Abstract
The introduction of the online social media system has unquestionably facilitated communication as well as being a prime and cheap source of information. However, despite these numerous advantages, the social media system remains a double-edged sword. Recently, the online social media ecosystem although fast becoming the primary source of information has become the medium for misinformation and other malicious attacks. These malicious attacks are further exacerbated by the use of social bots that have implacable consequences to victims. In this study, we examine the various methods employed by experts and academia to detect and curb Sybils attack. We define and explain three types of social bots such as the good, the bad and the ugly. We surmised that although the various social media giants have peddled in orthogonal techniques to uncloak and perturb Sybils activities, the adversaries are also working on a robust method to evade detection, hence, a heuristic approach including hybrid crowdsourced-machine learning technique is required to avert future attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yang, K., Varol, O., Davis, C.A., Ferrara, E., Flammini, A., Menczer, F.: Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 1(1), 48–61 (2019). https://doi.org/10.1002/hbe2.115
Karataş, A., Şahin, S.: A Review on social bot detection techniques and research directions. In: Proceedings of the International Information Security and Cryptology Conference, Turkey, no. i, pp. 156–161 (2017)
Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutorials 16(2), 898–924 (2014). https://doi.org/10.1109/SURV.2013.091213.00134
Grimme, C., Preuss, M., Adam, L., Trautmann, H.: Social bots: human-like by means of human control? Big Data 5(4), 279–293 (2017). https://doi.org/10.1089/big.2017.0044
Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. (Ny) 467, 312–322 (2018). https://doi.org/10.1016/j.ins.2018.08.019
Perez-Soler, S., Guerra, E., De Lara, J., Jurado, F.: The rise of the (modelling) bots: towards assisted modelling via social networks. In: ASE 2017 – Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), pp. 723–728 (2017). https://doi.org/10.1109/ase.2017.8115683
Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96–104 (2016). https://doi.org/10.1145/2818717
Yang, K.C., Hui, P.M., Menczer, F.: Bot electioneering volume: visualizing social bot activity during elections. In: Web Conference 2019 - Companion World Wide Web Conference WWW 2019, pp. 214–217 (2019). https://doi.org/10.1145/3308560.3316499
Ratkiewicz, J., Meiss, M., Conover, M., Gonçalves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, p. 297 (2011)
Broniatowski, D.A., et al.: Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. Am. J. Public Health 108(10), 1378–1384 (2018). https://doi.org/10.2105/AJPH.2018.304567
Mehrotra, A., Sarreddy, M., Singh, S.: Detection of fake Twitter followers using graph centrality measures. In: Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016, September 2016, pp. 499–504 (2016). https://doi.org/10.1109/ic3i.2016.7918016
Barbon, S., et al.: Detection of human, legitimate bot, and malicious bot in online social networks based on wavelets. ACM Trans. Multimed. Comput. Commun. Appl. 14(1s) (2018). https://doi.org/10.1145/3183506
Kaubiyal, J., Jain, A.K.: A feature based approach to detect fake profiles in Twitter. In: ACM International Conference Proceeding Series, pp. 135–139 (2019). https://doi.org/10.1145/3361758.3361784
Luo, L., Zhang, X., Yang, X., Yang, W.: Deepbot: a deep neural network based approach for detecting Twitter Bots. IOP Conf. Ser. Mater. Sci. Eng. 719(1) (2020). https://doi.org/10.1088/1757-899x/719/1/012063
Ferrara, E.: Measuring social spam and the effect of bots on information diffusion in social media. In: Lehmann, S., Ahn, Y.-Y. (eds.) Complex Spreading Phenomena in Social Systems. CSS, pp. 229–255. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-77332-2_13. arXiv: 1708.08134v1
Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019–2036 (2014). https://doi.org/10.1109/COMST.2014.2321628
Bhise, A.M., Kamble, S.D.: Review on detection and mitigation of Sybil attack in the network. Phys. Procedia Comput. Sci. 78, 395–401 (2016). https://doi.org/10.1016/j.procs.2016.02.080
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network Sybils in the wild. ACM Trans. Knowl. Discov. Data 8(1) (2014). https://doi.org/10.1145/2556609
Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: NSDI 2012 Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, p. 15 (2012)
Lieto, A., et al.: Hello? Who am I talking to? A shallow CNN approach for human vs. bot speech classification. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, May 2019, pp. 2577–2581 (2019). https://doi.org/10.1109/icassp.2019.8682743
Melmeti, K., Shannon, C., Asaf, V.: Visualization of the social bot’s fingerprints. In: 4th International Symposium on Digital Forensics and Security, pp. 161–166 (2016)
Stein, T., Chen, E., Mangla, K.: Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, SNS 2011 (2011). https://doi.org/10.1145/1989656.1989664
Paul, A., Sinha, S., Pal, S.: An efficient method to detect Sybil attack using trust based model. In: Proceedings of the International Conference on Advances in Computer Science AETACS, December 2013, pp. 228–237 (2013)
Glasgow, J.: Swarm intelligence: concepts, models and applications. Technical report 2012-585 (2012)
Surowiecki, J.: The Wisdom of Crowds, First Anch. Anchor Books, A Division of Random House Inc, New York (2004)
Dang, D.T., Nguyen, N.T., Hwang, D.: Multi-step consensus: an effective approach for determining consensus in large collectives. Cybern. Syst. 50(2), 208–229 (2019). https://doi.org/10.1080/01969722.2019.1565117
Malone, T., Atlee, T., Lévy, P., Rt, T., Paul, H., Homer-dixon, T.: Collective Intelligence: Creating a Prosperous World at Peace. Earth Intelligence Network, Oakton (2008)
Wang, G., et al.: Social turing tests: crowdsourcing Sybil detection (2012)
Schnebly, J., Sengupta, S.: Random forest Twitter bot classifier. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference CCWC 2019, pp. 506–512 (2019). http://doi.org/10.1109/CCWC.2019.8666593
Danezis, G.: SybilInfer: detecting Sybil nodes using social networks. In: Network and Distributed System Security Symposium (2009)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against Sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010). https://doi.org/10.1109/TNET.2009.2034047
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. IEEE/ACM Trans. Netw. 16(3), 267 (2008). https://doi.org/10.1145/1159913.1159945
Gang, W., Tristan, K., Christo, W., Haitao, Z., Zhao, B.Y.: You are how you click: clickstream analysis for Sybil detection. In: Proceedings of the 22nd USENIX Security Symposium, vol. 7, no. 2, pp. 95–112 (2013). https://doi.org/10.1111/j.1745-4522.2000.tb00164.x
Nguyen, N.T.: Advanced Methods for Inconsistent Knowledge Management. AIKP. Springer, London (2008). https://doi.org/10.1007/978-1-84628-889-0
Danilowicz, C., Nguyen, N.T.: Consensus-based methods for restoring consistency of replicated data. In: K’opotek et al. (eds.) Advances in Soft Computing, Proceedings of 9th International Conference on Intelligent Information Systems 2000, pp. 325–336. Physica (2000)
Nguyen, N.T.: Using consensus methods for solving conflicts of data in distributed systems. In: Hlaváč, V., Jeffery, K.G., Wiedermann, J. (eds.) SOFSEM 2000. LNCS, vol. 1963, pp. 411–419. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44411-4_30
Acknowledgment
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2017R1A2B4009410), and the National Research Foundation of Korea (NRF) grant funded by the BK21PLUS Program (22A20130012009).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Collins, B., Hoang, D.T., Dang, D.T., Hwang, D. (2020). Method of Detecting Bots on Social Media. A Literature Review. In: Nguyen, N.T., Hoang, B.H., Huynh, C.P., Hwang, D., Trawiński, B., Vossen, G. (eds) Computational Collective Intelligence. ICCCI 2020. Lecture Notes in Computer Science(), vol 12496. Springer, Cham. https://doi.org/10.1007/978-3-030-63007-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-63007-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63006-5
Online ISBN: 978-3-030-63007-2
eBook Packages: Computer ScienceComputer Science (R0)