skip to main content
10.1145/3341161.3342898acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

How the tables have turned: studying the new wave of social bots on Twitter using complex network analysis techniques

Published:15 January 2020Publication History

ABSTRACT

Twitter bots have evolved from easily-detectable, simple content spammers with bogus identities to sophisticated players embedded in deep levels of social networks, silently promoting affiliate campaigns, marketing various products and services, and orchestrating or coordinating political activities. Much research has been reported on building accurate machine learning classifiers to identifying bots in social networks; recent works on social bots have started the new line of research on the existence, placement, and functions of the bots in a collective manner. In this paper, we study two families of Twitter bots which have been studied previously with respect to spamming activities through advertisement and political campaigns, and perform an evolutionary comparison with the new waves of bots currently found in Twitter. We uncover various evolved tendencies of the new social bots under social, communication, and behavioral patterns. Our findings show that these bots demonstrate evolved core-periphery structure; are deeply embedded in their networks of communication; exhibit complex information diffusion and heterogeneous content authoring patterns; perform mobilization of leaders across communication roles; and reside in niche topic communities. These characteristics make them highly deceptive as well as more effective in achieving operational goals than their traditional counterparts. We conclude by discussing some possible applications of the discovered behavioral and social traits of the evolved bots, and ways to build effective bot detection systems.

References

  1. K. Lee, B. D. Eoff, and J. Caverlee, "Seven months with the devils: A long-term study of content polluters on twitter," In Fifth International AAAI Conference on Weblogs and Social Media, July 2011.Google ScholarGoogle Scholar
  2. A. A. Amleshwaram, N. Reddy, S. Yadav, G. Gu, and C. Yang, "Cats: Characterizing automation of twitter spammers," In 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), pp. 1--10, IEEE, January 2013.Google ScholarGoogle Scholar
  3. S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, and K. P. Gummadi, "Understanding and combating link farming in the twitter social network," In Proceedings of the 21st international conference on World Wide Web, pp. 61--70, ACM, April 2012.Google ScholarGoogle Scholar
  4. A. Bessi, E. Ferrara, "Social bots distort the 2016 US Presidential election online discussion," First Monday, 21(11), November 2016, Available: https://firstmonday.org/article/view/7090/5653 (visited on July 12, 2019).Google ScholarGoogle Scholar
  5. A. Badawy, E. Ferrara, and K. Lerman, "Analyzing the digital traces of political manipulation: The 2016 russian interference twitter campaign," IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 258--265, IEEE, August 2018.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Forelle, P. Howard, A. Monroy-Hernndez and S. Savage, "Political bots and the manipulation of public opinion in Venezuela," arXiv preprint arXiv:1507.07109, July 2015.Google ScholarGoogle Scholar
  7. C. A. Davis, O. Varol, E. Ferrara, A. Flammini, and F. Menczer, "Botornot: A system to evaluate social bots," 25th International Conference Companion on World Wide Web, pp. 273--274, International World Wide Web Conferences Steering Committee, April 2016.Google ScholarGoogle Scholar
  8. P. C. Lin, and P. M. Huang, "A study of effective features for detecting long-surviving Twitter spam accounts," 15th International Conference on Advanced Communications Technology (ICACT), pp. 841--846, IEEE, January 2013.Google ScholarGoogle Scholar
  9. J. Wang, and I. C. Paschalidis, "Botnet detection based on anomaly and community detection," IEEE Transactions on Control of Network Systems, 4(2), pp. 392--404, June 2017.Google ScholarGoogle ScholarCross RefCross Ref
  10. A. Duh, M. Slak Rupnik, and D. Koroak, "Collective behavior of social bots is encoded in their temporal twitter activity," Big Data, 6(2), pp. 113--123, June 2018.Google ScholarGoogle ScholarCross RefCross Ref
  11. S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, "The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race," 26th International Conference on World Wide Web Companion, pp. 963--972, International World Wide Web Conferences Steering Committee, April 2017.Google ScholarGoogle Scholar
  12. M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, "Inferring lockstep behavior from connectivity pattern in large graphs," Knowledge and Information Systems, 48(2), pp. 399--428, August 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Yu, X. He, and Y. Liu, "Glad: group anomaly detection in social media analysis," ACM Transactions on Knowledge Discovery from Data (TKDD), 10(2), Article no. 18, October 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, "DNA-inspired online behavioral modeling and its application to spambot detection," IEEE Intelligent Systems, 31(5), pp. 58--64, September 2016.Google ScholarGoogle ScholarCross RefCross Ref
  15. F. Morstatter, L. Wu, T. H. Nazer, K. M. Carley, and H. Liu, "A new approach to bot detection: striking the balance between precision and recall," 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 533--540, IEEE, August 2016.Google ScholarGoogle Scholar
  16. P. De Meo, E. Ferrara, G. Fiumara, and A. Provetti, "Generalized louvain method for community detection in large networks," In 2011 11th International Conference on Intelligent Systems Design and Applications, pp. 88--93, IEEE, November 2011.Google ScholarGoogle Scholar
  17. S. Iyer, T. Killingback, B. Sundaram, and Z. Wang, "Attack robustness and centrality of complex networks," PloS one, 8(4), e59613, April 2013.Google ScholarGoogle ScholarCross RefCross Ref
  18. T. Khaund, K. K. Bandeli, M. N. Hussain, A. Obadimu, S. Al-Khateeb, and N. Agarwal, "Analyzing Social and Communication Network Structures of Social Bots and Humans," 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 794--797, IEEE, August 2018.Google ScholarGoogle Scholar
  19. C. Morselli, and J. Roy, "Brokerage qualifications in ringing operations," Criminology, 46(1), pp. 71--98, February 2008.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ASONAM '19: Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
    August 2019
    1228 pages
    ISBN:9781450368681
    DOI:10.1145/3341161

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 15 January 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    ASONAM '19 Paper Acceptance Rate41of286submissions,14%Overall Acceptance Rate116of549submissions,21%

    Upcoming Conference

    KDD '24

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader