Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection

The arm race between spambots and spambot-detectors is made of several cycles (or generations): a new wave of spambots is created (and new spam is spread), new spambot filters are derived and old spambots mutate (or evolve) to new species. Recently, with the diffusion of the adversarial learning approach, a new practice is emerging: to manipulate on purpose target samples in order to make stronger detection models. Here, we manipulate generations of Twitter social bots, to obtain - and study - their possible future evolutions, with the aim of eventually deriving more effective detection techniques. In detail, we propose and experiment with a novel genetic algorithm for the synthesis of online accounts. The algorithm allows to create synthetic evolved versions of current state-of-the-art social bots. Results demonstrate that synthetic bots really escape current detection techniques. However, they give all the needed elements to improve such techniques, making possible a proactive approach for the design of social bot detection systems.

[1]  Lucas Chi Kwong Hui,et al.  Color Set Size Problem with Application to String Matching , 1992, CPM.

[2]  Martin Wattenberg,et al.  Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms , 1995, NIPS.

[3]  Melanie Mitchell,et al.  An introduction to genetic algorithms , 1996 .

[4]  Dan Gusfield,et al.  Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .

[5]  Zbigniew Michalewicz,et al.  Evolutionary algorithms , 1997, Emerging Evolutionary Algorithms for Antennas and Wireless Communications.

[6]  Julie Mitchell Introduction to Melanie Klein , 1998 .

[7]  Trevor Hastie,et al.  The Elements of Statistical Learning , 2001 .

[8]  Thomas Jansen,et al.  On the analysis of the (1+1) evolutionary algorithm , 2002, Theor. Comput. Sci..

[9]  Eric R. Ziegel,et al.  The Elements of Statistical Learning , 2003, Technometrics.

[10]  R. Fua,et al.  The analysis of the (100)surface of GaAs for NEA photocathode with XPS , 2004, IVESC 2004. The 5th International Vacuum Electron Sources Conference Proceedings (IEEE Cat. No.04EX839).

[11]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[12]  Enno Ohlebusch,et al.  Linear Time Algorithms for Generalizations of the Longest Common Substring Problem , 2011, Algorithmica.

[13]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[14]  Rossano Schifanella,et al.  People Are Strange When You're a Stranger: Impact and Influence of Bots on Social Networks , 2012, ICWSM.

[15]  Marcel Salathé,et al.  The dynamics of health behavior sentiments on a large online social network , 2012, EPJ Data Science.

[16]  Aoying Zhou,et al.  Social media data analysis for revealing collective behaviors , 2012, KDD.

[17]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2013, IEEE Trans. Inf. Forensics Secur..

[18]  Muhammad Abulaish,et al.  A generic statistical approach for spam detection in Online Social Networks , 2013, Comput. Commun..

[19]  GLAD: group anomaly detection in social media analysis , 2014, KDD.

[20]  Wei Hu,et al.  Twitter spammer detection using data stream clustering , 2014, Inf. Sci..

[21]  Yun Fu,et al.  Prediction of Human Activity by Discovering Temporal Sequence Patterns , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[23]  J. Mervis Social Science. An Internet research project draws conservative ire. , 2014, Science.

[24]  Krishna P. Gummadi,et al.  Strength in Numbers: Robust Tamper Detection in Crowd Computations , 2015, COSN.

[25]  Christos Faloutsos,et al.  ND-Sync: Detecting Synchronized Fraud Activities , 2015, PAKDD.

[26]  Fangzhao Wu,et al.  Social Spammer and Spam Message Co-Detection in Microblogging with Social Context Regularization , 2015, CIKM.

[27]  Pinar Senkul,et al.  Random walk based context-aware activity recommendation for location based social networks , 2015, 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[28]  Reza Zafarani,et al.  10 Bits of Surprise: Detecting Malicious Users with Minimum Information , 2015, CIKM.

[29]  Roberto Di Pietro,et al.  Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..

[30]  Thanh Tran,et al.  Uncovering Fake Likers in Online Social Networks , 2016, CIKM.

[31]  Hossein Hamooni,et al.  DeBot: Twitter Bot Detection via Warped Correlation , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).

[32]  Roberto Di Pietro,et al.  DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection , 2016, IEEE Intell. Syst..

[33]  Nicholas Diakopoulos,et al.  News Bots , 2016 .

[34]  Filippo Menczer,et al.  The rise of social bots , 2014, Commun. ACM.

[35]  Tobias Höllerer,et al.  Botivist: Calling Volunteers to Action using Online Bots , 2015, CSCW.

[36]  Vincent Larivière,et al.  Tweets as impact indicators: Examining the implications of automated “bot” accounts on Twitter , 2014, J. Assoc. Inf. Sci. Technol..

[37]  Florian Schmidt,et al.  The Devil's Triangle: Ethical Considerations on Developing Bot Detection Methods , 2016, AAAI Spring Symposia.

[38]  Sue Moon,et al.  Interval Signature: Persistence and Distinctiveness of Inter-event Time Distributions in Online Human Behavior , 2017, WWW.

[39]  Christos Faloutsos,et al.  HoloScope: Topology-and-Spike Aware Fraud Detection , 2017, CIKM.

[40]  Jure Leskovec,et al.  Antisocial Behavior on the Web: Characterization and Detection , 2017, WWW.

[41]  Maurizio Tesconi,et al.  Hybrid Crowdsensing: A Novel Paradigm to Combine the Strengths of Opportunistic and Participatory Crowdsensing , 2017, WWW.

[42]  Liang Tong,et al.  Hardening Classifiers against Evasion: the Good, the Bad, and the Ugly , 2017 .

[43]  Filippo Menczer,et al.  Online Human-Bot Interactions: Detection, Estimation, and Characterization , 2017, ICWSM.

[44]  Jun Li,et al.  Spectrum-based Deep Neural Networks for Fraud Detection , 2017, CIKM.

[45]  Nicholas Berente,et al.  Is that social bot behaving unethically? , 2017, CACM.

[46]  Binghui Wang,et al.  GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs , 2017, 2017 IEEE International Conference on Data Mining (ICDM).

[47]  Piotr Sapiezynski,et al.  Evidence of complex contagion of information in social media: An experiment using Twitter bots , 2017, PloS one.

[48]  Daniel Dajun Zeng,et al.  Detecting Social Bots by Jointly Modeling Deep Behavior and Content Information , 2017, CIKM.

[49]  Roberto Di Pietro,et al.  The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race , 2017, WWW.

[50]  Roberto Di Pietro,et al.  Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours , 2017, 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[51]  Samy Bengio,et al.  Adversarial Machine Learning at Scale , 2016, ICLR.

[52]  Gregory Maus,et al.  A Typology of Socialbots (Abbrev.) , 2017, WebSci.

[53]  L. Stewart,et al.  Examining Trolls and Polarization with a Retweet Network , 2018 .

[54]  Fabrizio Lillo,et al.  $FAKE: Evidence of Spam and Bot Activity in Stock Microblogs on Twitter , 2018, ICWSM.

[55]  Ponnurangam Kumaraguru,et al.  Worth its Weight in Likes: Towards Detecting Fake Likes on Instagram , 2018, WebSci.

[56]  Angelo Spognardi,et al.  From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots , 2018, WWW.

[57]  Roberto Di Pietro,et al.  Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling , 2017, IEEE Transactions on Dependable and Secure Computing.

[58]  Angelo Spognardi,et al.  On the capability of evolved spambots to evade detection via genetic engineering , 2019, Online Soc. Networks Media.

[59]  Liang Tong,et al.  Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features , 2017, USENIX Security Symposium.

[60]  Filippo Menczer,et al.  Arming the public with AI to counter social bots , 2019, ArXiv.