Exploring the construction and infiltration strategies of social bots in sina microblog

被引:16
作者
Wang, Wenxian [1 ,2 ]
Chen, Xingshu [1 ,2 ]
Jiang, Shuyu [1 ]
Wang, Haizhou [1 ,2 ]
Yin, Mingyong [2 ,3 ]
Wang, Peiming [2 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu, Peoples R China
[2] Sichuan Univ, Cybersecur Res Inst, Chengdu, Peoples R China
[3] Sichuan Univ, Coll Comp Sci, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
TWITTER;
D O I
10.1038/s41598-020-76814-8
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Nowadays, millions of people use Online Social Networks (OSNs) like Twitter, Facebook and Sina Microblog, to express opinions on current events. The widespread use of these OSNs has also led to the emergence of social bots. What is more, the existence of social bots is so powerful that some of them can turn into influential users. In this paper, we studied the automated construction technology and infiltration strategies of social bots in Sina Microblog, aiming at building friendly and influential social bots to resist malicious interpretations. Firstly, we studied the critical technology of Sina Microblog data collection, which indicates that the defense mechanism of that is vulnerable. Then, we constructed 96 social bots in Sina Microblog and researched the influence of different infiltration strategies, like different attribute settings and various types of interactions. Finally, our social bots gained 5546 followers in the 42-day infiltration period with a 100% survival rate. The results show that the infiltration strategies we proposed are effective and can help social bots escape detection of Sina Microblog defense mechanism as well. The study in this paper sounds an alarm for Sina Microblog defense mechanism and provides a valuable reference for social bots detection.
引用
收藏
页数:19
相关论文
共 59 条
[1]  
Abd El Hafeez T, P INT C ART INT COMP, V1153, P247
[2]  
[Anonymous], 2014, THESIS
[3]  
[Anonymous], 2019, SINA MICROBLOG RUMOR
[4]  
Balzarotti D., 2009, Proc 18th Int Conf on World Wide Web, P551, DOI DOI 10.1145/1526709.1526784
[5]  
Bessi A., 2016, Em: First Monday, V21, P7, DOI [10.5210/fm.v21i11.7090, DOI 10.5210/FM.V21I11.7090]
[6]  
Bo W, 2016, THESIS
[7]   Chinese computational propaganda: automation, algorithms and the manipulation of information about Chinese politics on Twitter and Weibo [J].
Bolsover, Gillian ;
Howard, Philip .
INFORMATION COMMUNICATION & SOCIETY, 2019, 22 (14) :2063-2080
[8]  
Boshmaf Y, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P93
[9]   Design and analysis of a social botnet [J].
Boshmaf, Yazan ;
Muslukhov, Ildar ;
Beznosov, Konstantin ;
Ripeanu, Matei .
COMPUTER NETWORKS, 2013, 57 (02) :556-578
[10]  
Bradshaw Samantha, 2017, TROOPS TROLLS TROUBL