Detection of Internet Water Army in Social Network

As related works had a few research on Internet Water Army in social network, specifically on the Internet Water Army who trends to lead people's opinions, obscure the real voices and change public opinions in social network. To better understand what difference lie between Internet Water Army and legitimate user, we did some work about behaviour of them from real dataset in Sina microblogging service. We adopted some machine learning algorithms to classify the type of user with collected features through the measurement. At the same time we proposed an influence model and create a new online algorithm with linear complexity to reduce the water army's influence on legitimate users greatly. Index Terms - Internet Water Army, Feature measurement, Machine learning, Influence m odel, MEIWA online algorithm

[1]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, IMC '10.

[2]  Virgílio A. F. Almeida,et al.  Detecting Spammers on Twitter , 2010 .

[3]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[4]  Charu C. Aggarwal,et al.  On Abnormality Detection in Spuriously Populated Data Streams , 2005, SDM.

[5]  Yejin Choi,et al.  Distributional Footprints of Deceptive Product Reviews , 2012, ICWSM.

[6]  C. Barr Taylor,et al.  Evaluation of computerized text analysis in an Internet breast cancer support group , 2005, Comput. Hum. Behav..

[7]  Claire Cardie,et al.  Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.

[8]  Bing Liu,et al.  Opinion spam and analysis , 2008, WSDM '08.

[9]  Gang Wang,et al.  Serf and turf: crowdturfing for fun and profit , 2011, WWW.

[10]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[11]  Guofei Gu,et al.  Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.

[12]  S. Asch Studies of independence and conformity: I. A minority of one against a unanimous majority. , 1956 .

[13]  Walter Willinger,et al.  Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference , 2011, IMC 2011.

[14]  Ee-Peng Lim,et al.  Detecting product review spammers using rating behaviors , 2010, CIKM.

[15]  Srinivasan Venkatesh,et al.  Battling the Internet water army: Detection of hidden paid posters , 2011, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[16]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[17]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.