Zombie Follower Recognition Based on Industrial Chain Feature Analysis

Zombie followers, a type of bot, are longstanding entities in Sina Weibo. Although the features and detection of zombie followers have been extensively studied, zombie followers are continuously increasing in social networks and gradually developing into a large-scale industry. In this study, we analyze the features of eight groups of zombie followers from different companies. The findings indicate that although zombie followers controlled by different companies vary greatly, some industries may be controlled by the same organization. Based on the feature analysis, we use multiple machine learning methods to detect zombie followers, and the results show that zombie follower groups with short registration time are more easily detected. The detection accuracy of zombie followers that have been cultivated for a long duration is low. Moreover, the richer the feature sets, the higher the recall, precision, and F1 of their detection results will be. Under a given rich feature set, the accuracy of the combined-group detection is not as high as that of the single-group detection. The random forest achieves the highest accuracy in both single- and combined-group detections, yielding 99.14% accuracy in the latter case.

[1]  Christos Faloutsos,et al.  Suspicious Behavior Detection: Current Trends and Future Directions , 2016, IEEE Intelligent Systems.

[2]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[3]  Muhammad Abulaish,et al.  Identifying active, reactive, and inactive targets of socialbots in Twitter , 2017, WI.

[4]  Michael S. Bernstein,et al.  Anyone Can Become a Troll: Causes of Trolling Behavior in Online Discussions , 2017, CSCW.

[5]  V. S. Subrahmanian,et al.  Using sentiment to detect bots on Twitter: Are humans more opinionated than bots? , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[6]  Gianluca Stringhini,et al.  Towards Detecting Compromised Accounts on Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[7]  Alexandr Andoni,et al.  Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).

[8]  Jian Cao,et al.  Combating the evasion mechanisms of social bots , 2016, Comput. Secur..

[9]  Stefan Stieglitz,et al.  Do Social Bots (Still) Act Different to Humans? - Comparing Metrics of Social Bots with Those of Humans , 2017, HCI.

[10]  Mihály Héder A black market for upvotes and likes , 2018, ArXiv.

[11]  Jong Kim,et al.  WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream , 2013, IEEE Transactions on Dependable and Secure Computing.

[12]  Emiliano De Cristofaro,et al.  Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots , 2014, Internet Measurement Conference.

[13]  Jure Leskovec,et al.  MIS2: Misinformation and Misbehavior Mining on the Web , 2018, WSDM.

[14]  Dawn Xiaodong Song,et al.  Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.

[15]  Orestis Papakyriakopoulos,et al.  Effects of Social Bots in the Iran-Debate on Twitter , 2018, ArXiv.

[16]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[17]  Yibo Wang,et al.  Discrimination of Zombie Fans on Weibo based on Features Extraction and Business-Driven Analysis , 2015, ICEC '15.

[18]  Eva Zangerle,et al.  "Sorry, I was hacked": a classification of compromised twitter accounts , 2014, SAC.

[19]  Jure Leskovec,et al.  Antisocial Behavior in Online Discussion Communities , 2015, ICWSM.

[20]  Neil Shah,et al.  False Information on Web and Social Media: A Survey , 2018, ArXiv.

[21]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[22]  Yi Zhang,et al.  Discover millions of fake followers in Weibo , 2016, Social Network Analysis and Mining.

[23]  Guofei Gu,et al.  Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.

[24]  V. S. Subrahmanian,et al.  An Army of Me: Sockpuppets in Online Discussion Communities , 2017, WWW.

[25]  D. Paulhus,et al.  Trolls just want to have fun , 2014 .

[26]  Emiliano De Cristofaro,et al.  Measuring, Characterizing, and Detecting Facebook Like Farms , 2017, ACM Trans. Priv. Secur..

[27]  Johan A. K. Suykens,et al.  Least Squares Support Vector Machine Classifiers , 1999, Neural Processing Letters.

[28]  Aishik Chakraborty,et al.  Detection of Sockpuppets in Social Media , 2017, CSCW Companion.

[29]  Wookey Lee,et al.  Find spammers by using graph structure , 2017, 2017 IEEE International Conference on Big Data and Smart Computing (BigComp).

[30]  Jianjun Yu,et al.  Automatic Fake Followers Detection in Chinese Micro-blogging System , 2014, PAKDD.

[31]  Maghsood Abbaspour,et al.  An empirical study of the effect of profile and behavioral characteristics on the infiltration rate of socialbots , 2017, 2017 Iranian Conference on Electrical Engineering (ICEE).

[32]  Huakang Li,et al.  基于行为特征分析的微博恶意用户识别 (Microblogging Malicious User Identification Based on Behavior Characteristic Analysis) , 2018, 计算机科学.

[33]  Christos Faloutsos,et al.  Detecting suspicious following behavior in multimillion-node social networks , 2014, WWW.

[34]  Xin Wang,et al.  Deep Learning-Based Malicious Account Detection in the Momo Social Network , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).

[35]  Hua Shen,et al.  Detecting Spammers on Twitter Based on Content and Social Interaction , 2015, 2015 International Conference on Network and Information Systems for Computers.

[36]  Huan Liu,et al.  Online Social Spammer Detection , 2014, AAAI.