Abstract
Automated social media bots have existed almost as long as the social media platforms they inhabit. Their emergence has triggered numerous research efforts to develop increasingly sophisticated means to detect these accounts. These efforts have resulted in a cat and mouse cycle in which detection algorithms evolve trying to keep up with ever evolving bots. As part of this continued evolution, our research proposes using random string detection applied to user names to filter twitter streams for potential bot accounts and thereby generating annotated data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Benigni, M., Carley, K.M.: From tweets to intelligence: understanding the Islamic jihad supporting community on Twitter. In: Xu, K., Reitter, D., Lee, D., Osgood, N. (eds.) SBP-BRiMS 2016. LNCS, pp. 346–355. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39931-7_33
Bessi, A., Ferrara, E.: Social Bots Distort the 2016 US Presidential Election Online Discussion (2016)
Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Who is tweeting on Twitter: human, bot, or cyborg? In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 21–30. ACM (2010)
Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: a system to evaluate social bots. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 273–274. International World Wide Web Conferences Steering Committee (2016)
Ferrara, E.: Measuring social spam and the effect of bots on information diffusion in social media. arXiv preprint arXiv:1708.08134 (2017)
Freeman, D.M.: Using Naive Bayes to detect spammy names in social networks. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, pp. 3–12. ACM (2013)
Freitas, C., Benevenuto, F., Ghosh, S., Veloso, A.: Reverse engineering socialbot infiltration strategies in Twitter. In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pp. 25–32. ACM (2015)
Glaser, A.: Russian bots are trying to sow discord on Twitter after charlottesville (2017)
Graham, T., Ackland, R.: Do socialbots dream of popping the filter bubble? In: Socialbots and Their Friends: Digital Media and the Automation of Sociality, p. 187 (2016)
Howard, P.N., Kollanyi, B.: Bots,# strongerin, and# brexit: computational propaganda during the uk-eu referendum. Browser Download This Paper (2016)
Krishnamurthy, B., Gill, P., Arlitt, M.: A few chirps about Twitter. In: Proceedings of the First Workshop on Online Social Networks, pp. 19–24. ACM (2008)
Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on Twitter. In: ICWSM (2011)
Al Bawaba The Loop. Thousands of Twitter bots are attempting to silence reporting on Yemen (2017)
Lumezanu, C., Feamster, N., Klein, H.: # bias: measuring the tweeting behavior of propagandists. In: Sixth International AAAI Conference on Weblogs and Social Media (2012)
Namazifar, M.: Detecting randomly generated strings, December 2015. Accessed 25 Dec 2015
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825–2830 (2011)
Raghuram, J., Miller, D.J., Kesidis, G.: Unsupervised, low latency anomaly detection of algorithmically generated domain names by generative probabilistic modeling. J. Adv. Res. 5(4), 423–433 (2014)
Shannon, C.E.: The bell system technical journal. In: A Mathematical Theory of Communication, vol. 27, pp. 379–423 (1948)
Subrahmanian, V.S., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., Zhu, L., Ferrara, E., Flammini, A., Menczer, F.: The DARPA Twitter bot challenge. Computer 49(6), 38–46 (2016)
Verkamp, J.-P., Gupta, M.: Five incidents, one theme: Twitter spam as a weapon to drown voices of protest. In: FOCI (2013)
Yadav, S., Reddy, A.K.K., Reddy, A.L., Ranjan, S.: Detecting algorithmically generated malicious domain names. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 48–61. ACM (2010)
Acknowledgment
This work was supported in part by the Office of Naval Research (ONR) Multidisciplinary University Research Initiative Award N000140811186 and Award N000141812108, the Army Research Laboratory Award W911NF1610049, Defense Threat Reductions Agency Award HDTRA11010102, and the Center for Computational Analysis of Social and Organization Systems (CASOS). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the ONR, ARL, DTRA, or the U.S. government.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Beskow, D.M., Carley, K.M. (2018). Using Random String Classification to Filter and Annotate Automated Accounts. In: Thomson, R., Dancy, C., Hyder, A., Bisgin, H. (eds) Social, Cultural, and Behavioral Modeling. SBP-BRiMS 2018. Lecture Notes in Computer Science(), vol 10899. Springer, Cham. https://doi.org/10.1007/978-3-319-93372-6_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-93372-6_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93371-9
Online ISBN: 978-3-319-93372-6
eBook Packages: Computer ScienceComputer Science (R0)