Skip to main content

Method of Detecting Bots on Social Media. A Literature Review

  • Conference paper
  • First Online:
Computational Collective Intelligence (ICCCI 2020)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12496))

Included in the following conference series:

Abstract

The introduction of the online social media system has unquestionably facilitated communication as well as being a prime and cheap source of information. However, despite these numerous advantages, the social media system remains a double-edged sword. Recently, the online social media ecosystem although fast becoming the primary source of information has become the medium for misinformation and other malicious attacks. These malicious attacks are further exacerbated by the use of social bots that have implacable consequences to victims. In this study, we examine the various methods employed by experts and academia to detect and curb Sybils attack. We define and explain three types of social bots such as the good, the bad and the ugly. We surmised that although the various social media giants have peddled in orthogonal techniques to uncloak and perturb Sybils activities, the adversaries are also working on a robust method to evade detection, hence, a heuristic approach including hybrid crowdsourced-machine learning technique is required to avert future attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yang, K., Varol, O., Davis, C.A., Ferrara, E., Flammini, A., Menczer, F.: Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 1(1), 48–61 (2019). https://doi.org/10.1002/hbe2.115

    Article  Google Scholar 

  2. Karataş, A., Şahin, S.: A Review on social bot detection techniques and research directions. In: Proceedings of the International Information Security and Cryptology Conference, Turkey, no. i, pp. 156–161 (2017)

    Google Scholar 

  3. Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutorials 16(2), 898–924 (2014). https://doi.org/10.1109/SURV.2013.091213.00134

    Article  Google Scholar 

  4. Grimme, C., Preuss, M., Adam, L., Trautmann, H.: Social bots: human-like by means of human control? Big Data 5(4), 279–293 (2017). https://doi.org/10.1089/big.2017.0044

    Article  Google Scholar 

  5. Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. (Ny) 467, 312–322 (2018). https://doi.org/10.1016/j.ins.2018.08.019

    Article  Google Scholar 

  6. Perez-Soler, S., Guerra, E., De Lara, J., Jurado, F.: The rise of the (modelling) bots: towards assisted modelling via social networks. In: ASE 2017 – Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), pp. 723–728 (2017). https://doi.org/10.1109/ase.2017.8115683

  7. Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96–104 (2016). https://doi.org/10.1145/2818717

    Article  Google Scholar 

  8. Yang, K.C., Hui, P.M., Menczer, F.: Bot electioneering volume: visualizing social bot activity during elections. In: Web Conference 2019 - Companion World Wide Web Conference WWW 2019, pp. 214–217 (2019). https://doi.org/10.1145/3308560.3316499

  9. Ratkiewicz, J., Meiss, M., Conover, M., Gonçalves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, p. 297 (2011)

    Google Scholar 

  10. Broniatowski, D.A., et al.: Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. Am. J. Public Health 108(10), 1378–1384 (2018). https://doi.org/10.2105/AJPH.2018.304567

    Article  Google Scholar 

  11. Mehrotra, A., Sarreddy, M., Singh, S.: Detection of fake Twitter followers using graph centrality measures. In: Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016, September 2016, pp. 499–504 (2016). https://doi.org/10.1109/ic3i.2016.7918016

  12. Barbon, S., et al.: Detection of human, legitimate bot, and malicious bot in online social networks based on wavelets. ACM Trans. Multimed. Comput. Commun. Appl. 14(1s) (2018). https://doi.org/10.1145/3183506

  13. Kaubiyal, J., Jain, A.K.: A feature based approach to detect fake profiles in Twitter. In: ACM International Conference Proceeding Series, pp. 135–139 (2019). https://doi.org/10.1145/3361758.3361784

  14. Luo, L., Zhang, X., Yang, X., Yang, W.: Deepbot: a deep neural network based approach for detecting Twitter Bots. IOP Conf. Ser. Mater. Sci. Eng. 719(1) (2020). https://doi.org/10.1088/1757-899x/719/1/012063

  15. Ferrara, E.: Measuring social spam and the effect of bots on information diffusion in social media. In: Lehmann, S., Ahn, Y.-Y. (eds.) Complex Spreading Phenomena in Social Systems. CSS, pp. 229–255. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-77332-2_13. arXiv: 1708.08134v1

    Chapter  Google Scholar 

  16. Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019–2036 (2014). https://doi.org/10.1109/COMST.2014.2321628

    Article  Google Scholar 

  17. Bhise, A.M., Kamble, S.D.: Review on detection and mitigation of Sybil attack in the network. Phys. Procedia Comput. Sci. 78, 395–401 (2016). https://doi.org/10.1016/j.procs.2016.02.080

    Article  Google Scholar 

  18. Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network Sybils in the wild. ACM Trans. Knowl. Discov. Data 8(1) (2014). https://doi.org/10.1145/2556609

  19. Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: NSDI 2012 Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, p. 15 (2012)

    Google Scholar 

  20. Lieto, A., et al.: Hello? Who am I talking to? A shallow CNN approach for human vs. bot speech classification. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, May 2019, pp. 2577–2581 (2019). https://doi.org/10.1109/icassp.2019.8682743

  21. Melmeti, K., Shannon, C., Asaf, V.: Visualization of the social bot’s fingerprints. In: 4th International Symposium on Digital Forensics and Security, pp. 161–166 (2016)

    Google Scholar 

  22. Stein, T., Chen, E., Mangla, K.: Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, SNS 2011 (2011). https://doi.org/10.1145/1989656.1989664

  23. Paul, A., Sinha, S., Pal, S.: An efficient method to detect Sybil attack using trust based model. In: Proceedings of the International Conference on Advances in Computer Science AETACS, December 2013, pp. 228–237 (2013)

    Google Scholar 

  24. Glasgow, J.: Swarm intelligence: concepts, models and applications. Technical report 2012-585 (2012)

    Google Scholar 

  25. Surowiecki, J.: The Wisdom of Crowds, First Anch. Anchor Books, A Division of Random House Inc, New York (2004)

    Google Scholar 

  26. Dang, D.T., Nguyen, N.T., Hwang, D.: Multi-step consensus: an effective approach for determining consensus in large collectives. Cybern. Syst. 50(2), 208–229 (2019). https://doi.org/10.1080/01969722.2019.1565117

    Article  Google Scholar 

  27. Malone, T., Atlee, T., Lévy, P., Rt, T., Paul, H., Homer-dixon, T.: Collective Intelligence: Creating a Prosperous World at Peace. Earth Intelligence Network, Oakton (2008)

    Google Scholar 

  28. Wang, G., et al.: Social turing tests: crowdsourcing Sybil detection (2012)

    Google Scholar 

  29. Schnebly, J., Sengupta, S.: Random forest Twitter bot classifier. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference CCWC 2019, pp. 506–512 (2019). http://doi.org/10.1109/CCWC.2019.8666593

  30. Danezis, G.: SybilInfer: detecting Sybil nodes using social networks. In: Network and Distributed System Security Symposium (2009)

    Google Scholar 

  31. Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against Sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010). https://doi.org/10.1109/TNET.2009.2034047

    Article  Google Scholar 

  32. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. IEEE/ACM Trans. Netw. 16(3), 267 (2008). https://doi.org/10.1145/1159913.1159945

    Article  Google Scholar 

  33. Gang, W., Tristan, K., Christo, W., Haitao, Z., Zhao, B.Y.: You are how you click: clickstream analysis for Sybil detection. In: Proceedings of the 22nd USENIX Security Symposium, vol. 7, no. 2, pp. 95–112 (2013). https://doi.org/10.1111/j.1745-4522.2000.tb00164.x

  34. Nguyen, N.T.: Advanced Methods for Inconsistent Knowledge Management. AIKP. Springer, London (2008). https://doi.org/10.1007/978-1-84628-889-0

    Book  MATH  Google Scholar 

  35. Danilowicz, C., Nguyen, N.T.: Consensus-based methods for restoring consistency of replicated data. In: K’opotek et al. (eds.) Advances in Soft Computing, Proceedings of 9th International Conference on Intelligent Information Systems 2000, pp. 325–336. Physica (2000)

    Google Scholar 

  36. Nguyen, N.T.: Using consensus methods for solving conflicts of data in distributed systems. In: Hlaváč, V., Jeffery, K.G., Wiedermann, J. (eds.) SOFSEM 2000. LNCS, vol. 1963, pp. 411–419. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44411-4_30

    Chapter  Google Scholar 

Download references

Acknowledgment

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2017R1A2B4009410), and the National Research Foundation of Korea (NRF) grant funded by the BK21PLUS Program (22A20130012009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dosam Hwang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Collins, B., Hoang, D.T., Dang, D.T., Hwang, D. (2020). Method of Detecting Bots on Social Media. A Literature Review. In: Nguyen, N.T., Hoang, B.H., Huynh, C.P., Hwang, D., Trawiński, B., Vossen, G. (eds) Computational Collective Intelligence. ICCCI 2020. Lecture Notes in Computer Science(), vol 12496. Springer, Cham. https://doi.org/10.1007/978-3-030-63007-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63007-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63006-5

  • Online ISBN: 978-3-030-63007-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics