Affiliation:
1. Department of Computer Science, University of Pretoria , Pretoria 0002, South Africa
Abstract
Abstract
Users of online social network (OSN) platforms, e.g. Twitter, are not always humans, and social bots (referred to as bots) are highly prevalent. State-of-the-art research demonstrates that bots can be broadly categorized as either malicious or benign. From a cybersecurity perspective, the behaviors of malicious and benign bots differ. Malicious bots are often controlled by a botmaster who monitors their activities and can perform social engineering and web scraping attacks to collect user information. Consequently, it is imperative to classify bots as either malicious or benign on the basis of features found on OSNs. Most scholars have focused on identifying features that assist in distinguishing between humans and malicious bots; the research on differentiating malicious and benign bots is inadequate. In this study, we focus on identifying meaningful features indicative of anomalous behavior between benign and malicious bots. The effectiveness of our approach is demonstrated by evaluating various semi-supervised machine learning models on Twitter datasets. Among them, a semi-supervised support vector machine achieved the best results in classifying malicious and benign bots.
Publisher
Oxford University Press (OUP)
Subject
Law,Computer Networks and Communications,Political Science and International Relations,Safety, Risk, Reliability and Quality,Social Psychology,Computer Science (miscellaneous)
Reference60 articles.
1. The future of social media in marketing;Appel;J Acad Mark Sci,2020
2. Detecting clusters of fake accounts in online social networks categories and subject descriptors;Freeman;Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, AIsec 15,2015
3. A survey of CAPTCHA technologies to distinguish between human and computer;Xu;Neurocomputing,2020
4. The paradigm-shift of social spambots: evidence, theories, and tools for the arms race;Cresci,2017
5. Anomalous behavior detection in social networking;Chauhan,2017
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献