Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 2015
DOI: 10.1145/2808797.2809292
|View full text |Cite
|
Sign up to set email alerts
|

Reverse Engineering Socialbot Infiltration Strategies in Twitter

Abstract: Data extracted from social networks like Twitter are increasingly being used to build applications and services that mine and summarize public reactions to events, such as traffic monitoring platforms, identification of epidemic outbreaks, and public perception about people and brands. However, such services are vulnerable to attacks from socialbots − automated accounts that mimic real users − seeking to tamper statistics by posting messages generated automatically and interacting with legitimate users. Potent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
66
0
9

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 100 publications
(77 citation statements)
references
References 15 publications
2
66
0
9
Order By: Relevance
“…2 To acquire visibility, they can infiltrate popular discussions, generating topically appropriate-and even potentially interesting-content, by identifying relevant keywords and searching online for information fitting that conversation. 17 After the tion. Proposed strategies to detect sybil accounts often rely on examining the structure of a social graph.…”
Section: Act Like a Human Think Like A Botmentioning
confidence: 99%
“…2 To acquire visibility, they can infiltrate popular discussions, generating topically appropriate-and even potentially interesting-content, by identifying relevant keywords and searching online for information fitting that conversation. 17 After the tion. Proposed strategies to detect sybil accounts often rely on examining the structure of a social graph.…”
Section: Act Like a Human Think Like A Botmentioning
confidence: 99%
“…A more extreme example of these kinds of bots are identity thieves: they copy usernames, profile information, and pictures of other accounts and use them as their own, making only small changes (Cresci, Di Pietro, Petrocchi, Spognardi, & Tesconi, 2015). State-of-the-art machine learning technologies can be employed as part of the algorithms that automatically generate bot content (Freitas, Benevenuto, Ghosh, & Veloso, 2015). Sophisticated bots can emulate temporal patterns of content posting and consumption by humans.…”
Section: Characterization Of Social Botsmentioning
confidence: 99%
“…This works also highlights the relevance of bots initiating the process of misinformation spread. Boshmaf [8] and Freitas [25] reported that simple automated mechanisms that produce contents and boost followers yield successful infiltration strategies of misinformation. However, nobody knows exactly how many social bots populate social media, or what share of content, and particularly misinformation, can be attributed to bots [21].…”
Section: Misinformation Dynamicsmentioning
confidence: 99%
“…While Twitter mentions that a survey will be send to a small group of people to gain feedback, little is known so far about the effects of this initiative. 25 Regarding the methods focused on the early detection of malicious accounts we can highlight works that aim to identify spammers [69], bots [21], crowdturfing [68] [40] and malicious accounts in general [19] [41]. These techniques generally focus on the analysis of various user, temporal, geographical and linguistic features in order to successfully identify these accounts.…”
Section: Misinformation Managementmentioning
confidence: 99%