Abstract
Online social networks are easily exploited by social bots. Although the current models for detecting social bots show promising results, they mainly rely on Graph Neural Networks (GNNs), which have been proven to have vulnerabilities in robustness and these detection models likely have similar robustness vulnerabilities. Therefore, it is crucial to evaluate and improve their robustness. This paper proposes a robustness evaluation method: Attribute Random Iteration-Fast Gradient Sign Method (ARI-FGSM) and uses a simplified adversarial training to improve the robustness of social bot detection. Specifically, this study performs robustness evaluations of five bot detection models on two datasets under both black-box and white-box scenarios. The white-box experiments achieve a minimum attack success rate of 86.23%, while the black-box experiments achieve a minimum attack success rate of 45.86%. This shows that the social bot detection model is vulnerable to adversarial attacks. Moreover, after executing our robustness improvement method, the robustness of the detection model increased by up to 86.98%.



Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data Availability
No datasets were generated or analysed during the current study.
References
Chen, W., Huang, C., Yuan, W., Chen, X., Hu, W., Zhang, X., Zhang, Y.: Title-and-tag contrastive vision-and-language trans former for social media popularity prediction. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 7008–7012 (2022)
Berger, J.M., Morgan, J.: The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter. Communications and Messaging Report (2015). https://docslib.org/doc/6374172/the-isis-twitter-censusdefining-and-describing-the-population-of-isis-supporters-on-twitter
Ferrara, E.: What types of COVID-19 conspiracies are populated by Twitter bots? Preprint arXiv:2004.09531 (2020)
Deb, A., Luceri, L., Badaway, A., Ferrara, E.: Perils and challenges of social media and election manipulation analysis: the 2018 us midterms. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 237–247 (2019)
Ferrara, E.: Disinformation and social bot operations in the run up to the 2017 French presidential election. Preprint arXiv:1707.00086 (2017)
Weth, C., Abdul, A., Fan, S., Kankanhalli, M.: Helping users tackle algorithmic threats on social media: a multimedia research agenda. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 4425–4434 (2020)
Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 963–972 (2017)
Beskow, D., Carley, K.: Bot-hunter: a tiered approach to detecting & characterizing automated activity on Twitter. In: Proceedings of the SBP-BRiMS: International Conference on Social Computing, Behavioral-CulturalModeling and Prediction and Behavior Representation in Modeling and Simulation, vol. 3, no. 3, (2018)
Feng, S., Wan, H., Wang, N., Luo, M.: Botrgcn: Twitter bot detection with relational graph convolutional networks. In: Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 236–239 (2021)
Hayawi, K., Mathew, S., Venugopal, N., Masud, M.M., Ho, P.-H.: Deeprobot: a hybrid deep neural network model for social bot detection based on user profile data. Soc. Netw. Anal. Min. 12(1), 43 (2022)
Kantartopoulos, P., Pitropakis, N., Mylonas, A., Kylilis, N.: Exploring adversarial attacks and defences for fake Twitter account detection. Technologies 8(4), 64 (2020)
Wang, L., Qiao, X., Xie, Y., Nie, W., Zhang, Y., Liu, A.: My brother helps me: node injection based adversarial attack on social bot detection. In: Proceedings of the 31st ACM International Conference on Multimedia, pp. 6705–6714 (2023)
Castiglione, G., Ding, G., Hashemi, M., Srinivasa, C., Wu, G.: Scalable whitebox attacks on tree-based models. Preprint arXiv:2204.00103 (2022)
Hu, C., Yu, R., Zeng, B., Zhan, Y., Fu, Y., Zhang, Q., Liu, R., Shi, H.: Hyperattack: multi-gradient-guided white-box adversarial structure attack of hypergraph neural networks. Preprint arXiv:2302.12407 (2023)
Sun, L., Dou, Y., Yang, C., Zhang, K., Wang, J., Philip, S.Y., He, L., Li, B.: Adversarial attack and defense on graph data: a survey. IEEE Trans. Knowl. Data Eng. 2022, 1 (2022)
Shao, C., Ciampaglia, G.L., Varol, O., Flammini, A., Menczer, F.: The spread of fake news by social bots. Preprint arXiv:1707.07592 96, 104 (2017)
Scarselli, F., Gori, M., Tsoi, A.C., Hagenbuchner, M., Monfardini, G.: The graph neural network model. IEEE Trans. Neural Netw. 20(1), 61–80 (2008)
Zhao, J., Liu, X., Yan, Q., Li, B., Shao, M., Peng, H.: Multi-attributed heterogeneous graph convolutional network for bot detection. Inf. Sci. 537, 380–393 (2020)
Ali Alhosseini, S., Bin Tareaf, R., Najafi, P., Meinel, C.: Detect me if you can: spam bot detection using inductive representation learning. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 148–153 (2019)
Kipf, T., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv:1609.02907 (2016)
Fang, Y., Sun, H., Li, G., Zhang, R., Huai, J.: Context-aware result inference in crowdsourcing. Inf. Sci. 460, 346–363 (2018)
Subrahmanian, V.S., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., Zhu, L., Ferrara, E., Flammini, A., Menczer, F.: The DARPA Twitter bot challenge. Computer 49(6), 38–46 (2016)
Alarifi, A., Alsaleh, M., Al-Salman, A.: Twitter turing test: identifying social machines. Inf. Sci. 372, 332–346 (2016)
Kantepe, M., Ganiz, M.C.: Preprocessing framework for twitter bot detection. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 630–634. IEEE, London (2017)
Erşahin, B., Aktaş, Ö., Kılınç, D., Akyol, C.: Twitter fake account detection. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 388–392. IEEE, London (2017)
Graves, A., Graves, A.: Long short-term memory. In: Supervised Sequence Labelling with Recurrent Neural Networks, pp. 37–45 (2012)
Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532–1543 (2014)
Zügner, D., Akbarnejad, A., Günnemann, S.: Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2847–2856 (2018)
Wu, H., Wang, C., Tyshetskiy, Y., Docherty, A., Lu, K., Zhu, L.: Adversarial examples on graph data: deep insights into attack and defense. Preprint arXiv:1903.01610 (2019)
Zhou, S., Liu, C., Ye, D., Zhu, T., Zhou, W., Yu, P.S.: Adversarial attacks and defenses in deep learning: from a perspective of cybersecurity. ACM Comput. Surv. 55(8), 1–39 (2022)
Dai, H., Li, H., Tian, T., Huang, X., Wang, L., Zhu, J., Song, L.: Adversarial attack on graph structured data. In: International Conference on Machine Learning, pp. 1115–1124. PMLR (2018)
Zhu, D., Zhang, Z., Cui, P., Zhu, W.: Robust graph convolutional networks against adversarial attacks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1399–1407 (2019)
Zügner, D., Günnemann, S.: Certifiable robustness and robust training for graph convolutional networks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 246–256 (2019)
Xu, K., Chen, H., Liu, S., Chen, P., Weng, T., Hong, M., Lin, X.: Topology attack and defense for graph neural networks: an optimization perspective. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, pp. 3961–3967. ijcai.org (2019)
Chen, J., Lin, X., Xiong, H., Wu, Y., Zheng, H., Xuan, Q.: Smoothing adversarial training for GNN. IEEE Trans. Comput. Soc. Syst. 8(3), 618–629 (2020)
Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., Lewis, M., Zettlemoyer, L., Stoyanov, V.: Roberta: a robustly optimized Bert pretraining approach. Preprint arXiv:1907.11692 (2019)
Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. Preprint arXiv:1412.6572 (2014)
Schlichtkrull, M., Kipf, T.N., Bloem, P., Van Den Berg, R., Titov, I., Welling, M.: Modeling relational data with graph convolutional networks. In: The Semantic Web: 15th International Conference, ESWC 2018, Heraklion, Crete, Greece, June 3–7, 2018, Proceedings 15, pp. 593–607. Springer, London (2018)
Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (2018)
Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake twitter followers. Decis. Support Syst. 80, 56–71 (2015)
Feng, S., Tan, Z., Wan, H., Wang, N., Chen, Z., Zhang, B., Zheng, Q., Zhang, W., Lei, Z., Yang, S., et al.: Twibot-22: towards graph-based twitter bot detection. Adv. Neural Inform. Process. Syst. 35, 35254–35269 (2022)
Hu, Z., Dong, Y., Wang, K., Sun, Y.: Heterogeneous graph transformer. In: Proceedings of the Web Conference 2020, pp. 2704–2710 (2020)
Veličković, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. Preprint arXiv:1710.10903 (2017)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (Nos. U21B2024, 62202329).
Author information
Authors and Affiliations
Contributions
Material preparation, data collection, and analysis were performed by JL, GJ and JG. Conceptualization and methodology were performed by AL, YX and LW. The first draft of the manuscript was written by YX and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there are no Conflict of interest related to the content of this article.
Additional information
Communicated by B. Bao.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Liu, A., Xie, Y., Wang, L. et al. Social bot detection on Twitter: robustness evaluation and improvement. Multimedia Systems 30, 167 (2024). https://doi.org/10.1007/s00530-024-01364-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00530-024-01364-2