Detecting Social Rots by Jointly Modeling Deep Behavior and Content Information

被引:40
作者
Cai, Chiyu [1 ,2 ]
Li, Linjing [1 ]
Zeng, Daniel [1 ,3 ]
机构
[1] Chinese Acad Sci, Inst Automat, State Key Lab Management & Control Complex Syst, Beijing 100190, Peoples R China
[2] Univ Chinese Acad Sci, Sch Comp & Control Engn, Beijing, Peoples R China
[3] Univ Arizona, Dept Management Informat Syst, Tucson, AZ 85721 USA
来源
CIKM'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT | 2017年
基金
中国国家自然科学基金;
关键词
bot detection; deep learning; behavior factors; temporal content;
D O I
10.1145/3132847.3133050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bots are regarded as the most common kind of malwares in the era of Web 2.0. In recent years, Internet has been populated by hundreds of millions of bots, especially on social media. Thus, the demand on effective and efficient bot detection algorithms is more urgent than ever. Existing works have partly satisfied this requirement by way of laborious feature engineering. In this paper, we propose a deep bot detection model aiming to learn an effective representation of social user and then detect social bots by jointly modeling social behavior and content information. The proposed model learns the representation of social behavior by encoding both endogenous and exogenous factors which affect user behavior. As to the representation of content, we regard the user content as temporal text data instead of just plain text as be treated in other existing works to extract semantic information and latent temporal patterns. To the best of our knowledge, this is the first trial that applies deep learning in modeling social users and accomplishing social bot detection. Experiments on real world dataset collected from Twitter demonstrate the effectiveness of the proposed model.
引用
收藏
页码:1995 / 1998
页数:4
相关论文
共 15 条
[1]  
[Anonymous], 2011, ICWSM
[2]  
[Anonymous], 2012, COMPUTER ENCE
[3]   Design and analysis of a social botnet [J].
Boshmaf, Yazan ;
Muslukhov, Ildar ;
Beznosov, Konstantin ;
Ripeanu, Matei .
COMPUTER NETWORKS, 2013, 57 (02) :556-578
[4]  
Cao Q, 2012, 9 USENIX S NETW SYST, P197
[5]  
Chu Z, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P21
[6]   RSC: Mining and Modeling Temporal Activity in Social Media [J].
Costa, Alceu Ferraz ;
Yamaguchi, Yuto ;
Machado Traina, Agma Juci ;
Traina, Caetano, Jr. ;
Faloutsos, Christos .
KDD'15: PROCEEDINGS OF THE 21ST ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2015, :269-278
[7]  
Dickerson JP, 2014, 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), P620, DOI 10.1109/ASONAM.2014.6921650
[8]  
Ferrara E., 2014, ARXIV PREPRINT ARXIV
[9]   Stweeler: A Framework for Twitter Bot Analysis [J].
Gilani, Zafar ;
Wang, Liang ;
Crowcroft, Jon ;
Almeida, Mario ;
Farahbakhsh, Reza .
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, :37-38
[10]   BotCatch: leveraging signature and behavior for bot detection [J].
Ji, Yuede ;
Li, Qiang ;
He, Yukun ;
Guo, Dong .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) :952-969