Detecting Bots and Assessing Their Impact in Social Networks

Online social networks are often subject to influence campaigns by malicious actors through the use of automated accounts known as bots. We consider the problem of detecting bots in online social networks and assessing their impact on the opinions of individuals. We begin by analyzing the behavior of bots in social networks and identify that they exhibit heterophily, meaning they interact with humans more than other bots. We use this property to develop a detection algorithm based on the Ising model from statistical physics. The bots are identified by solving a minimum cut problem. We show that this Ising model algorithm can identify bots with higher accuracy while utilizing much less data than other state of the art methods. We then develop a a function we call generalized harmonic influence centrality to estimate the impact bots have on the opinions of users in social networks. This function is based on a generalized opinion dynamics model and captures how the activity level and network connectivity of the bots shift equilibrium opinions. To apply generalized harmonic influence centrality to real social networks, we develop a deep neural network to measure the opinions of users based on their social network posts. Using this neural network, we then calculate the generalized harmonic influence centrality of bots in multiple real social networks. For some networks we find that a limited number of bots can cause non-trivial shifts in the population opinions. In other networks, we find that the bots have little impact. Overall we find that generalized harmonic influence centrality is a useful operational tool to measure the impact of bots in social networks.

[1]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[2]  Qiang Cao,et al.  Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.

[3]  S. Galam,et al.  The role of inflexible minorities in the breaking of democratic opinion dynamics , 2007, physics/0703021.

[4]  Giacomo Como,et al.  Opinion Fluctuations and Disagreement in Social Networks , 2010 .

[5]  Erdong Chen,et al.  Facebook immune system , 2011, SNS '11.

[6]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[7]  Max Nanis,et al.  Socialbots: voices from the fronts , 2012, INTR.

[8]  R. Holley,et al.  Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter Model , 1975 .

[9]  Tauhid Zaman,et al.  Optimizing Opinions with Stubborn Agents Under Time-Varying Dynamics , 2018 .

[10]  John N. Tsitsiklis,et al.  Convergence Speed in Distributed Consensus and Averaging , 2009, SIAM J. Control. Optim..

[11]  Krishna P. Gummadi,et al.  Understanding and combating link farming in the twitter social network , 2012, WWW.

[12]  Ilan Lobel,et al.  BAYESIAN LEARNING IN SOCIAL NETWORKS , 2008 .

[13]  Lawrence Gray,et al.  Duality for General Attractive Spin Systems with Applications in One Dimension , 1986 .

[14]  Filippo Menczer,et al.  The rise of social bots , 2014, Commun. ACM.

[15]  J. T. Cox,et al.  Diffusive Clustering in the Two Dimensional Voter Model , 1986 .

[16]  Tauhid Zaman,et al.  Opinion Dynamics with Stubborn Agents , 2018, ArXiv.

[17]  John N. Tsitsiklis,et al.  Problems in decentralized decision making and computation , 1984 .

[18]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[19]  Gang Wang,et al.  Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.

[20]  D. Rubin Causal Inference Using Potential Outcomes , 2005 .

[21]  E. Rogers,et al.  HOMOPHILY-HETEROPHILY: RELATIONAL CONCEPTS FOR COMMUNICATION RESEARCH , 1970 .

[22]  F. Barahona On the computational complexity of Ising spin glass models , 1982 .

[23]  Vladimir Kolmogorov,et al.  What energy functions can be minimized via graph cuts? , 2002, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[24]  Filippo Menczer,et al.  BotOrNot: A System to Evaluate Social Bots , 2016, WWW.

[25]  Silvio Lattanzi,et al.  SoK: The Evolution of Sybil Defense via Social Networks , 2013, 2013 IEEE Symposium on Security and Privacy.

[26]  S. Redner,et al.  Voter model on heterogeneous graphs. , 2004, Physical review letters.

[27]  Éva Tardos,et al.  Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.

[28]  Omer Levy,et al.  word2vec Explained: deriving Mikolov et al.'s negative-sampling word-embedding method , 2014, ArXiv.

[29]  Krishna P. Gummadi,et al.  Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.

[30]  Mehmet E. Yildiz,et al.  Binary Opinion Dynamics with Stubborn Agents , 2013, TEAC.

[31]  Eva Zangerle,et al.  "Sorry, I was hacked": a classification of compromised twitter accounts , 2014, SAC.

[32]  Christopher Marks,et al.  Building a Location-Based Set of Social Media Users , 2017, Oper. Res..

[33]  Jie Lin,et al.  Coordination of groups of mobile autonomous agents using nearest neighbor rules , 2003, IEEE Trans. Autom. Control..

[34]  Hanghang Tong,et al.  Big data classification , 2014 .

[35]  Virgílio A. F. Almeida,et al.  Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.

[36]  R. Zabih,et al.  Spatially coherent clustering using graph cuts , 2004, CVPR 2004.

[37]  Jacob Ratkiewicz,et al.  Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.

[38]  Gang Wang,et al.  Northeastern University , 2021, IEEE Pulse.

[39]  Alex Hai Wang,et al.  Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach , 2010, DBSec.

[40]  Douglas Gale,et al.  Bayesian learning in social networks , 2003, Games Econ. Behav..

[41]  Piotr Sapiezynski,et al.  Evidence of complex contagion of information in social media: An experiment using Twitter bots , 2017, PloS one.

[42]  Timothy Baldwin,et al.  Text-Based Twitter User Geolocation Prediction , 2014, J. Artif. Intell. Res..

[43]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.

[44]  Hansjörg Neth,et al.  Social Influence and the Collective Dynamics of Opinion Formation , 2013, PloS one.

[45]  Asuman E. Ozdaglar,et al.  Opinion Fluctuations and Disagreement in Social Networks , 2010, Math. Oper. Res..

[46]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[47]  S. Redner,et al.  On the role of zealotry in the voter model , 2007 .

[48]  Gianluca Stringhini,et al.  COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.

[49]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[50]  Konstantin Beznosov,et al.  Design and analysis of a social botnet , 2013, Comput. Networks.

[51]  Emilio Ferrara,et al.  Disinformation and Social Bot Operations in the Run Up to the 2017 French Presidential Election , 2017, First Monday.

[52]  Sinan Aral,et al.  The spread of true and false news online , 2018, Science.

[53]  Emilio Ferrara,et al.  Social Bots Distort the 2016 US Presidential Election Online Discussion , 2016, First Monday.

[54]  E. Seneta,et al.  Towards consensus: some convergence theorems on repeated averaging , 1977, Journal of Applied Probability.

[55]  M. Degroot Reaching a Consensus , 1974 .

[56]  Jytte Klausen,et al.  Finding Extremists in Online Social Networks , 2018, Oper. Res..

[57]  Danah Boyd,et al.  Detecting Spam in a Twitter Network , 2009, First Monday.

[58]  A. Banerjee,et al.  A Simple Model of Herd Behavior , 1992 .

[59]  P. Clifford,et al.  A model for spatial conflict , 1973 .

[60]  John N. Tsitsiklis,et al.  Distributed Asynchronous Deterministic and Stochastic Gradient Optimization Algorithms , 1984, 1984 American Control Conference.

[61]  Krapivsky Kinetics of monomer-monomer surface catalytic reactions. , 1992, Physical review. A, Atomic, molecular, and optical physics.

[62]  S. Bikhchandani,et al.  You have printed the following article : A Theory of Fads , Fashion , Custom , and Cultural Change as Informational Cascades , 2007 .

[63]  Lakshminarayanan Subramanian,et al.  Sybil-Resilient Online Content Voting , 2009, NSDI.

[64]  Amir Herzberg,et al.  Ethical Considerations when Employing Fake Identities in Online Social Networks for Research , 2014, Sci. Eng. Ethics.

[65]  Kristina Lerman,et al.  Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[66]  Yoon Kim,et al.  Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.

[67]  Drew Fudenberg,et al.  Word-of-mouth learning , 2004, Games Econ. Behav..

[68]  E. Ising Beitrag zur Theorie des Ferromagnetismus , 1925 .

[69]  John N. Tsitsiklis,et al.  Distributed asynchronous deterministic and stochastic gradient optimization algorithms , 1986 .

[70]  R. Srikant,et al.  Opinion dynamics in social networks: A local interaction game with stubborn agents , 2012, 2013 American Control Conference.

[71]  Tauhid Zaman,et al.  Detecting Influence Campaigns in Social Networks Using the Ising Model , 2018, ArXiv.

[72]  Dean Eckles,et al.  Protecting elections from social media manipulation , 2019, Science.

[73]  B. Huberman,et al.  Social Structure and Opinion Formation , 2004, cond-mat/0407252.

[74]  Sushil Jajodia,et al.  Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.

[75]  Rami Puzis,et al.  Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks , 2017, IEEE Transactions on Computational Social Systems.

[76]  Fabrício Benevenuto,et al.  Reverse engineering socialbot infiltration strategies in Twitter , 2014, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[77]  Venkatesan Guruswami,et al.  CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.

[78]  Derek Ruths,et al.  Geolocation Prediction in Twitter Using Social Networks: A Critical Analysis and Review of Current Practice , 2015, ICWSM.

[79]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[80]  Dan Braha,et al.  Dynamical Response of Networks Under External Perturbations: Exact Results , 2007, 0705.4607.

[81]  Dan Mercea,et al.  The Brexit Botnet and User-Generated Hyperpartisan News , 2017 .