Skip to main content

Detection and Analysis of Water Army Groups on Virtual Community

  • Conference paper
  • First Online:
Computer Engineering and Technology (NCCET 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 592))

Included in the following conference series:

  • 757 Accesses

Abstract

Water army is prevalent in social networks and it causes harmful effect to the public opinion and security of cyberspace. This paper proposes a novel water army groups detection method which consists of 4 steps. Firstly, we break the virtual community into a series of time windows and find the suspicious periods when water army groups are active. Then we build the user cooperative networks of suspicious periods according to user’s reply behaviors and cluster them based on their Cosine similarity. After that, we prune the cooperative networks by just remaining the edges whose weight is larger than some threshold and get some suspicious user clusters. Finally, we conduct deeper analysis to the behaviors of the cluster users to determine whether they are water army groups or not. The experiment results show that our method can identify water army groups on virtual community efficiently and it has a high accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Internet Network Information Center of China: The 33rd statistical report on Internet development of China [EB/OL]. http://www.eajcd.edu.cn/pub/wml.txt/980810-2.html, 2014-03-05/2014-05-06 (in Chinese)

  2. Fielding, N., Cobain, I.: Revealed: US Spy Operation that Manipulates Social Media, Guardian, 17 March 2011. http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks

  3. Chen, C., Wu, K., Srinivasan, V., et al.: Battling the internet water army: detection of hidden paid posters. In: International Conference on Advances in Social Networks Analysis and Mining, arXiv:1111.4297v1 [cs.SI], 18 November 2011

  4. Fan, C., Xaio, X., Yu, L., et al.: Behavior analysis of network navy organization based on web forums. J. Shenyang Aerosp. Univ. 29(5), 64–67 (2010). (in Chinese)

    Google Scholar 

  5. Li, G., Gan, T., Kou, G.: Recognition of net-cheaters based on text sentiment analysis. Libr. Inf. 54(8), 77–80 (2010). (in Chinese)

    Google Scholar 

  6. Qin, M., Ke, Y.: Overview of web spammer detection. J. Softw. 25(7), 1505–1526 (2014). (in Chinese)

    Google Scholar 

  7. Jindal, N., Liu, B., Lim, E.P.: Finding unusual review patterns using unexpected rules. In: Huang, J., Koudas, N., Jones, G. (eds.) Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), pp. 1549–1552. ACM Press, New York (2010)

    Google Scholar 

  8. Lim, E.P., Nguyen, V.A., Jindal, N., Liu, B., Lauw, H.W.: Detecting product review spammers using rating behaviors. In: Huang, J., Koudas, N., Jones, G., Wu, X., Collins-Thompson, K., An, A. (eds.) Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), pp. 939–948. ACM Press, New York (2010)

    Google Scholar 

  9. Wang, G., Xie, S., Liu, B., Yu, P.S.: Identify online store review spammers via social review graph. ACM Trans. Intell. Syst. Technol. (TIST) 3(4), 61 (2012)

    Google Scholar 

  10. Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: Mille, A., Gandon, F., Misselis, J., Rabinovich, M., Staab, S. (eds.) Proceedings of the 21st International Conference on World Wide Web (WWW 2012), pp.191–200. ACM Press, New York (2012)

    Google Scholar 

  11. Liu, B.W., Yu, Y.T.: Web Data Mining. Tsinghua University Publication, Beijing (2013). (in Chinese)

    Google Scholar 

  12. Husna, H., Phithakkitnukoon, S., Palla, S., Dantu, R.: Behavior analysis of spam botnets. In: Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE 2008), pp. 246–253. IEEE Computer Society, Washington (2008)

    Google Scholar 

  13. Brendel, R., Krawczyk, H.: Application of social relation graphs for early detection of transient spammers. WSEAS Trans. Inf. Sci. Appl. 5(3), 267–276 (2008)

    Google Scholar 

  14. Zhou, Y.-B., Zhou, T.: A robust ranking algorithm to spamming. EPL (Europhys. Lett.) 94(4), 48002 (2011)

    Article  Google Scholar 

  15. Xu, C., Zhang, J., Chang, K., Long, C.: Uncovering collusive spammers in Chinese review websites. In: He, Q., Iyengar, A., Nejdl, W. (eds.) Proceedings of the 22nd ACM Conference on Information and Knowledge Management (CIKM 2013), pp. 979–988. ACM Press, New York (2013)

    Google Scholar 

  16. Lu, Y., Zhang, L., Xiao, Y., Li, Y.: Simultaneously detecting fake reviews and review spammers using factor graph model. In: Davis, H.C., Halpin, H., Pentland, A. (eds.) Proceedings of the 5th Annual ACM Web Science Conference (WebSci 2013), pp. 225–233. ACM Press, New York (2013)

    Google Scholar 

  17. Lin, C., Zhou, Y., Chen, K., He, J., Yang, X., Song, L.: Analysis and identification of spamming behaviors in Sina Weibo microblog. In: Zhu, F., He, Q., Yan, R. (eds.) Proceedings of the 7th Workshop on Social Network Mining and Analysis (SNAKDD 2013), pp. 5–13. ACM Press, New York (2013)

    Google Scholar 

  18. Bu, Z., Xia, Z., Wang, J.: A sock puppet detection algorithm on virtual spaces. Knowledge Based Systems 37, 366–377 (2013)

    Article  Google Scholar 

  19. Zheng, X., Lai, Y.M., Chow, K.P., et al.: Sockpuppet detection in online discussion forums. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 374–377 (2011)

    Google Scholar 

  20. Jiang, F., Du, J., Sui, Y., Cao, C.: Outlier detection based on boundary and distance. Acta Electronica Sinica 38(3), 700–705 (2010). (in Chinese)

    Google Scholar 

  21. Lin, Y., Wang, X., Zhou, A.: Survey on quality evaluation and control of online reviews. J. Softw. 25(3), 506–527 (2014). (in Chinese)

    Google Scholar 

  22. Chen, G., Cai, W., Xu, H., et al.: Empirical analysis on human behavior dynamics in online forum. J. Hunan Univ. 40(11), 153–160 (2013). (in Chinese)

    Google Scholar 

  23. Peng, D., Cai, W.: The web forum crawling technology and system implementation. Comput. Eng. Sci. 44(1), 157–160 (2011)

    Google Scholar 

  24. Barabási, A.L.: The origin of bursts and heavy tails in human dynamics [J]. Nature 435(7039), 207–211 (2005)

    Article  Google Scholar 

Download references

Acknowledgement

This research is supported in part by the National Key Basic Research and Development Plan (Grant No. 2013CB329600), National Natural Science Foundation of China (Grant No. 71503260) and Natural Science Foundation of Shaanxi Province (Grant No. 2014JM8345).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guirong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, G. et al. (2016). Detection and Analysis of Water Army Groups on Virtual Community. In: Xu, W., Xiao, L., Li, J., Zhang, C. (eds) Computer Engineering and Technology. NCCET 2015. Communications in Computer and Information Science, vol 592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49283-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49283-3_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49282-6

  • Online ISBN: 978-3-662-49283-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics