skip to main content
review-article
Free Access

A decade of social bot detection

Published:23 September 2020Publication History
Skip Abstract Section

Abstract

Bots increasingly tamper with political elections and economic discussions. Tracing trends in detection strategies and key suggestions on how to win the fight.

References

  1. Assenmacher, D., Clever, L., Frischlich, L., Quandt, T., Trautmann, H. and Grimme, C. Demystifying Social Bots: On the Intelligence of Automated Social Media Actors. Social Media + Society. SAGE, 2020.Google ScholarGoogle Scholar
  2. Chavoshi, N., Hamooni, H., and Mueen, A. DeBot: Twitter bot detection via warped correlation. In The 16th International Conference on Data Mining (2016). IEEE, 817--822.Google ScholarGoogle ScholarCross RefCross Ref
  3. Chu, Z., Gianvecchio, S., Wang, H., and Jajodia, S. Detecting automation of Twitter accounts: Are you a human, bot, or cyborg? IEEE Trans, Dependable and Secure Computing 9, 6 (2012), 811--824.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., and Tesconi, M. Fame for sale: Efficient detection of fake Twitter followers. Decision Support Systems 80 (2015), 56--71.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., and Tesconi, M. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. In Proceedings of the 26th Intern. World Wide Web Conf. Companion (2017). IW3C2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., and Tesconi, M. Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE Transactions on Dependable and Secure Computing 15, 4 (2017), 561--576.Google ScholarGoogle Scholar
  7. Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., and Tesconi, M. Emergent properties, models, and laws of behavioral similarities within groups of Twitter users. Computer Communications 150 (2020), 47--61.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cresci, S., Lillo, F., Regoli, D., Tardelli, S., and Tesconi, M. Cashtag piggybacking: Uncovering spam and bot activity in stock microblogs on Twitter. ACM Trans. the Web 13, 2 (2019), 11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Cresci, S., Petrocchi, M., Spognardi, A., and Tognazzi, S. Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection. In Proceedings of the 11th Intern. Conf. Web Science (2019). ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Da San Martino, G., Cresci, S., Barrón-Cedeño, A., Yu, S., Di Pietro, R., and Nakov, P. 2020. A survey on computational propaganda detection. In Proceedings of the 29th Intern. Joint Conf. Artificial Intelligence (2020).Google ScholarGoogle Scholar
  11. Echeverrìa, J., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Stringhini, G., and Zhou, S. LOBO: Evaluation of generalization deficiencies in Twitter bot classifiers. In Proceedings of the 34th Annual Computer Security Applications Conf. ACM, 137--146.Google ScholarGoogle Scholar
  12. Fazil, M. and Abulaish, M. A socialbots analysis-driven graph-based approach for identifying coordinated campaigns in Twitter. J. Intelligent & Fuzzy Systems 38 (2020), 2961--2977.Google ScholarGoogle ScholarCross RefCross Ref
  13. Ferrara, E., Varol, O., Davis, C., Menczer, F., and Flammini, A. The rise of social bots. Commun, ACM 59, 7 (July 2016), 96--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Gallotti, R., Valle, F., Castaldo, N., Sacco, P., and De Domenico, M. Assessing the risks of "infodemics" in response to COVID-19 epidemics, 2020; arXiv:2004.03997 (2020).Google ScholarGoogle ScholarCross RefCross Ref
  15. Goodfellow, I., McDaniel, P., and Papernot, N. Making machine learning robust against adversarial inputs. Commun, ACM 61, 7 (July 2018).Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Gorodnichenko, Y., Pham, T., and Talavera, O. 2018. Social Media, Sentiment and Public Opinions: Evidence from #Brexit and #USElection. Working Paper 24631. National Bureau of Economic Research, 2018.Google ScholarGoogle Scholar
  17. Grimme, C., Assenmacher, D., and Adam, L. Changing perspectives: Is it sufficient to detect social bots? In Proceedings of the 10th Intern. Conf. Social Computing and Social Media (2018).Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Grimme, C., Preuss, M., Adam, L., and Trautmann, H. Social bots: Human-like by means of human control? Big Data 5, 4 (2017).Google ScholarGoogle ScholarCross RefCross Ref
  19. Grinberg, N., Joseph, K., Friedland, L., Swire-Thompson, B., and Lazer, D. Fake news on Twitter during the 2016 US presidential election. Science 363, 6425 (2019), 374--378.Google ScholarGoogle ScholarCross RefCross Ref
  20. Jiang, M., Cui, P., Beutel, A., Faloutsos, C., and Yang, S. Catching synchronized behaviors in large networks: A graph mining approach. ACM Trans. Knowledge Discovery from Data 10, 4 (2016).Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jiang, M., Cui, P., Beutel, A., Faloutsos, C., and Yang, S. Inferring lockstep behavior from connectivity pattern in large graphs. Knowledge and Information Systems 48, 2 (2016), 399--428.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kollanyi, B. Where do bots come from? An analysis of bot codes shared on GitHub. Intern. J. Communication 10 (2016), 20.Google ScholarGoogle Scholar
  23. Mazza, M., Cresci, S., Avvenuti, M., Quattrociocchi, W., and Tesconi, M. RTbust: Exploiting temporal patterns for botnet detection on Twitter. In Proceedings of the 11th Intern. Conf. Web Science (2019). ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., Tesconi, M., and Ferrara, E. Charting the landscape of online cryptocurrency manipulation. IEEE Access 8 (2020), 113230--113245.Google ScholarGoogle ScholarCross RefCross Ref
  25. Pacheco, D., Hui, P., Torres-Lugo, C., Tran Truong, B., Flammini, A., and Menczer, F. 2020. Uncovering coordinated networks on social media, 2020; arXiv:2001.05658.Google ScholarGoogle Scholar
  26. Ruan, X., Wu, Z., Wang, H., and Jajodia, S. Profiling online social behaviors for compromised account detection. IEEE Trans. Information Forensics and Security 11, 1 (2015), 176--187.Google ScholarGoogle Scholar
  27. Shao, C., Luca Ciampaglia, G., Varol, O., Yang, K., Flammini, A., and Menczer, F. The spread of low-credibility content by social bots. Nature commun. 9, 1 (2018), 4787.Google ScholarGoogle Scholar
  28. Starbird, K. Disinformation's spread: Bots, trolls and all of us. Nature 571, 7766 (2019), 449--449.Google ScholarGoogle ScholarCross RefCross Ref
  29. Stella, M., Ferrara, E., and De Domenico, M. Bots increase exposure to negative and inflammatory content in online social systems. In Proceedings of the National Academy of Sciences 115, 49 (2018), 12435--12440.Google ScholarGoogle ScholarCross RefCross Ref
  30. Stieglitz, S., Brachten, F., Ross, B., and Jung, A. Do social bots dream of electric sheep? A categorization of social media bot accounts. In Proceedings of the 17th Australasian Conf. Information Systems (2017).Google ScholarGoogle Scholar
  31. Varol, O., Ferrara, E., Davis, C., Menczer, F., and Flammini, A. Online human-bot interactions: Detection, estimation, and characterization. In Proceedings of the 11th Intern. Conf. Web and Social Media. AAAI, 2017.Google ScholarGoogle Scholar
  32. Vosoughi, S., Roy, D., and Aral, S. The spread of true and false news online. Science 359, 6380 (2018), 1146--1151.Google ScholarGoogle ScholarCross RefCross Ref
  33. Wu, B., Liu, L., Yang, Y., Zheng, K., and Wang, X. Using improved conditional generative adversarial networks to detect social bots on Twitter. IEEE Access 8 (2020), 36664--36680.Google ScholarGoogle ScholarCross RefCross Ref
  34. Yang, C., Harkreader, R., and Gu, G. Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Information Forensics and Security 8, 8 (2013), 1280--1293.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Yang, K., Varol, O., Davis, C., Ferrara, E., Flammini, A., and Menczer, F. Arming the public with artificial intelligence to counter social bots. Human Behavior and Emerging Technologies 1, 1 (2019), 48--61.Google ScholarGoogle ScholarCross RefCross Ref
  36. Yang, K., Varol, O., Hui, P., and Menczer, F. Scalable and generalizable social bot detection through data selection. In Proceedings of the 34th AAAI Conf. Artificial Intelligence (2020).Google ScholarGoogle ScholarCross RefCross Ref
  37. Yardi, S. Detecting spam in a Twitter network. First Monday 15, 1 (2010).Google ScholarGoogle Scholar
  38. Zago, M., Nespoli, P., Papamartzivanos, D., Gil Perez, M., Gomez Marmol, F., Kambourakis, G., and Martinez Perez, G. Screening out social bots interference: Are there any silver bullets? IEEE Communications Mag. 57, 8 (2019), 98--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Zellers, R., Holtzman, A., Rashkin, H., Bisk, Y., Farhadi, A., Roesner, F., and Choi, Y. Defending against neural fake news. In Proceedings of the 33rd Conf. Neural Information Processing Systems (2019). 9051--9062.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Zhang, J., Zhang, R., Zhang, Y., and Yan, G. The rise of social botnets: Attacks and countermeasures. IEEE Trans. Dependable and Secure Computing 15, 6 (2016), 1068--1082.Google ScholarGoogle Scholar

Index Terms

  1. A decade of social bot detection

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 63, Issue 10
          October 2020
          97 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/3426225
          Issue’s Table of Contents

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 September 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • review-article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format