Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network

Malicious social bots generate fake tweets and automate their social relationships either by pretending like a follower or by creating multiple fake accounts with malicious activities. Moreover, malicious social bots post shortened malicious URLs in the tweet in order to redirect the requests of online social networking participants to some malicious servers. Hence, distinguishing malicious social bots from legitimate users is one of the most important tasks in the Twitter network. To detect malicious social bots, extracting URL-based features (such as URL redirection, frequency of shared URLs, and spam content in URL) consumes less amount of time in comparison with social graph-based features (which rely on the social interactions of users). Furthermore, malicious social bots cannot easily manipulate URL redirection chains. In this article, a learning automata-based malicious social bot detection (LA-MSBD) algorithm is proposed by integrating a trust computation model with URL-based features for identifying trustworthy participants (users) in the Twitter network. The proposed trust computation model contains two parameters, namely, direct trust and indirect trust. Moreover, the direct trust is derived from Bayes’ theorem, and the indirect trust is derived from the Dempster–Shafer theory (DST) to determine the trustworthiness of each participant accurately. Experimentation has been performed on two Twitter data sets, and the results illustrate that the proposed algorithm achieves improvement in precision, recall, F-measure, and accuracy compared with existing approaches for MSBD.

[1]  Guoping Qiu,et al.  Random Forest for Label Ranking , 2016, Expert Syst. Appl..

[2]  Rashmi Ranjan Rout,et al.  Detection of Social Botnet using a Trust Model based on Spam Content in Twitter Network , 2018, 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS).

[3]  Mark C Simmonds,et al.  A general framework for the use of logistic regression models in meta-analysis , 2016, Statistical methods in medical research.

[4]  Ankit Kumar Jain,et al.  A machine learning based approach for phishing detection using hyperlinks information , 2018, Journal of Ambient Intelligence and Humanized Computing.

[5]  Scott T. Acton,et al.  Learning automata for image segmentation , 2016, Pattern Recognit. Lett..

[6]  A. Neumann,et al.  Security and Privacy Implications of URL Shortening Services , 2010 .

[7]  Yongquan Zhou,et al.  Twin support vector machines: A survey , 2018, Neurocomputing.

[8]  Konstantin Beznosov,et al.  Key Challenges in Defending Against Malicious Socialbots , 2012, LEET.

[9]  Huan Liu,et al.  Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose , 2013, ICWSM.

[10]  D. V. L. N. Somayajulu,et al.  Adaptive deep Q-learning model for detecting social bots and influential users in online social networks , 2019, Applied Intelligence.

[11]  Yu Wang,et al.  Statistical Features-Based Real-Time Detection of Drifted Twitter Spam , 2017, IEEE Transactions on Information Forensics and Security.

[12]  Mostafa Ghobaei-Arani,et al.  A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment , 2018, Future Gener. Comput. Syst..

[13]  Jun Zhang,et al.  Twitter spam detection based on deep learning , 2017, ACSW.

[14]  Xiao Chen,et al.  6 million spam tweets: A large ground truth for timely Twitter spam detection , 2015, 2015 IEEE International Conference on Communications (ICC).

[15]  Jong Kim,et al.  WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream , 2013, IEEE Transactions on Dependable and Secure Computing.

[16]  Mohammad Reza Meybodi,et al.  Evaluating Learning Automata as a Model for Cooperation in Complex Multi-agent Domains , 2006, RoboCup.

[17]  Himank Gupta,et al.  A framework for real-time spam detection in Twitter , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).

[18]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[19]  Sreekanth Madisetty,et al.  A Neural Network-Based Ensemble Approach for Spam Detection in Twitter , 2018, IEEE Transactions on Computational Social Systems.

[20]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[21]  Ed de Quincey,et al.  Using supervised machine learning algorithms to detect suspicious URLs in online social networks , 2017, ASONAM.

[22]  Mohammad Reza Meybodi,et al.  Sampling from complex networks using distributed learning automata , 2014 .

[23]  Rashmi Ranjan Rout,et al.  Learning automata-based trust model for user recommendations in online social networks , 2017, Comput. Electr. Eng..

[24]  Ted Taekyoung Kwon,et al.  Bit.ly/practice: Uncovering content publishing and sharing through URL shortening services , 2018, Telematics Informatics.

[25]  Chia-Mei Chen,et al.  Feature set identification for detecting suspicious URLs using Bayesian classification in social networks , 2014, Inf. Sci..

[26]  Shi Zhou,et al.  Full Cycle Analysis of a Large-Scale Botnet Attack on Twitter , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[27]  Giovanni Vigna,et al.  Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.

[28]  Liang Zhao,et al.  A topic-focused trust model for Twitter , 2016, Comput. Commun..

[29]  Roberto Di Pietro,et al.  The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race , 2017, WWW.

[30]  Anis Yazidi,et al.  Learning-Automaton-Based Online Discovery and Tracking of Spatiotemporal Event Patterns , 2013, IEEE Transactions on Cybernetics.

[31]  Jong Kim,et al.  Fluxing botnet command and control channels with URL shortening services , 2013, Comput. Commun..

[32]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.

[33]  Dharmaraj R. Patil,et al.  Malicious URLs Detection Using Decision Tree Classifiers and Majority Voting Technique , 2018 .

[34]  Pavel Laskov,et al.  Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.

[35]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[36]  Sushil Jajodia,et al.  Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.

[37]  Yang Guo,et al.  Bayesian-Inference-Based Recommendation in Online Social Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[38]  Laxmi Ahuja,et al.  Detecting redirection spam using multilayer perceptron neural network , 2017, Soft Computing.

[39]  Mahdi Abadi,et al.  SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective Classification , 2018, 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[40]  Hossam Faris,et al.  An efficient hybrid multilayer perceptron neural network with grasshopper optimization , 2018, Soft Computing.

[41]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[42]  Juan Echeverria,et al.  Discovery, Retrieval, and Analysis of the 'Star Wars' Botnet in Twitter , 2017, ASONAM.

[43]  Kok-Leong Ong,et al.  Task assignment in microtask crowdsourcing platforms using learning automata , 2018, Eng. Appl. Artif. Intell..

[44]  Hassan B. Kazemian,et al.  Comparisons of machine learning techniques for detecting malicious webpages , 2015, Expert Syst. Appl..

[45]  Guanhua Yan,et al.  Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks , 2013, Comput. Networks.

[46]  Kim-Kwang Raymond Choo,et al.  Detecting Malicious Social Bots Based on Clickstream Sequences , 2019, IEEE Access.

[47]  David W. McDonald,et al.  Dissecting a Social Botnet: Growth, Content and Influence in Twitter , 2015, CSCW.

[48]  Manju,et al.  Target coverage heuristic based on learning automata in wireless sensor networks , 2018, IET Wirel. Sens. Syst..

[49]  Bin Zhou,et al.  Using Trust Model for Detecting Malicious Activities in Twitter , 2014, SBP.