Abstract
Water army is prevalent in social networks and it causes harmful effect to the public opinion and security of cyberspace. This paper proposes a novel water army groups detection method which consists of 4 steps. Firstly, we break the virtual community into a series of time windows and find the suspicious periods when water army groups are active. Then we build the user cooperative networks of suspicious periods according to user’s reply behaviors and cluster them based on their Cosine similarity. After that, we prune the cooperative networks by just remaining the edges whose weight is larger than some threshold and get some suspicious user clusters. Finally, we conduct deeper analysis to the behaviors of the cluster users to determine whether they are water army groups or not. The experiment results show that our method can identify water army groups on virtual community efficiently and it has a high accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Internet Network Information Center of China: The 33rd statistical report on Internet development of China [EB/OL]. http://www.eajcd.edu.cn/pub/wml.txt/980810-2.html, 2014-03-05/2014-05-06 (in Chinese)
Fielding, N., Cobain, I.: Revealed: US Spy Operation that Manipulates Social Media, Guardian, 17 March 2011. http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks
Chen, C., Wu, K., Srinivasan, V., et al.: Battling the internet water army: detection of hidden paid posters. In: International Conference on Advances in Social Networks Analysis and Mining, arXiv:1111.4297v1 [cs.SI], 18 November 2011
Fan, C., Xaio, X., Yu, L., et al.: Behavior analysis of network navy organization based on web forums. J. Shenyang Aerosp. Univ. 29(5), 64–67 (2010). (in Chinese)
Li, G., Gan, T., Kou, G.: Recognition of net-cheaters based on text sentiment analysis. Libr. Inf. 54(8), 77–80 (2010). (in Chinese)
Qin, M., Ke, Y.: Overview of web spammer detection. J. Softw. 25(7), 1505–1526 (2014). (in Chinese)
Jindal, N., Liu, B., Lim, E.P.: Finding unusual review patterns using unexpected rules. In: Huang, J., Koudas, N., Jones, G. (eds.) Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), pp. 1549–1552. ACM Press, New York (2010)
Lim, E.P., Nguyen, V.A., Jindal, N., Liu, B., Lauw, H.W.: Detecting product review spammers using rating behaviors. In: Huang, J., Koudas, N., Jones, G., Wu, X., Collins-Thompson, K., An, A. (eds.) Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), pp. 939–948. ACM Press, New York (2010)
Wang, G., Xie, S., Liu, B., Yu, P.S.: Identify online store review spammers via social review graph. ACM Trans. Intell. Syst. Technol. (TIST) 3(4), 61 (2012)
Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: Mille, A., Gandon, F., Misselis, J., Rabinovich, M., Staab, S. (eds.) Proceedings of the 21st International Conference on World Wide Web (WWW 2012), pp.191–200. ACM Press, New York (2012)
Liu, B.W., Yu, Y.T.: Web Data Mining. Tsinghua University Publication, Beijing (2013). (in Chinese)
Husna, H., Phithakkitnukoon, S., Palla, S., Dantu, R.: Behavior analysis of spam botnets. In: Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE 2008), pp. 246–253. IEEE Computer Society, Washington (2008)
Brendel, R., Krawczyk, H.: Application of social relation graphs for early detection of transient spammers. WSEAS Trans. Inf. Sci. Appl. 5(3), 267–276 (2008)
Zhou, Y.-B., Zhou, T.: A robust ranking algorithm to spamming. EPL (Europhys. Lett.) 94(4), 48002 (2011)
Xu, C., Zhang, J., Chang, K., Long, C.: Uncovering collusive spammers in Chinese review websites. In: He, Q., Iyengar, A., Nejdl, W. (eds.) Proceedings of the 22nd ACM Conference on Information and Knowledge Management (CIKM 2013), pp. 979–988. ACM Press, New York (2013)
Lu, Y., Zhang, L., Xiao, Y., Li, Y.: Simultaneously detecting fake reviews and review spammers using factor graph model. In: Davis, H.C., Halpin, H., Pentland, A. (eds.) Proceedings of the 5th Annual ACM Web Science Conference (WebSci 2013), pp. 225–233. ACM Press, New York (2013)
Lin, C., Zhou, Y., Chen, K., He, J., Yang, X., Song, L.: Analysis and identification of spamming behaviors in Sina Weibo microblog. In: Zhu, F., He, Q., Yan, R. (eds.) Proceedings of the 7th Workshop on Social Network Mining and Analysis (SNAKDD 2013), pp. 5–13. ACM Press, New York (2013)
Bu, Z., Xia, Z., Wang, J.: A sock puppet detection algorithm on virtual spaces. Knowledge Based Systems 37, 366–377 (2013)
Zheng, X., Lai, Y.M., Chow, K.P., et al.: Sockpuppet detection in online discussion forums. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 374–377 (2011)
Jiang, F., Du, J., Sui, Y., Cao, C.: Outlier detection based on boundary and distance. Acta Electronica Sinica 38(3), 700–705 (2010). (in Chinese)
Lin, Y., Wang, X., Zhou, A.: Survey on quality evaluation and control of online reviews. J. Softw. 25(3), 506–527 (2014). (in Chinese)
Chen, G., Cai, W., Xu, H., et al.: Empirical analysis on human behavior dynamics in online forum. J. Hunan Univ. 40(11), 153–160 (2013). (in Chinese)
Peng, D., Cai, W.: The web forum crawling technology and system implementation. Comput. Eng. Sci. 44(1), 157–160 (2011)
Barabási, A.L.: The origin of bursts and heavy tails in human dynamics [J]. Nature 435(7039), 207–211 (2005)
Acknowledgement
This research is supported in part by the National Key Basic Research and Development Plan (Grant No. 2013CB329600), National Natural Science Foundation of China (Grant No. 71503260) and Natural Science Foundation of Shaanxi Province (Grant No. 2014JM8345).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, G. et al. (2016). Detection and Analysis of Water Army Groups on Virtual Community. In: Xu, W., Xiao, L., Li, J., Zhang, C. (eds) Computer Engineering and Technology. NCCET 2015. Communications in Computer and Information Science, vol 592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49283-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-662-49283-3_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-49282-6
Online ISBN: 978-3-662-49283-3
eBook Packages: Computer ScienceComputer Science (R0)