skip to main content
10.1145/3411495.3421363acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

On the Detection of Disinformation Campaign Activity with Network Analysis

Published:09 November 2020Publication History

ABSTRACT

seek to influence and polarize political topics through massive coordinated efforts. In the process, these efforts leave behind artifacts, which researchers have leveraged to analyze the tactics employed by disinformation campaigns after they are taken down. Coordination network analysis has proven helpful for learning about how disinformation campaigns operate; however, the usefulness of these forensic tools as a detection mechanism is still an open question. In this paper, we explore the use of coordination network analysis to generate features for distinguishing the activity of a disinformation campaign from legitimate Twitter activity. Doing so would provide more evidence to human analysts as they consider takedowns. We create a time series of daily coordination networks for both Twitter disinformation campaigns and legitimate Twitter communities, and train a binary classifier based on statistical features extracted from these networks. Our results show that the classifier can predict future coordinated activity of known disinformation campaigns with high accuracy (F1 =0.98). On the more challenging task of out-of-distribution activity classification, the performance drops yet is still promising (F1= 0.71), mainly due to an increase in the false positive rate. By doing this analysis, we show that while coordination patterns could be useful for providing evidence of disinformation activity, further investigation is needed to improve upon this method before deployment at scale.

References

  1. Meysam Alizadeh, Jacob N Shapiro, Cody Buntain, and Joshua A Tucker. 2020. Content-based features predict social media influence operations. Science Advances, Vol. 6, 30 (2020), eabb5824.Google ScholarGoogle Scholar
  2. Ahmer Arif, Leo Graiden Stewart, and Kate Starbird. 2018. Acting the part: Examining information operations within# BlackLivesMatter discourse. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 1--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alexandre Bovet and Hernán A Makse. 2019. Influence of fake news in Twitter during the 2016 US presidential election. Nature communications, Vol. 10, 1 (2019), 1--14.Google ScholarGoogle Scholar
  4. Leo Breiman. 2001. Random forests. Machine learning, Vol. 45, 1 (2001), 5--32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 477--488.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Stefano Cresci. 2020. A Decade of Social Bot Detection. arXiv preprint arXiv:2007.03604 (2020).Google ScholarGoogle Scholar
  7. Juan EcheverrïŁ! a, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, and Shi Zhou. 2018. Lobo: Evaluation of generalization deficiencies in twitter bot classifiers. In Proceedings of the 34th Annual Computer Security Applications Conference. 137--146.Google ScholarGoogle Scholar
  8. Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2015. Towards detecting compromised accounts on social networks. IEEE Transactions on Dependable and Secure Computing, Vol. 14, 4 (2015), 447--460.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Robert Gorwa, Reuben Binns, and Christian Katzenbach. 2020. Algorithmic content moderation: Technical and political challenges in the automation of platform governance. Big Data & Society, Vol. 7, 1 (2020), 2053951719897945.Google ScholarGoogle ScholarCross RefCross Ref
  10. Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, and Jonathan Mayer. 2020. Supporting Early and Scalable Discovery of Disinformation Websites. arXiv preprint arXiv:2003.07684 (2020).Google ScholarGoogle Scholar
  11. Franziska B Keller, David Schoch, Sebastian Stier, and JungHwan Yang. 2017. How to manipulate social media: Analyzing political astroturfing using ground truth data from South Korea. In Eleventh International AAAI Conference on Web and Social Media.Google ScholarGoogle ScholarCross RefCross Ref
  12. Franziska B Keller, David Schoch, Sebastian Stier, and JungHwan Yang. 2020. Political Astroturfing on Twitter: How to coordinate a disinformation Campaign. Political Communication, Vol. 37, 2 (2020), 256--280.Google ScholarGoogle ScholarCross RefCross Ref
  13. Scott M Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Advances in Neural Information Processing Systems 30, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 4765--4774. http://papers.nips.cc/paper/7062-a-unified-approach-to-interpreting-model-predictions.pdfGoogle ScholarGoogle Scholar
  14. Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research, Vol. 9, Nov (2008), 2579--2605.Google ScholarGoogle Scholar
  15. Giovanni Da San Martino, Stefano Cresci, Alberto Barron-Cedeno, Seunghak Yu, Roberto Di Pietro, and Preslav Nakov. 2020. A Survey on Computational Propaganda Detection. arXiv preprint arXiv:2007.08024 (2020).Google ScholarGoogle Scholar
  16. Michele Mazza, Stefano Cresci, Marco Avvenuti, Walter Quattrociocchi, and Maurizio Tesconi. 2019. Rtbust: Exploiting temporal patterns for botnet detection on twitter. In Proceedings of the 10th ACM Conference on Web Science. 183--192.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Diogo Pacheco, Pik-Mai Hui, Christopher Torres-Lugo, Bao Tran Truong, Alessandro Flammini, and Filippo Menczer. 2020. Uncovering Coordinated Networks on Social Media. arXiv preprint arXiv:2001.05658(2020).Google ScholarGoogle Scholar
  18. Alexa Pavliuc. 2020. Watch Six Decade-long Disinformation Operations Unfold in Six Minutes. https://medium.com/swlh/watch-six-decade-long-disinformation-operations-unfold-in-six-minutes-5f69a7e75fb3Google ScholarGoogle Scholar
  19. Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Édouard Duchesnay. 2011. Scikit-Learn: Machine Learning in Python. Journal of Machine Learning Research (2011).Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Goncc alves, Snehal Patil, Alessandro Flammini, and Filippo Menczer. 2011b. Truthy: mapping the spread of astroturf in microblog streams. In Proceedings of the 20th international conference companion on World wide web. 249--252.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jacob Ratkiewicz, Michael D Conover, Mark Meiss, Bruno Goncc alves, Alessandro Flammini, and Filippo Menczer Menczer. 2011a. Detecting and tracking political abuse in social media. In Fifth international AAAI conference on weblogs and social media.Google ScholarGoogle Scholar
  22. Adrian Rauchfleisch and Jonas Kaiser. 2020. The False Positive Problem of Automatic Bot Detection in Social Science Research. Berkman Klein Center Research Publication 2020-3 (2020).Google ScholarGoogle Scholar
  23. Robin Sommer and Vern Paxson. 2010. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. In 2010 IEEE Symposium on Security and Privacy. IEEE, 305--316.Google ScholarGoogle Scholar
  24. Kate Starbird, Ahmer Arif, and Tom Wilson. 2019. Disinformation as Collaborative Work: Surfacing the Participatory Nature of Strategic Information Operations. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Leo G Stewart, Ahmer Arif, and Kate Starbird. 2018. Examining trolls and polarization with a retweet network.Google ScholarGoogle Scholar
  26. Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2015. EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. In 24th USENIX Security Symposium (USENIX Security 15). 563--578.Google ScholarGoogle Scholar
  27. Michael E Tipping and Christopher M Bishop. 1999. Probabilistic principal component analysis. Journal of the Royal Statistical Society: Series B (Statistical Methodology), Vol. 61, 3 (1999), 611--622.Google ScholarGoogle ScholarCross RefCross Ref
  28. Twitter. 2020. Election Integrity Hub. https://transparency.twitter.com/en/information-operations.htmlGoogle ScholarGoogle Scholar
  29. Onur Varol, Clayton A Davis, Filippo Menczer, and Alessandro Flammini. 2018. Feature engineering for social bot detection. Feature Engineering for Machine Learning and Data Analytics, 311--334.Google ScholarGoogle Scholar
  30. Onur Varol, Emilio Ferrara, Clayton A Davis, Filippo Menczer, and Alessandro Flammini. 2017. Online human-bot interactions: Detection, estimation, and characterization. In International AAAI Conference on Web and Social Media.Google ScholarGoogle Scholar
  31. Binghui Wang, Jinyuan Jia, and Neil Zhenqiang Gong. 2019. Graph-based security and privacy analytics via collective classification with joint weight learning and propagation. Network and Distributed Systems Security (NDSS) Symposium (2019).Google ScholarGoogle ScholarCross RefCross Ref
  32. Tom Wilson and Kate Starbird. 2020. Cross-platform disinformation campaigns: lessons learned and next steps. Harvard Kennedy School Misinformation Review, Vol. 1, 1 (2020).Google ScholarGoogle Scholar
  33. Kai-Cheng Yang, Onur Varol, Pik-Mai Hui, and Filippo Menczer. 2019. Scalable and generalizable social bot detection through data selection. arXiv preprint arXiv:1911.09179 (2019).Google ScholarGoogle Scholar
  34. Xinxin Yang, Bo-Chiuan Chen, Mrinmoy Maity, and Emilio Ferrara. 2016. Social politics: Agenda setting and political communication on social media. In International Conference on Social Informatics. Springer, 330--344.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, and Jeremy Blackburn. 2020. Characterizing the Use of Images by State-Sponsored Troll Accounts on Twitter. The International AAAI Conference on Web and Social Media (2020).Google ScholarGoogle Scholar
  36. Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Nicolas Kourtelris, Ilias Leontiadis, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2017. The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources. In Proceedings of the 2017 Internet Measurement Conference. 405--417.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2019. Who Let The Trolls Out?: Towards Understanding State-Sponsored Trolls. In Proceedings of the 10th ACM Conference on Web Science. ACM, 353--362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, and Keith Ross. 2019. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. Network and Distributed Systems Security (NDSS) Symposium (2019).Google ScholarGoogle Scholar

Index Terms

  1. On the Detection of Disinformation Campaign Activity with Network Analysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCSW'20: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop
        November 2020
        176 pages
        ISBN:9781450380843
        DOI:10.1145/3411495

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 November 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate37of108submissions,34%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader