Skip to main content

Do You Really Follow Them? Automatic Detection of Credulous Twitter Users

  • Conference paper
  • First Online:
Intelligent Data Engineering and Automated Learning – IDEAL 2019 (IDEAL 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11871))

Abstract

Online Social Media represent a pervasive source of information able to reach a huge audience. Sadly, recent studies show how online social bots (automated, often malicious accounts, populating social networks and mimicking genuine users) are able to amplify the dissemination of (fake) information by orders of magnitude. Using Twitter as a benchmark, in this work we focus on what we define credulous users, i.e., human-operated accounts with a high percentage of bots among their followings. Being more exposed to the harmful activities of social bots, credulous users may run the risk of being more influenced than other users; even worse, although unknowingly, they could become spreaders of misleading information (e.g., by retweeting bots). We design and develop a supervised classifier to automatically recognize credulous users. The best tested configuration achieves an accuracy of 93.27% and AUC-ROC of 0.93, thus leading to positive and encouraging results.

Partially supported by the European Union’s Horizon 2020 programme (grant agreement No. 830892, SPARTA) and by IMT Scuola Alti Studi Lucca: Integrated Activity Project TOFFEe ‘TOols for Fighting FakEs’. It has also benefited from the computing resources (ULITE) provided by the IT division of LNGS in L’Aquila.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Bot Repository Datasets: https://goo.gl/87Kzcr.

  2. 2.

    Twitter API: https://goo.gl/njcjr1.

  3. 3.

    https://botometer.iuni.iu.edu/.

  4. 4.

    Complete Automation Probability: https://tinyurl.com/yxp3wqzh.

  5. 5.

    English/Universal Score: https://tinyurl.com/y2skbmqc.

  6. 6.

    ClassA features require only information available in the profile of the account [10].

References

  1. Aha, D., Kibler, D.: Instance-based learning algorithms. Mach. Learn. 6, 37–66 (1991)

    MATH  Google Scholar 

  2. Amato, F., et al.: Recognizing human behaviours in online social networks. Comput. Secur. 74, 355–370 (2018)

    Article  Google Scholar 

  3. Balestrucci, A., et al.: Identification of credulous users on Twitter. In: ACM Symposium of Applied Computing (2019)

    Google Scholar 

  4. Bastos, M.T., Mercea, D.: The Brexit botnet and user-generated hyperpartisan news. Soc. Sci. Comput. Rev. 37(1), 38–54 (2019)

    Article  Google Scholar 

  5. Bovet, A., Makse, H.A.: Influence of fake news in Twitter during the 2016 US presidential election. Nat. Commun. 10(1), 7 (2019)

    Article  Google Scholar 

  6. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)

    Article  Google Scholar 

  7. Chatzakou, D., et al.: Mean birds: detecting aggression and bullying on Twitter. In: ACM Web Science Conference, pp. 13–22 (2017)

    Google Scholar 

  8. Chavoshi, N., et al.: DeBot: Twitter bot detection via warped correlation. In: Data Mining, pp. 817–822 (2016)

    Google Scholar 

  9. Cohen, W.: Fast effective rule induction. In: Machine Learning, pp. 115–123 (1995)

    Chapter  Google Scholar 

  10. Cresci, S., et al.: Fame for sale: efficient detection of fake Twitter followers. Decis. Support Syst. 80, 56–71 (2015)

    Article  Google Scholar 

  11. Cresci, S., et al.: Exploiting digital DNA for the analysis of similarities in Twitter behaviours. In: IEEE Data Science and Advanced Analytics, pp. 686–695 (2017)

    Google Scholar 

  12. Cresci, S., et al.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: 26th World Wide Web, Companion, pp. 963–972 (2017)

    Google Scholar 

  13. Ferrara, E., et al.: The rise of social bots. Commun. ACM 59(7), 96–104 (2016)

    Article  Google Scholar 

  14. Gilani, Z., et al.: A large-scale behavioural analysis of bots and humans on Twitter. ACM Trans. Web 13(1), 7 (2019)

    Article  Google Scholar 

  15. Holte, R.: Very simple classification rules perform well on most commonly used datasets. Mach. Learn. 11, 63–91 (1993)

    Article  Google Scholar 

  16. Jin, L., et al.: Understanding user behavior in online social networks: a survey. IEEE Commun. Mag. 51(9), 144–150 (2013)

    Article  Google Scholar 

  17. John, G.H., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: 11th Uncertainty in Artificial Intelligence, pp. 338–345 (1995)

    Google Scholar 

  18. Lee, J., et al.: An iterative undersampling of extremely imbalanced data using CSVM. In: Machine Vision, vol. 9445 (2014)

    Google Scholar 

  19. Minnich, A., et al.: BotWalk: efficient adaptive exploration of Twitter bot networks. In: ASONAM, pp. 467–474 (2017)

    Google Scholar 

  20. Mønsted, B., et al.: Evidence of complex contagion of information in socialmedia: an experiment using Twitter bots. PLoS ONE 12(9), e0184148 (2017)

    Article  Google Scholar 

  21. Pal, S.K., Mitra, S.: Multilayer perceptron, fuzzy sets, and classification. IEEE Trans. Neural Networks 3(5), 683–697 (1992)

    Article  Google Scholar 

  22. Platt, J.: Fast training of support vector machines using sequential minimal optimization. In: Advances in Kernel Methods - Support Vector Learning (1998)

    Google Scholar 

  23. Quinlan, J.R.: Simplifying decision trees. Int. J. Human Comput. Stud. 27(3), 221–234 (1987)

    Google Scholar 

  24. Shao, C., et al.: The spread of low-credibility content by social bots. Nature Commun. 9(1), 4787 (2018)

    Article  Google Scholar 

  25. Shen, T.J., et al.: How gullible are you? Predicting susceptibility to fake news. In: Web Science, pp. 287–288 (2019)

    Google Scholar 

  26. Varol, O., et al.: Online human-bot interactions: detection, estimation, and characterization. In: 11th Web and Social Media, pp. 280–289 (2017)

    Google Scholar 

  27. Wagner, C., et al.: When social bots attack: modeling susceptibility of users in online social networks. In: Making Sense of Microposts, pp. 41–48 (2012)

    Google Scholar 

  28. Witten, I.H., et al.: Data Mining: Practical Machine Learning Tools and Techniques (2016)

    Google Scholar 

  29. Yang, K.C., et al.: Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 1(1), 48–61 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alessandro Balestrucci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Balestrucci, A., De Nicola, R., Petrocchi, M., Trubiani, C. (2019). Do You Really Follow Them? Automatic Detection of Credulous Twitter Users. In: Yin, H., Camacho, D., Tino, P., Tallón-Ballesteros, A., Menezes, R., Allmendinger, R. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2019. IDEAL 2019. Lecture Notes in Computer Science(), vol 11871. Springer, Cham. https://doi.org/10.1007/978-3-030-33607-3_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-33607-3_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-33606-6

  • Online ISBN: 978-3-030-33607-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics