The transition probability features between user click streams based on the social situation analytics; to detect malicious social bots

Juvva Manjari, Nadella Sunil

Abstract


With the significant increment in the volume, speed, and assortment of client data (e.g., user generated data) in onlinesocial networks, there have been endeavored to structure better approaches for gathering and breaking down such enormous data. For instance, social bots have been utilized to perform mechanized scientific services and give clients improved nature of administration. Notwithstanding, pernicious social bots have additionally been utilized to disperse bogus data (e.g., counterfeit news), and this can bring about true results. In this way, distinguishing and evacuating malevolent social bots in online interpersonal organizations is urgent. The most existing identification techniques for malignant social bots break down the quantitative highlights of their behavior. These highlights are effectively imitated by social bots; accordingly bringing about low precision of the investigation. A tale technique for recognizing malicious social bots, including the two highlights choice dependent on the change likelihood of clickstream successions and semi-directed clustering, is introduced in this paper. This technique not just breaks down progress likelihood of client behavior clickstreams yet in addition considers the time highlight of behavior.


References


F. Morstatter, L. Wu, T. H. Nazer, K. M. Carley, and H. Liu, ``A new approach to bot detection: Striking the balance between precision and recall,'' in Proc. IEEE/ACM Int. Conf. Adv. Social Netw. Anal. Mining, San Francisco, CA, USA, Aug. 2016, pp. 533_540.

C. A. De Lima Salge and N. Berente, ``Is that social bot behaving unethically?''Commun. ACM, vol. 60, no. 9, pp. 29_31, Sep. 2017.

M. Sahlabadi, R. C. Muniyandi, and Z. Shukur, ``Detecting abnormalbehavior in social networkWebsites by using a process mining technique,''J. Comput. Sci., vol. 10, no. 3, pp. 393_402, 2014.

F. Brito, I. Petiz, P. Salvador, A. Nogueira, and E. Rocha, ``Detectingsocial-network bots based on multiscale behavioral analysis,'' in Proc.7th Int. Conf. Emerg. Secur. Inf., Syst. Technol. (SECURWARE), Barcelona,Spain, 2013, pp. 81_85.

T.-K. Huang, M. S. Rahman, H. V. Madhyastha, M. Faloutsos, andB. Ribeiro, ``An analysis of socware cascades in online social networks,''in Proc. 22nd Int. Conf. World Wide Web, Rio de Janeiro, Brazil, 2013,pp. 619_630.

H. Gao et al., ``Spam ain't as diverse as it seems: Throttling OSN spam withtemplates underneath,'' in Proc. 30th ACSAC, New Orleans, LA, USA,2014, pp. 76_85.

E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini, ``The rise ofsocial bots,'' Commun. ACM, vol. 59, no. 7, pp. 96_104, Jul. 2016.

T. Hwang, I. Pearce, and M. Nanis, ``Socialbots: Voices from the fronts,''Interactions, vol. 19, no. 2, pp. 38_45, Mar. 2012.

Y. Zhou et al., ``ProGuard: Detecting malicious accounts in socialnetwork-based online promotions,'' IEEE Access, vol. 5, pp. 1990_1999,2017.

Z. Zhang, C. Li, B. B. Gupta, and D. Niu, ``Ef_cient compressedciphertext length scheme using multi-authority CP-ABE for hierarchicalattributes,'' IEEE Access, vol. 6, pp. 38273_38284, 2018. doi: 10.1109/ACCESS.2018.2854600.

C. Cai, L. Li, and D. Zengi, ``Behavior enhanced deep bot detection insocial media,'' in Proc. IEEE Int. Conf. Intell. Secur. Inform. (ISI), Beijing,China, Jul. 2017, pp. 128_130.

C. K. Chang, ``Situation analytics: A foundation for a new software engineering paradigm,'' Computer, vol. 49, no. 1, pp. 24_33, Jan. 2016.

Z. Zhang, R. Sun, X. Wang, and C. Zhao, ``A situational analytic methodfor user behavior pattern in multimedia social networks,'' IEEE Trans. BigData, to be published.

S. Barbon, Jr., G. F. C. Campos, G. M. Tavares, R. A. Igawa, M. L. Proença,Jr., and R. C. Guido, ``Detection of human, legitimate bot, and maliciousbot in online social networks based on wavelets,'' ACM Trans. Multimedia Comput., Commun., Appl., vol. 14, no. 1s, Feb. 2018, Art. no. 26.

J. Y. Park, N. O'Hare, R. Schifanella, A. Jaimes, and C.-W. Chung,``A large-scale study of user image search behavior on the Web,'' in Proc.33rd Annu. ACM Conf. Hum. Factors Comput. Syst., Seoul, South Korea,2015, pp. 985_994.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.