Retweeting Activity on Twitter: Signs of Deception

Given the re-broadcasts (i.e. retweets) of posts in Twitter, how can we spot fake from genuine user reactions? What will be the tell-tale sign — the connectivity of retweeters, their relative timing, or something else? High retweet activity indicates influential users, and can be monetized. Hence, there are strong incentives for fraudulent users to artificially boost their retweets’ volume. Here, we explore the identification of fraudulent and genuine retweet threads. Our main contributions are: (a) the discovery of patterns that fraudulent activity seems to follow (the “triangles ” and “homogeneity ” patterns, the formation of micro-clusters in appropriate feature spaces); and (b) “RTGen ”, a realistic generator that mimics the behaviors of both honest and fraudulent users. We present experiments on a dataset of more than 6 million retweets crawled from Twitter.

[1]  Bernard Derrida,et al.  Statistical properties of randomly broken objects and of multivalley structures in disordered systems , 1987 .

[2]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[3]  Christos Faloutsos,et al.  Netprobe: a fast and scalable system for fraud detection in online auction networks , 2007, WWW '07.

[4]  B. Bollobás The evolution of random graphs , 1984 .

[5]  Christos Faloutsos,et al.  Kronecker Graphs: An Approach to Modeling Networks , 2008, J. Mach. Learn. Res..

[6]  Guofei Gu,et al.  Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.

[7]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[8]  Kristina Lerman,et al.  Entropy-based Classification of 'Retweeting' Activity on Twitter , 2011, ArXiv.

[9]  Christos Faloutsos,et al.  Inferring Strange Behavior from Connectivity Pattern in Social Networks , 2014, PAKDD.

[10]  Sandeep Sripada,et al.  Modeling and Analysis of Real World Networks using Kronecker Graphs , 2010 .

[11]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.

[12]  Sushil Jajodia,et al.  Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.

[13]  Venkatesan Guruswami,et al.  CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.

[14]  Yong Yu,et al.  Detecting Marionette Microblog Users for Improved Information Credibility , 2013, Journal of Computer Science and Technology.

[15]  A. Faisal,et al.  Scaling-Laws of Human Broadcast Communication Enable Distinction between Human, Corporate and Robot Twitter Users , 2013, PloS one.

[16]  Po-Ching Lin,et al.  A study of effective features for detecting long-surviving Twitter spam accounts , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[17]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[18]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[19]  Christos Faloutsos,et al.  MalSpot: Multi2 Malicious Network Behavior Patterns Analysis , 2014, PAKDD.

[20]  Manfred Schroeder,et al.  Fractals, Chaos, Power Laws: Minutes From an Infinite Paradise , 1992 .