Skip to main content
Log in

Social bot detection on Twitter: robustness evaluation and improvement

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Online social networks are easily exploited by social bots. Although the current models for detecting social bots show promising results, they mainly rely on Graph Neural Networks (GNNs), which have been proven to have vulnerabilities in robustness and these detection models likely have similar robustness vulnerabilities. Therefore, it is crucial to evaluate and improve their robustness. This paper proposes a robustness evaluation method: Attribute Random Iteration-Fast Gradient Sign Method (ARI-FGSM) and uses a simplified adversarial training to improve the robustness of social bot detection. Specifically, this study performs robustness evaluations of five bot detection models on two datasets under both black-box and white-box scenarios. The white-box experiments achieve a minimum attack success rate of 86.23%, while the black-box experiments achieve a minimum attack success rate of 45.86%. This shows that the social bot detection model is vulnerable to adversarial attacks. Moreover, after executing our robustness improvement method, the robustness of the detection model increased by up to 86.98%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data Availability

No datasets were generated or analysed during the current study.

References

  1. Chen, W., Huang, C., Yuan, W., Chen, X., Hu, W., Zhang, X., Zhang, Y.: Title-and-tag contrastive vision-and-language trans former for social media popularity prediction. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 7008–7012 (2022)

  2. Berger, J.M., Morgan, J.: The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter. Communications and Messaging Report (2015). https://docslib.org/doc/6374172/the-isis-twitter-censusdefining-and-describing-the-population-of-isis-supporters-on-twitter

  3. Ferrara, E.: What types of COVID-19 conspiracies are populated by Twitter bots? Preprint arXiv:2004.09531 (2020)

  4. Deb, A., Luceri, L., Badaway, A., Ferrara, E.: Perils and challenges of social media and election manipulation analysis: the 2018 us midterms. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 237–247 (2019)

  5. Ferrara, E.: Disinformation and social bot operations in the run up to the 2017 French presidential election. Preprint arXiv:1707.00086 (2017)

  6. Weth, C., Abdul, A., Fan, S., Kankanhalli, M.: Helping users tackle algorithmic threats on social media: a multimedia research agenda. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 4425–4434 (2020)

  7. Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 963–972 (2017)

  8. Beskow, D., Carley, K.: Bot-hunter: a tiered approach to detecting & characterizing automated activity on Twitter. In: Proceedings of the SBP-BRiMS: International Conference on Social Computing, Behavioral-CulturalModeling and Prediction and Behavior Representation in Modeling and Simulation, vol. 3, no. 3, (2018)

  9. Feng, S., Wan, H., Wang, N., Luo, M.: Botrgcn: Twitter bot detection with relational graph convolutional networks. In: Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 236–239 (2021)

  10. Hayawi, K., Mathew, S., Venugopal, N., Masud, M.M., Ho, P.-H.: Deeprobot: a hybrid deep neural network model for social bot detection based on user profile data. Soc. Netw. Anal. Min. 12(1), 43 (2022)

    Article  Google Scholar 

  11. Kantartopoulos, P., Pitropakis, N., Mylonas, A., Kylilis, N.: Exploring adversarial attacks and defences for fake Twitter account detection. Technologies 8(4), 64 (2020)

    Article  Google Scholar 

  12. Wang, L., Qiao, X., Xie, Y., Nie, W., Zhang, Y., Liu, A.: My brother helps me: node injection based adversarial attack on social bot detection. In: Proceedings of the 31st ACM International Conference on Multimedia, pp. 6705–6714 (2023)

  13. Castiglione, G., Ding, G., Hashemi, M., Srinivasa, C., Wu, G.: Scalable whitebox attacks on tree-based models. Preprint arXiv:2204.00103 (2022)

  14. Hu, C., Yu, R., Zeng, B., Zhan, Y., Fu, Y., Zhang, Q., Liu, R., Shi, H.: Hyperattack: multi-gradient-guided white-box adversarial structure attack of hypergraph neural networks. Preprint arXiv:2302.12407 (2023)

  15. Sun, L., Dou, Y., Yang, C., Zhang, K., Wang, J., Philip, S.Y., He, L., Li, B.: Adversarial attack and defense on graph data: a survey. IEEE Trans. Knowl. Data Eng. 2022, 1 (2022)

    Google Scholar 

  16. Shao, C., Ciampaglia, G.L., Varol, O., Flammini, A., Menczer, F.: The spread of fake news by social bots. Preprint arXiv:1707.07592 96, 104 (2017)

  17. Scarselli, F., Gori, M., Tsoi, A.C., Hagenbuchner, M., Monfardini, G.: The graph neural network model. IEEE Trans. Neural Netw. 20(1), 61–80 (2008)

    Article  Google Scholar 

  18. Zhao, J., Liu, X., Yan, Q., Li, B., Shao, M., Peng, H.: Multi-attributed heterogeneous graph convolutional network for bot detection. Inf. Sci. 537, 380–393 (2020)

    Article  Google Scholar 

  19. Ali Alhosseini, S., Bin Tareaf, R., Najafi, P., Meinel, C.: Detect me if you can: spam bot detection using inductive representation learning. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 148–153 (2019)

  20. Kipf, T., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv:1609.02907 (2016)

  21. Fang, Y., Sun, H., Li, G., Zhang, R., Huai, J.: Context-aware result inference in crowdsourcing. Inf. Sci. 460, 346–363 (2018)

    Article  Google Scholar 

  22. Subrahmanian, V.S., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., Zhu, L., Ferrara, E., Flammini, A., Menczer, F.: The DARPA Twitter bot challenge. Computer 49(6), 38–46 (2016)

    Article  Google Scholar 

  23. Alarifi, A., Alsaleh, M., Al-Salman, A.: Twitter turing test: identifying social machines. Inf. Sci. 372, 332–346 (2016)

    Article  Google Scholar 

  24. Kantepe, M., Ganiz, M.C.: Preprocessing framework for twitter bot detection. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 630–634. IEEE, London (2017)

  25. Erşahin, B., Aktaş, Ö., Kılınç, D., Akyol, C.: Twitter fake account detection. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 388–392. IEEE, London (2017)

  26. Graves, A., Graves, A.: Long short-term memory. In: Supervised Sequence Labelling with Recurrent Neural Networks, pp. 37–45 (2012)

  27. Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532–1543 (2014)

  28. Zügner, D., Akbarnejad, A., Günnemann, S.: Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2847–2856 (2018)

  29. Wu, H., Wang, C., Tyshetskiy, Y., Docherty, A., Lu, K., Zhu, L.: Adversarial examples on graph data: deep insights into attack and defense. Preprint arXiv:1903.01610 (2019)

  30. Zhou, S., Liu, C., Ye, D., Zhu, T., Zhou, W., Yu, P.S.: Adversarial attacks and defenses in deep learning: from a perspective of cybersecurity. ACM Comput. Surv. 55(8), 1–39 (2022)

    Article  Google Scholar 

  31. Dai, H., Li, H., Tian, T., Huang, X., Wang, L., Zhu, J., Song, L.: Adversarial attack on graph structured data. In: International Conference on Machine Learning, pp. 1115–1124. PMLR (2018)

  32. Zhu, D., Zhang, Z., Cui, P., Zhu, W.: Robust graph convolutional networks against adversarial attacks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1399–1407 (2019)

  33. Zügner, D., Günnemann, S.: Certifiable robustness and robust training for graph convolutional networks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 246–256 (2019)

  34. Xu, K., Chen, H., Liu, S., Chen, P., Weng, T., Hong, M., Lin, X.: Topology attack and defense for graph neural networks: an optimization perspective. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, pp. 3961–3967. ijcai.org (2019)

  35. Chen, J., Lin, X., Xiong, H., Wu, Y., Zheng, H., Xuan, Q.: Smoothing adversarial training for GNN. IEEE Trans. Comput. Soc. Syst. 8(3), 618–629 (2020)

    Article  Google Scholar 

  36. Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., Lewis, M., Zettlemoyer, L., Stoyanov, V.: Roberta: a robustly optimized Bert pretraining approach. Preprint arXiv:1907.11692 (2019)

  37. Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. Preprint arXiv:1412.6572 (2014)

  38. Schlichtkrull, M., Kipf, T.N., Bloem, P., Van Den Berg, R., Titov, I., Welling, M.: Modeling relational data with graph convolutional networks. In: The Semantic Web: 15th International Conference, ESWC 2018, Heraklion, Crete, Greece, June 3–7, 2018, Proceedings 15, pp. 593–607. Springer, London (2018)

  39. Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (2018)

  40. Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake twitter followers. Decis. Support Syst. 80, 56–71 (2015)

    Article  Google Scholar 

  41. Feng, S., Tan, Z., Wan, H., Wang, N., Chen, Z., Zhang, B., Zheng, Q., Zhang, W., Lei, Z., Yang, S., et al.: Twibot-22: towards graph-based twitter bot detection. Adv. Neural Inform. Process. Syst. 35, 35254–35269 (2022)

    Google Scholar 

  42. Hu, Z., Dong, Y., Wang, K., Sun, Y.: Heterogeneous graph transformer. In: Proceedings of the Web Conference 2020, pp. 2704–2710 (2020)

  43. Veličković, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. Preprint arXiv:1710.10903 (2017)

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Nos. U21B2024, 62202329).

Author information

Authors and Affiliations

Authors

Contributions

Material preparation, data collection, and analysis were performed by JL, GJ and JG. Conceptualization and methodology were performed by AL, YX and LW. The first draft of the manuscript was written by YX and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Lanjun Wang.

Ethics declarations

Conflict of interest

The authors declare that there are no Conflict of interest related to the content of this article.

Additional information

Communicated by B. Bao.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, A., Xie, Y., Wang, L. et al. Social bot detection on Twitter: robustness evaluation and improvement. Multimedia Systems 30, 167 (2024). https://doi.org/10.1007/s00530-024-01364-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00530-024-01364-2

Keywords