[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3320269.3384770acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep Learning

Published: 05 October 2020 Publication History

Abstract

Detecting social bots and identifying social botnet communities are extremely important in online social networks (OSNs). In this paper, we first construct a weighted signed Twitter network graph based on the behavioral similarity and trust values between the participants (i.e., OSN accounts) as weighted edges. The behavioral similarity is analyzed from the viewpoints of tweet-content similarity, shared URL similarity, interest similarity, and social interaction similarity for identifying similar types of behavior (malicious or not) among the participants in the Twitter network; whereas the participant's trust value is determined by a random walk model. Next, we design two algorithms - Social Botnet Community Detection (SBCD) and Deep Autoencoder based SBCD (called DA-SBCD) - where the former detects social botnet communities of social bots with malicious behavioral similarity, while the latter reconstructs and detects social botnet communities more accurately in presence of different types of malicious activities. Finally, we evaluate the performance of proposed algorithms with the help of two Twitter datasets. Experimental results demonstrate the efficacy of our algorithms with better performance than existing schemes in terms of normalized mutual information (NMI), precision, recall and F-measure. More precisely, the DA-SBCD algorithm achieves about 90% precision and exhibits up to 8% improvement on NMI.

References

[1]
Muhammad Al-Qurishi, M Shamim Hossain, Majed Alrubaian, Sk Md Mizanur Rahman, and Atif Alamri. 2017. Leveraging analysis of user behavior to identify malicious activities in large-scale social networks. IEEE Transactions on Industrial Informatics 14, 2 (2017), 799--813.
[2]
Al-Zoubi Ala?M, Hossam Faris, Mohammad A Hassonah, et al. 2018. Evolving Support Vector Machines using Whale Optimization Algorithm for spam profiles detection on online social networks in different lingual contexts. Knowledge-Based Systems 153 (2018), 91--104.
[3]
PV Bindu, Rahul Mishra, and P Santhi Thilagam. 2018. Discovering spammer communities in twitter. Journal of Intelligent Information Systems 51, 3 (2018),503--527.
[4]
Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia. 2012. Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Trans. on Dependable and Secure Computing 9, 6 (2012), 811--824.
[5]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. In Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 963--972.
[6]
Brian Eriksson, Gautam Dasarathy, Aarti Singh, and Rob Nowak. 2011. Active clustering: Robust and efficient hierarchical clustering using adaptively selected similarities. In Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics. 260--268.
[7]
Kanchan Hans, Laxmi Ahuja, and SK Muttoo. 2017. Detecting redirection spam using multilayer perceptron neural network. Soft Computing 21, 13 (2017), 3803--3814.
[8]
Jinyuan Jia, Binghui Wang, and Neil Zhenqiang Gong. 2017. Random walk based fake account detection in online social networks. In Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP International Conference on. IEEE, 273--284.
[9]
Sneha Kudugunta and Emilio Ferrara. 2018. Deep neural networks for bot detection. Information Sciences 467 (2018), 312 -- 322.
[10]
Kyumin Lee, Brian David Eoff, and James Caverlee. 2011. Seven months with the devils: A long-term study of content polluters on twitter. In Fifth International AAAI Conference on Weblogs and Social Media.
[11]
SJ Lee, Paul Yoo, TA Asyhari, Y Jhi, L Chermak, CY Yeun, and K Taha. 2020. IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction. IEEE Access (2020).
[12]
Greeshma Lingam, Rashmi Ranjan Rout, and DVLN Somayajulu. 2018. Detection of Social Botnet using a Trust Model based on Spam Content in Twitter Network. In 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS). IEEE, 280--285.
[13]
Greeshma Lingam, Rashmi Ranjan Rout, and DVLN Somayajulu. 2019. Adaptive deep Q-learning model for detecting social bots and influential users in online social networks. Applied Intelligence (2019), 1--18.
[14]
Octavio Loyola-González, Raúl Monroy, Jorge Rodríguez, Armando López- Cuevas, and Javier Israel Mata-Sánchez. 2019. Contrast Pattern-Based Classification for Bot Detection on Twitter. IEEE Access 7 (2019), 45800--45817.
[15]
Giseop Noh, Hayoung Oh, Kyu-haeng Lee, and Chong-kwon Kim. 2015. Toward trustworthy social network services: A robust design of recommender systems. Journal of Communications and Networks 17, 2 (2015), 145--156.
[16]
Fereshteh-Azadi Parand, Hossein Rahimi, and Mohsen Gorzin. 2016. Combining fuzzy logic and eigenvector centrality measure in social network analysis. Physica A: Statistical Mechanics and its Applications 459 (2016), 24--31.
[17]
Peining Shi, Zhiyong Zhang, and Kim-Kwang Raymond Choo. 2019. Detecting Malicious Social Bots Based on Clickstream Sequences. IEEE Access 7 (2019), 28855--28862.
[18]
Gianluca Stringhini, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2012. Poultry markets: on the underground economy of twitter followers. ACM SIGCOMM Computer Communication Review 42, 4 (2012), 527--532.
[19]
Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, and Ben Y Zhao. 2013. Follow the green: growth and dynamics in twitter follower markets. In Proceedings of the 2013 conference on Internet measurement conference. ACM, 163--176.
[20]
VS Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. The DARPA Twitter bot challenge. Computer 49, 6 (2016), 38--46.
[21]
BinghuiWang, Jinyuan Jia, Le Zhang, and Neil Zhenqiang Gong. 2018. Structure based sybil detection in social networks via local rule-based propagation. IEEE Transactions on Network Science and Engineering (2018).
[22]
FeifanWang, Baihai Zhang, and Senchun Chai. 2019. Deep Auto-encoded Clustering Algorithm for Community Detection in Complex Networks. Chinese Journal of Electronics 28, 3 (2019), 489--496.
[23]
Jing Wang and Ioannis Ch Paschalidis. 2016. Botnet detection based on anomaly and community detection. IEEE Transactions on Control of Network Systems 4, 2 (2016), 392--404.
[24]
Wei Wei, Fengyuan Xu, Chiu C Tan, and Qun Li. 2013. Sybil Defender: A defense mechanism for sybil attacks in large social networks. IEEE Trans. on Parallel and Distributed Systems 24, 12 (2013), 2492--2502.
[25]
Jianshe Wu, Long Zhang, Yong Li, and Yang Jiao. 2016. Partition signed social networks via clustering dynamics. Physica A: Statistical Mechanics and its Applications 443 (2016), 568--582.
[26]
Guanhua Yan. 2013. Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. Computer Networks 57, 2 (2013), 540--555.
[27]
Zhi Yang, Jilong Xue, Xiaoyong Yang, Xiao Wang, and Yafei Dai. 2016. VoteTrust: Leveraging friend invitation graph to defend against social network sybils. IEEE Transactions on Dependable and Secure Computing 13, 4 (2016), 488--501.
[28]
Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. 2019. Detecting Fake Accounts in Online Social Networks at the Time of Registrations. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1423--1438.
[29]
Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan. 2016. The rise of social botnets: Attacks and countermeasures. IEEE Transactions on Dependable and Secure Computing (2016).
[30]
Xiaokang Zhou, Neil Y Yen, Qun Jin, and Timothy K Shih. 2013. Enriching user search experience by mining social streams with heuristic stones and associative ripples. Multimedia Tools and Applications 63, 1 (2013), 129--144.

Cited By

View all
  • (2024)GBDT-IL: Incremental Learning of Gradient Boosting Decision Trees to Detect Botnets in Internet of ThingsSensors10.3390/s2407208324:7(2083)Online publication date: 25-Mar-2024
  • (2024)Effective Bot Detection in Twitter using Deep Boltzmann Machine2024 10th International Conference on Web Research (ICWR)10.1109/ICWR61162.2024.10533382(303-308)Online publication date: 24-Apr-2024
  • (2024)TCAE-DL-RGCN Based Detection of Twitter Robots2024 IEEE 7th International Conference on Big Data and Artificial Intelligence (BDAI)10.1109/BDAI62182.2024.10692365(193-198)Online publication date: 5-Jul-2024
  • Show More Cited By

Index Terms

  1. Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep Learning

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
        October 2020
        957 pages
        ISBN:9781450367509
        DOI:10.1145/3320269
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 05 October 2020

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. behavioral similarity
        2. deep autoencoder
        3. social botnet community detection
        4. trust

        Qualifiers

        • Research-article

        Funding Sources

        • NSF grants

        Conference

        ASIA CCS '20
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 418 of 2,322 submissions, 18%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)88
        • Downloads (Last 6 weeks)19
        Reflects downloads up to 14 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)GBDT-IL: Incremental Learning of Gradient Boosting Decision Trees to Detect Botnets in Internet of ThingsSensors10.3390/s2407208324:7(2083)Online publication date: 25-Mar-2024
        • (2024)Effective Bot Detection in Twitter using Deep Boltzmann Machine2024 10th International Conference on Web Research (ICWR)10.1109/ICWR61162.2024.10533382(303-308)Online publication date: 24-Apr-2024
        • (2024)TCAE-DL-RGCN Based Detection of Twitter Robots2024 IEEE 7th International Conference on Big Data and Artificial Intelligence (BDAI)10.1109/BDAI62182.2024.10692365(193-198)Online publication date: 5-Jul-2024
        • (2024)Botnet Identification on Twitter: A Novel Clustering Approach Based on SimilarityIEEE Access10.1109/ACCESS.2024.347163012(149130-149146)Online publication date: 2024
        • (2024)Modelling and predicting online vaccination views using bow-tie decompositionRoyal Society Open Science10.1098/rsos.23179211:2Online publication date: 21-Feb-2024
        • (2024)Community detection in social networks using machine learning: a systematic mapping studyKnowledge and Information Systems10.1007/s10115-024-02201-866:12(7205-7259)Online publication date: 12-Aug-2024
        • (2023)Manta Ray Foraging Optimizer with Deep Learning based Malicious Activity Detection for Privacy Protection in Social Networks2023 IEEE Technology & Engineering Management Conference - Asia Pacific (TEMSCON-ASPAC)10.1109/TEMSCON-ASPAC59527.2023.10531362(1-6)Online publication date: 14-Dec-2023
        • (2023)SpADe: Multi-Stage Spam Account Detection for Online Social NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.319883020:4(3128-3143)Online publication date: 1-Jul-2023
        • (2023)Invited Tutorial: Counteracting Web Application Abuse in Malware2023 IEEE Secure Development Conference (SecDev)10.1109/SecDev56634.2023.00011(1-2)Online publication date: 18-Oct-2023
        • (2023)Machine Learning Classifiers for Social Media Bots Detection on Twitter using Explainable AI2023 Second International Conference on Informatics (ICI)10.1109/ICI60088.2023.10421550(1-5)Online publication date: 23-Nov-2023
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media