Skip to main content

Retweeting Activity on Twitter: Signs of Deception

  • Conference paper
  • First Online:
Advances in Knowledge Discovery and Data Mining (PAKDD 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9077))

Included in the following conference series:

Abstract

Given the re-broadcasts (i.e. retweets) of posts in Twitter, how can we spot fake from genuine user reactions? What will be the tell-tale sign — the connectivity of retweeters, their relative timing, or something else? High retweet activity indicates influential users, and can be monetized. Hence, there are strong incentives for fraudulent users to artificially boost their retweets’ volume. Here, we explore the identification of fraudulent and genuine retweet threads. Our main contributions are: (a) the discovery of patterns that fraudulent activity seems to follow (the “triangles ” and “homogeneity ” patterns, the formation of micro-clusters in appropriate feature spaces); and (b) “RTGen ”, a realistic generator that mimics the behaviors of both honest and fraudulent users. We present experiments on a dataset of more than 6 million retweets crawled from Twitter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beutel, A., et al.: CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. In: WWW, pp. 119–130. ACM (2013)

    Google Scholar 

  2. Chu, Z., et al.: Who is Tweeting on Twitter: Human, Bot, or Cyborg? ACSAC, 21–30 (2010)

    Google Scholar 

  3. Derrida, B., et al.: Statistical Properties of Randomly Broken Objects and of Multivalley Structures in Disordered Systems. Journal of Physics A: Mathematical and General 20(15), 5273–5288 (1987)

    Article  MathSciNet  Google Scholar 

  4. Erdos, P., et al.: On the evolution of Random Graphs. Publ. Math. Inst. Hungary. Acad. Sci. 5, 17–61 (1960)

    Google Scholar 

  5. Ghosh, R., et al.: Entropy-based classification of ‘retweeting’ activity on twitter. In: KDD Workshop on Social Network Analysis (SNA-KDD) (2011)

    Google Scholar 

  6. Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Inferring strange behavior from connectivity pattern in social networks. In: Tseng, V.S., Ho, T.B., Zhou, Z.-H., Chen, A.L.P., Kao, H.-Y. (eds.) PAKDD 2014, Part I. LNCS, vol. 8443, pp. 126–138. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  7. Kempe, D., et al.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 137–146. ACM, New York (2003)

    Google Scholar 

  8. Kurt, T., et al.: Suspended Accounts in Retrospect: an Analysis of Twitter Spam. IMC, 243–258 (2011)

    Google Scholar 

  9. Kwak, H., et al.: What is Twitter, a Social Network or a News Media? In: WWW, pp. 591–600 (2010)

    Google Scholar 

  10. Leskovec, J., et al.: Kronecker Graphs: An Approach to Modeling Networks. JMLR 11, 985–1042 (2010)

    MATH  MathSciNet  Google Scholar 

  11. Lin, P.-C., et al.: A Study of Effective Features for Detecting Long-surviving Twitter Spam Accounts. ICACT 841 (2013)

    Google Scholar 

  12. Mao, H.-H., Wu, C.-J., Papalexakis, E.E., Faloutsos, C., Lee, K.-C., Kao, T.-C.: MalSpot: Multi\(^\text{2 }\) malicious network behavior patterns analysis. In: Tseng, V.S., Ho, T.B., Zhou, Z.-H., Chen, A.L.P., Kao, H.-Y. (eds.) PAKDD 2014, Part I. LNCS, vol. 8443, pp. 1–14. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  13. Pandit, S., et al.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: WWW, pp. 201–210. ACM (2007)

    Google Scholar 

  14. Rao, A., et al.: Modeling and Analysis of Real World Networks using Kronecker Graphs. Project report (2010)

    Google Scholar 

  15. Schroeder, M.: Fractals, Chaos, Power Laws, 6th edn. W. H. Freeman, New York (1991)

    MATH  Google Scholar 

  16. Tavares, G., et al.: Scaling-Laws of Human Broadcast Communication Enable Distinction between Human, Corporate and Robot Twitter Users. PLoS ONE 8(7), e65774 (2013)

    Article  Google Scholar 

  17. Wu, X., Feng, Z., Fan, W., Gao, J., Yu, Y.: Detecting marionette microblog users for improved information credibility. In: Blockeel, H., Kersting, K., Nijssen, S., Železný, F. (eds.) ECML PKDD 2013, Part III. LNCS, vol. 8190, pp. 483–498. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  18. Yang, C., et al.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: WWW, pp. 71–80 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maria Giatsoglou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Giatsoglou, M., Chatzakou, D., Shah, N., Faloutsos, C., Vakali, A. (2015). Retweeting Activity on Twitter: Signs of Deception. In: Cao, T., Lim, EP., Zhou, ZH., Ho, TB., Cheung, D., Motoda, H. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2015. Lecture Notes in Computer Science(), vol 9077. Springer, Cham. https://doi.org/10.1007/978-3-319-18038-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18038-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18037-3

  • Online ISBN: 978-3-319-18038-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics