Abstract
We present a method for determining whether a Twitter account exhibits automated behavior in publishing status updates known as tweets. The approach uses only the publicly available timestamp information associated with each tweet. After evaluating its effectiveness, we use it to analyze the Twitter landscape, finding that 16% of active accounts exhibit a high degree of automation. We also find that 11% of accounts that appear to publish exclusively through the browser are in fact automated accounts that spoof the source of the updates.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dr. Phil (DrPhil) on Twitter (2010), http://twitter.com/DrPhil
OAuth FAQ 2010, http://apiwiki.twitter.com/OAuth-FAQ
TweetDeck (2010), http://www.tweetdeck.com/
UberTwitter (2010), http://www.ubertwitter.com/
Chowdhury, A.: State of Twitter Spam (2010), http://blog.twitter.com/2010/03/state-of-twitter-spam.html
D’Agostino, R.B., Stephens, M.A. (eds.): Goodness-of-Fit Techniques. Marcel Dekker Inc., New York (1986)
Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: The Underground on 140 Characters or Less. In: Proc. ACM CCS (2010)
Harvey, D.: Trust And Safety (2009), http://blog.twitter.com/2010/03/trust-and-safety.html
Huberman, B.A., Romero, D.M., Wu, F.: Social networks that matter: Twitter under the microscope. Technical report, Social Coputing Laboratory, HP Labs (2008)
Java, A., Song, X., Finin, T., Tseng, B.: Why We Twitter: An Analysis of a Microblogging Community. In: Zhang, H., Spiliopoulou, M., Mobasher, B., Giles, C.L., McCallum, A., Nasraoui, O., Srivastava, J., Yen, J. (eds.) WebKDD 2007. LNCS, vol. 5439, pp. 118–138. Springer, Heidelberg (2009)
Krishnamurthy, B., Gill, P., Arlitt, M.: A few chirps about Twitter. In: Proc. ACM SIGCOMM Workshop on Online Social Networks (2008)
Media, I.: HootSuite (2010), http://hootsuite.com/
Miller, C.: Twitter Makes Itself More Useful (2010), http://bits.blogs.nytimes.com/2010/04/14/twitter-makes-itself-more-useful/
naan studio. Echofon (2010), http://www.echofon.com/
Sysomos. Inside Twitter: An In-Depth Look at the 5% of Most Active Users (2009), http://sysomos.com/insidetwitter/mostactiveusers
TwitterCounter.com. The 1000 most popular Twitter users (2010), http://twittercounter.com/pages/100/
Zetter, K.: Trick or Tweet? Malware Abundant in Twitter URLs (2009), http://www.wired.com/threatlevel/2009/10/twitter_malware/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, C.M., Paxson, V. (2011). Detecting and Analyzing Automated Activity on Twitter. In: Spring, N., Riley, G.F. (eds) Passive and Active Measurement. PAM 2011. Lecture Notes in Computer Science, vol 6579. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19260-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-19260-9_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19259-3
Online ISBN: 978-3-642-19260-9
eBook Packages: Computer ScienceComputer Science (R0)