driven graph convolutional networks for social spammer detection. IEEE Trans. Knowl. Data Eng. 35, 12 (2022), 12310–12323.
[11]
Pedro Domingos and Matt Richardson. 2001. Mining the network value of customers. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD ’01). 57–66.
[12]
Changjun Fan, Li Zeng, Yizhou Sun, and Yang-Yu Liu. 2020. Finding key players in complex networks through deep reinforcement learning. Nat. Mach. Intell. 2, 6 (2020), 317–324.
[13]
Shuman Fang, Jie Li, Xianming Lin, and Rongrong Ji. 2022. Learning to learn transferable attack. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 36. 571–579.
[14]
Wei Feng and Jianyong Wang. 2013. Retweet or not? Personalized tweet re-ranking. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM ’13). 577–586.
[15]
Syeda Nadia Firdaus, Chen Ding, and Alireza Sadeghian. 2021. Retweet prediction based on topic, emotion and personality. Online Soc. Netw. Media 25 (2021), 100165.
[16]
Jonas Geiping, Liam H. Fowl, W. Ronny Huang, Wojciech Czaja, Gavin Taylor, Michael Moeller, and Tom Goldstein. 2020. Witches’ brew: Industrial scale data poisoning via gradient matching. In International Conference on Learning Representations. 2020.
[17]
Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. Proceedings of the International Conference on Learning Representations (ICLR ’15) (2015).
[18]
Taher H. Haveliwala. 2003. Topic-sensitive pagerank: A context-sensitive ranking algorithm for web search. IEEE Trans. Knowl. Data Eng. 15, 4 (2003), 784–796.
[19]
Rui Hu, Yuanxiong Guo, Miao Pan, and Yanmin Gong. 2019. Targeted poisoning attacks on social recommender systems. In Proceedings of the IEEE Global Communications Conference (GLOBECOM ’19). IEEE, 1–6.
[20]
Yanqing Hu, Shenggong Ji, Yuliang Jin, Ling Feng, H Eugene Stanley, and Shlomo Havlin. 2018. Local structure can identify and quantify influential global spreaders in large scale social networks. Proc. Natl. Acad. Sci. U.S.A. 115, 29 (2018), 7468–7472.
[21]
W Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, and Tom Goldstein. 2020. Metapoison: Practical general-purpose clean-label data poisoning. In Advances in Neural Information Processing Systems, Vol. 33, 12080–12091.
[23]
Bo Jiang, Zhigang Lu, Ning Li, Jianjun Wu, and Zhengwei Jiang. 2018. Retweet prediction using social-aware probabilistic matrix factorization. In International Conference on Computational Science. Springer, 316–327.
[24]
Jonas L. Juul and Johan Ugander. 2021. Comparing information diffusion mechanisms by matching on cascade size. Proc. Natl. Acad. Sci. U.S.A. 118, 46 (2021), e2100786118.
[25]
K. D. D. CUP. 2012. Predict Which Users (or Information Sources) One User Might Follow in Tencent Weibo. Retrieved from https://www.kaggle.com/c/kddcup2012-track1
[26]
Moein Khajehnejad, Ahmad Asgharian Rezaei, Mahmoudreza Babaei, Jessica Hoffmann, Mahdi Jalili, and Adrian Weller. 2021. Adversarial graph embeddings for fair influence maximization over social networks. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI ’21). 4306–4312.
[27]
Dam Hee Kim, S Mo Jones-Jang, and Kate Kenski. 2021. Why do people share political information on social media? Digit. Journal. 9, 8 (2021), 1123–1140.
[28]
Thomas N. Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. In Proceedings of the International Conference on Learning Representations (2015), 1–14.
[29]
Maksim Kitsak, Lazaros K. Gallos, Shlomo Havlin, Fredrik Liljeros, Lev Muchnik, H Eugene Stanley, and Hernán A. Makse. 2010. Identification of influential spreaders in complex networks. Nat. Phys. 6, 11 (2010), 888–893.
[30]
Pang Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. In Proceedings of the International Conference on Machine Learning (ICML ’17). PMLR, 1885–1894.
[31]
Stephan Lewandowsky, Ullrich K. H. Ecker, Colleen M. Seifert, Norbert Schwarz, and John Cook. 2012. Misinformation and its correction: Continued influence and successful debiasing. Psychol. Sci. Publ. Interest 13, 3 (2012), 106–131.
[32]
Jingxuan Li, Wei Peng, Tao Li, Tong Sun, Qianmu Li, and Jian Xu. 2014. Social network user influence sense-making and dynamics prediction. Expert Syst. Appl. 41, 11 (2014), 5115–5124.
[33]
Jiaying Li, Hanxuan Zhao, and Yanhong Zheng. 2022. The analysis on strategies of building enterprises’ brand image under the background of rising network stream media platform. In Proceedings of the 8th International Conference on Humanities and Social Science Research (ICHSSR ’22). Atlantis Press, 1071–1077.
[34]
Rebecca Lieb. 2012. Content Marketing: Think Like a Publisher—How to Use Content to Market Online and in Social Media. Que.
[35]
Zhunchen Luo, Miles Osborne, Jintao Tang, and Ting Wang. 2013. Who will retweet me? Finding retweeters in Twitter. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR ’13). 869–872.
[36]
Renfeng Ma, Xiangkun Hu, Qi Zhang, Xuanjing Huang, and Yu-Gang Jiang. 2019. Hot topic-aware retweet prediction with masked self-attentive model. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR ’19). 525–534.
[37]
Kevin Makice. 2009. Twitter API: Up and Running: Learn How to Build Applications with the Twitter API. O’Reilly Media, Inc.
[38]
Hangyu Mao, Yang Xiao, Yuan Wang, Jiakang Wang, and Zhen Xiao. 2018. Topic-specific retweet count ranking for weibo. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 625–637.
[39]
Eli Meirom, Haggai Maron, Shie Mannor, and Gal Chechik. 2021. Controlling graph dynamics with reinforcement learning and graph neural networks. In Proceedings of the International Conference on Machine Learning. PMLR, 7565–7577.
[40]
Flaviano Morone and Hernán A. Makse. 2015. Influence maximization in complex networks through optimal percolation. Nature 524, 7563 (2015), 65–68.
[41]
Rubathee Nadaraja and Rashad Yazdanifard. 2013. Social media marketing: Advantages and disadvantages. Social Media Marketing. 1–10.
[42]
Nasir Naveed, Thomas Gottron, Jérôme Kunegis, and Arifah Che Alhadi. 2011. Bad news travel fast: A content-based analysis of interestingness on twitter. In Proceedings of the 3rd International Web Science Conference. 1–7.
[43]
Huan-Kai Peng, Jiang Zhu, Dongzhen Piao, Rong Yan, and Ying Zhang. 2011. Retweet modeling using conditional random fields. In Proceedings of the IEEE 11th International Conference on Data Mining Workshops. IEEE, 336–343.
[44]
Fabián Riquelme and Pablo González-Cantergiani. 2016. Measuring user influence on Twitter: A survey. Inf. Process. Manage. 52, 5 (2016), 949–975.
[45]
Everett M. Rogers. 1962. Bibliography on the diffusion of innovations. Mimeo bulletin. Department of agricultural exonomics and rural sociology. Ohio Agricultural Experiment Station (no. AE 328) (1962).
[46]
Gwendolyn Seidman. 2013. Self-presentation and belonging on Facebook: How personality influences social media use and motivations. Pers. Indiv. Dif. 54, 3 (2013), 402–407.
[47]
Constantino Stavros, Matthew D. Meng, Kate Westberg, and Francis Farrelly. 2014. Understanding fan motivation for interacting on social media. Sport Manage. Rev. 17, 4 (2014), 455–469.
[48]
Stefan Stieglitz and Linh Dang-Xuan. 2013. Emotions and information diffusion in social media—Sentiment of microblogs and sharing behavior. J. Manage. Inf. Syst. 29, 4 (2013), 217–248.
[49]
Caihong Sun, Lu Zhang, and Qian Li. 2013. Who are influentials on micro-blogging services: Evidence from social network analysis. In Proceedings of the 17th Pacific Asia Conference on Information Systems. 1–25.
[50]
Zhiyi Tian, Lei Cui, Jie Liang, and Shui Yu. 2022. A comprehensive survey on poisoning attacks and countermeasures in machine learning. Comput. Surv. 55, 8 (2022), 1–35.
[51]
Jing Wang and Yue Yang. 2021. Tweet retweet prediction based on deep multitask learning. Neural Process. Lett. (2021), 1–14.
[52]
Shiyao Wang, Qi Liu, Yicheng Zhong, Zhilong Zhou, Tiezheng Ge, Defu Lian, and Yuning Jiang. 2022. CreaGAN: An automatic creative generation framework for display advertising. In Proceedings of the 30th ACM International Conference on Multimedia. 7261–7269.
[53]
Bo Wu, Wen-Huang Cheng, Yongdong Zhang, Juan Cao, Jintao Li, and Tao Mei. 2018. Unlocking author power: On the exploitation of auxiliary author-retweeter relations for predicting key retweeters. IEEE Trans. Knowl. Data Eng. 32, 3 (2018), 547–559.
[54]
Chenwang Wu, Defu Lian, Yong Ge, Zhihao Zhu, and Enhong Chen. 2021. Triple adversarial learning for influence based poisoning attack in recommender systems. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD ’21). 1830–1840.
[55]
Chenwang Wu, Defu Lian, Yong Ge, Zhihao Zhu, and Enhong Chen. 2023. Influence-driven data poisoning for robust recommender systems. IEEE Trans. Pattern Anal. Mach. Intell. (2023).
[56]
Wenwen Xia, Yuchen Li, Jun Wu, and Shenghong Li. 2021. Deepis: Susceptibility estimation on social networks. In Proceedings of the 14th ACM International Conference on Web Search and Data Mining. 761–769.
[57]
Jiarong Xie, Xiangrong Wang, Ling Feng, Jin-Hua Zhao, Wenyuan Liu, Yamir Moreno, and Yanqing Hu. 2022. Indirect influence in social networks as an induced percolation phenomenon. Proc. Nat.l Acad. Sci. U.S.A. 119, 9 (2022), e2100151119.
[58]
Jaewon Yang and Jure Leskovec. 2011. Patterns of temporal variation in online media. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM ’11). 177–186.
[59]
Meng Yu, Zhiyong Li, Zhicheng Yu, Jiaxin He, and Jingyan Zhou. 2021. Communication related health crisis on social media: A case of COVID-19 outbreak. Curr. Iss. Tour. 24, 19 (2021), 2699–2705.
[60]
Nicholas Jing Yuan, Yuan Zhong, Fuzheng Zhang, Xing Xie, Chin-Yew Lin, and Yong Rui. 2016. Who will reply to/retweet this tweet? The dynamics of intimacy from online social interactions. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM ’16). 3–12.
[61]
Sangdoo Yun, Dongyoon Han, Seong Joon Oh, Sanghyuk Chun, Junsuk Choe, and Youngjoon Yoo. 2019. Cutmix: Regularization strategy to train strong classifiers with localizable features. In Proceedings of the Conference on Computer Vision and Pattern Recognition (CVPR ’19). 6023–6032.
[62]
Jing Zhang, Biao Liu, Jie Tang, Ting Chen, and Juanzi Li. 2013. Social influence locality for modeling retweeting behaviors. In Proceeding of the International Joint Conference on Artificial Intelligence (IJCAI ’13).
[63]
Qi Zhang, Yeyun Gong, Ya Guo, and Xuanjing Huang. 2015. Retweet behavior prediction using hierarchical dirichlet process. In Proceedings of the AAAI International Conference on Artificial Intelligence (AAAI ’15), Vol. 29.
[64]
Qi Zhang, Yeyun Gong, Jindou Wu, Haoran Huang, and Xuanjing Huang. 2016. Retweet prediction with attention-based deep neural network. In Proceedings of the Conference on Information and Knowledge Management (CIKM ’16). 75–84.
[65]
Ping Zhao, Haojun Huang, Xiaohui Zhao, and Daiyu Huang. 2020. P 3: Privacy-preserving scheme against poisoning attacks in mobile-edge computing. IEEE Trans. Comput. Soc. Syst. 7, 3 (2020), 818–826.
[66]
Zhengyu Zhao, Zhuoran Liu, and Martha Larson. 2021. On success and simplicity: A second look at transferable targeted attacks. In Advances in Neural Information Processing Systems 34, 6115–6128.
[67]
Xiaokang Zhou, Wei Liang, Zijia Luo, and Yi Pan. 2021. Periodic-aware intelligent prediction model for information diffusion in social networks. IEEE Trans. Netw. Sci. Eng. 8, 2 (2021), 894–904.
[68]
Jianming Zhu, Smita Ghosh, and Weili Wu. 2019. Group influence maximization problem in social networks. IEEE Trans. Comput. Soc. Syst. 6, 6 (2019), 1156–1164.

Index Terms

  1. Attacking Social Media via Behavior Poisoning

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Knowledge Discovery from Data
    ACM Transactions on Knowledge Discovery from Data  Volume 18, Issue 7
    August 2024
    505 pages
    EISSN:1556-472X
    DOI:10.1145/3613689
    • Editor:
    • Jian Pei
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 June 2024
    Online AM: 27 March 2024
    Accepted: 17 March 2024
    Revised: 28 February 2024
    Received: 30 August 2023
    Published in TKDD Volume 18, Issue 7

    Check for updates

    Author Tags

    1. Social media
    2. poisoning attacks
    3. social activity

    Qualifiers

    • Research-article

    Funding Sources

    • National Key R&D Program of China
    • National Natural Science Foundation of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 221
      Total Downloads
    • Downloads (Last 12 months)221
    • Downloads (Last 6 weeks)48
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media