- Emergent Technologies & Democracy
- Editor-at-Large Login
Detection of Bots in Social Media: A Systematic Review
Social media bots (automated accounts) attacks are organized crimes that pose potential threats to public opinion, democracy, public health, stock market and other disciplines. While researchers are building many models to detect social media bot accounts, attackers, on the other hand, evolve their bots to evade detection. This everlasting cat and mouse game makes this field vibrant and demands continuous development. To guide and enhance future solutions, this work provides an overview of social media bots attacks, current detection methods and challenges in this area. To the best of our knowledge, this paper is the first systematic review based on a predefined search strategy, which includes literature concerned about social media bots detection methods, published between 2010 and 2019. The results of this review include a refined taxonomy of detection methods, a highlight of the techniques used to detect bots in social media and a comparison between current detection methods. Some of the gaps identified by this work are: the literature mostly focus on Twitter platform only and rarely use methods other than supervised machine learning, most of the public datasets are not accurate or large enough, integrated systems and real-time detection are required, and efforts to spread awareness are needed to arm legitimate users with knowledge.
Method of Detecting Bots on Social Media. A Literature Review
- Conference paper
- First Online: 23 November 2020
- Cite this conference paper
- Botambu Collins 14 ,
- Dinh Tuyen Hoang 14 , 15 ,
- Dai Tho Dang 14 &
- Dosam Hwang 14
Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12496))
Included in the following conference series:
- International Conference on Computational Collective Intelligence
1472 Accesses
2 Citations
The introduction of the online social media system has unquestionably facilitated communication as well as being a prime and cheap source of information. However, despite these numerous advantages, the social media system remains a double-edged sword. Recently, the online social media ecosystem although fast becoming the primary source of information has become the medium for misinformation and other malicious attacks. These malicious attacks are further exacerbated by the use of social bots that have implacable consequences to victims. In this study, we examine the various methods employed by experts and academia to detect and curb Sybils attack. We define and explain three types of social bots such as the good, the bad and the ugly. We surmised that although the various social media giants have peddled in orthogonal techniques to uncloak and perturb Sybils activities, the adversaries are also working on a robust method to evade detection, hence, a heuristic approach including hybrid crowdsourced-machine learning technique is required to avert future attacks.
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
- Available as PDF
- Read on any device
- Instant download
- Own it forever
- Available as EPUB and PDF
- Compact, lightweight edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
Yang, K., Varol, O., Davis, C.A., Ferrara, E., Flammini, A., Menczer, F.: Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 1 (1), 48–61 (2019). https://doi.org/10.1002/hbe2.115
Article Google Scholar
Karataş, A., Şahin, S.: A Review on social bot detection techniques and research directions. In: Proceedings of the International Information Security and Cryptology Conference, Turkey, no. i, pp. 156–161 (2017)
Google Scholar
Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutorials 16 (2), 898–924 (2014). https://doi.org/10.1109/SURV.2013.091213.00134
Grimme, C., Preuss, M., Adam, L., Trautmann, H.: Social bots: human-like by means of human control? Big Data 5 (4), 279–293 (2017). https://doi.org/10.1089/big.2017.0044
Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. (Ny) 467 , 312–322 (2018). https://doi.org/10.1016/j.ins.2018.08.019
Perez-Soler, S., Guerra, E., De Lara, J., Jurado, F.: The rise of the (modelling) bots: towards assisted modelling via social networks. In: ASE 2017 – Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), pp. 723–728 (2017). https://doi.org/10.1109/ase.2017.8115683
Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59 (7), 96–104 (2016). https://doi.org/10.1145/2818717
Yang, K.C., Hui, P.M., Menczer, F.: Bot electioneering volume: visualizing social bot activity during elections. In: Web Conference 2019 - Companion World Wide Web Conference WWW 2019, pp. 214–217 (2019). https://doi.org/10.1145/3308560.3316499
Ratkiewicz, J., Meiss, M., Conover, M., Gonçalves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, p. 297 (2011)
Broniatowski, D.A., et al.: Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. Am. J. Public Health 108 (10), 1378–1384 (2018). https://doi.org/10.2105/AJPH.2018.304567
Mehrotra, A., Sarreddy, M., Singh, S.: Detection of fake Twitter followers using graph centrality measures. In: Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016, September 2016, pp. 499–504 (2016). https://doi.org/10.1109/ic3i.2016.7918016
Barbon, S., et al.: Detection of human, legitimate bot, and malicious bot in online social networks based on wavelets. ACM Trans. Multimed. Comput. Commun. Appl. 14 (1s) (2018). https://doi.org/10.1145/3183506
Kaubiyal, J., Jain, A.K.: A feature based approach to detect fake profiles in Twitter. In: ACM International Conference Proceeding Series, pp. 135–139 (2019). https://doi.org/10.1145/3361758.3361784
Luo, L., Zhang, X., Yang, X., Yang, W.: Deepbot: a deep neural network based approach for detecting Twitter Bots. IOP Conf. Ser. Mater. Sci. Eng. 719 (1) (2020). https://doi.org/10.1088/1757-899x/719/1/012063
Ferrara, E.: Measuring social spam and the effect of bots on information diffusion in social media. In: Lehmann, S., Ahn, Y.-Y. (eds.) Complex Spreading Phenomena in Social Systems. CSS, pp. 229–255. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-77332-2_13 . arXiv: 1708.08134v1
Chapter Google Scholar
Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16 (4), 2019–2036 (2014). https://doi.org/10.1109/COMST.2014.2321628
Bhise, A.M., Kamble, S.D.: Review on detection and mitigation of Sybil attack in the network. Phys. Procedia Comput. Sci. 78 , 395–401 (2016). https://doi.org/10.1016/j.procs.2016.02.080
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network Sybils in the wild. ACM Trans. Knowl. Discov. Data 8 (1) (2014). https://doi.org/10.1145/2556609
Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: NSDI 2012 Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, p. 15 (2012)
Lieto, A., et al.: Hello? Who am I talking to? A shallow CNN approach for human vs. bot speech classification. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, May 2019, pp. 2577–2581 (2019). https://doi.org/10.1109/icassp.2019.8682743
Melmeti, K., Shannon, C., Asaf, V.: Visualization of the social bot’s fingerprints. In: 4th International Symposium on Digital Forensics and Security, pp. 161–166 (2016)
Stein, T., Chen, E., Mangla, K.: Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, SNS 2011 (2011). https://doi.org/10.1145/1989656.1989664
Paul, A., Sinha, S., Pal, S.: An efficient method to detect Sybil attack using trust based model. In: Proceedings of the International Conference on Advances in Computer Science AETACS, December 2013, pp. 228–237 (2013)
Glasgow, J.: Swarm intelligence: concepts, models and applications. Technical report 2012-585 (2012)
Surowiecki, J.: The Wisdom of Crowds, First Anch. Anchor Books, A Division of Random House Inc, New York (2004)
Dang, D.T., Nguyen, N.T., Hwang, D.: Multi-step consensus: an effective approach for determining consensus in large collectives. Cybern. Syst. 50 (2), 208–229 (2019). https://doi.org/10.1080/01969722.2019.1565117
Malone, T., Atlee, T., Lévy, P., Rt, T., Paul, H., Homer-dixon, T.: Collective Intelligence: Creating a Prosperous World at Peace. Earth Intelligence Network, Oakton (2008)
Wang, G., et al.: Social turing tests: crowdsourcing Sybil detection (2012)
Schnebly, J., Sengupta, S.: Random forest Twitter bot classifier. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference CCWC 2019, pp. 506–512 (2019). http://doi.org/10.1109/CCWC.2019.8666593
Danezis, G.: SybilInfer: detecting Sybil nodes using social networks. In: Network and Distributed System Security Symposium (2009)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against Sybil attacks. IEEE/ACM Trans. Netw. 18 (3), 885–898 (2010). https://doi.org/10.1109/TNET.2009.2034047
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. IEEE/ACM Trans. Netw. 16 (3), 267 (2008). https://doi.org/10.1145/1159913.1159945
Gang, W., Tristan, K., Christo, W., Haitao, Z., Zhao, B.Y.: You are how you click: clickstream analysis for Sybil detection. In: Proceedings of the 22nd USENIX Security Symposium, vol. 7, no. 2, pp. 95–112 (2013). https://doi.org/10.1111/j.1745-4522.2000.tb00164.x
Nguyen, N.T.: Advanced Methods for Inconsistent Knowledge Management. AIKP. Springer, London (2008). https://doi.org/10.1007/978-1-84628-889-0
Book MATH Google Scholar
Danilowicz, C., Nguyen, N.T.: Consensus-based methods for restoring consistency of replicated data. In: K’opotek et al. (eds.) Advances in Soft Computing, Proceedings of 9th International Conference on Intelligent Information Systems 2000, pp. 325–336. Physica (2000)
Nguyen, N.T.: Using consensus methods for solving conflicts of data in distributed systems. In: Hlaváč, V., Jeffery, K.G., Wiedermann, J. (eds.) SOFSEM 2000. LNCS, vol. 1963, pp. 411–419. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44411-4_30
Download references
Acknowledgment
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2017R1A2B4009410), and the National Research Foundation of Korea (NRF) grant funded by the BK21PLUS Program (22A20130012009).
Author information
Authors and affiliations.
Department of Computer Engineering, Yeungnam University, Gyeongsan, South Korea
Botambu Collins, Dinh Tuyen Hoang, Dai Tho Dang & Dosam Hwang
Faculty of Engineering and Information Technology, Quang Binh University, Đồng Hới, Vietnam
Dinh Tuyen Hoang
You can also search for this author in PubMed Google Scholar
Corresponding author
Correspondence to Dosam Hwang .
Editor information
Editors and affiliations.
Department of Applied Informatics, Wrocław University of Science and Technology, Wroclaw, Poland
Ngoc Thanh Nguyen
Thua Thien Hue Center of Information Technology, Hue, Vietnam
Bao Hung Hoang
Vietnam - Korea University of Information and Communication Technology, University of Da Nang, Da Nang, Vietnam
Cong Phap Huynh
Department of Computer Engineering, Yeungnam University, Gyeungsan, Korea (Republic of)
Dosam Hwang
Bogdan Trawiński
Department of Information Systems, University of Münster, Münster, Germany
Gottfried Vossen
Rights and permissions
Reprints and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper.
Collins, B., Hoang, D.T., Dang, D.T., Hwang, D. (2020). Method of Detecting Bots on Social Media. A Literature Review. In: Nguyen, N.T., Hoang, B.H., Huynh, C.P., Hwang, D., Trawiński, B., Vossen, G. (eds) Computational Collective Intelligence. ICCCI 2020. Lecture Notes in Computer Science(), vol 12496. Springer, Cham. https://doi.org/10.1007/978-3-030-63007-2_6
Download citation
DOI : https://doi.org/10.1007/978-3-030-63007-2_6
Published : 23 November 2020
Publisher Name : Springer, Cham
Print ISBN : 978-3-030-63006-5
Online ISBN : 978-3-030-63007-2
eBook Packages : Computer Science Computer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Publish with us
Policies and ethics
- Find a journal
- Track your research
IMAGES
VIDEO
COMMENTS
BotWalk ( Minnich et al., 2017) is an anomaly-based system that identifies SMBs by detecting new behavior patterns using user information, content, temporal, and network features. BotWalk can detect new bots by performing anomaly detection using a clustering algorithm based on behavioral characteristics.
Systematic Literature Review of Social Media Bots Detection Systems. Authors: Zineb Ellaky. Laboratory of Information Technology and Modeling, Faculty of Sciences Ben M'Sick, Hassan II University of Casablanca, Casablanca, Morocco ... « Guidance on conducting a systematic literature review », J. Plan. Educ. Res., vol. 39, no 1, p. 93‑112 ...
This article, a Systematic Literature Review (SLR), aims to determine best practices in SMB recognition. This SLR covers research published between 2008 and 2022. As a result of this study, we ...
The main contribution of our work can be summarized as follows: We provide a systematic review of various DL approaches which have been used particularly in social media bot detection, including all the related literature found between 2000 and 2021, from pre-defined resources, and based on pre-defined inclusion/exclusion criteria.
This article reviews best practices in identifying malicious social media bots (SMBs) in online social networks (OSNs). It covers research from 2008 to 2022, classifies SMBs and detection techniques, and discusses challenges and future works.
DOI: 10.1016/j.jksuci.2023.04.004 Corpus ID: 258140645; Systematic Literature Review of Social Media Bots Detection Systems @article{Ellaky2023SystematicLR, title={Systematic Literature Review of Social Media Bots Detection Systems}, author={Zineb Ellaky and Faouzia Benabbou and Sara Ouahabi}, journal={J. King Saud Univ. Comput.
Methods and Challenges in Social Bots Detection: A Systematic Review. ... C. Cai, L. Li, and D. Zengi. 2017. Behavior enhanced deep bot detection in social media. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). ... European Journal of Information Systems 28, 4 (2019), 394-412.
Collins B, et al. (2020) Method of detecting bots on social media. A literature review. In: International conference on computational collective intelligence. Springer Google Scholar; 16. Latah M Detection of malicious social bots: a survey and a refined taxonomy Expert Syst Appl 2020 151 113383 10.1016/j.eswa.2020.113383 Google Scholar Cross ...
A systematic review on detection of bots on social media (Orabi et al. 2020) further discusses unsupervised methods, e.g. (Chavoshi, Hamooni, and Mueen 2017;Chen and Subramanian 2018), yet to our ...
Social Network Analysis and Mining. 2023. TLDR. This literature review attempts to compile and compare the most recent advancements in Machine Learning-based techniques for the detection and classification of bots on five primary social media platforms namely Facebook, Instagram, LinkedIn, Twitter, and Weibo. Expand.
As a result, the research community must focus on developing systems that can detect social bots using neural learning to automatically determine the reliability of social media accounts. The focus of this study is to represent a review of graph-based, crowd sourcing-based, and anomaly based bots detection techniques.
A SLR is a type of literature review in which a collection of arti-cles on a specific topic is gathered and critically analyzed in order to identify, select, synthesize, and assess relationships ...
This paper reviews the literature on social media bot detection using deep learning techniques and compares them with other methods. It presents a taxonomy of features, pre-processing strategies and performance evaluation metrics for DL studies.
Over the past few years, a few review studies contributed to the social media bot detection research by presenting a comprehensive survey on various detection methods including cutting-edge solutions like machine learning (ML)/deep learning (DL) techniques. This paper, to the best of our knowledge, is the first one to only highlight the DL ...
To guide and enhance future solutions, this work provides an overview of social media bots attacks, current detection methods and challenges in this area. To the best of our knowledge, this paper is the first systematic review based on a predefined search strategy, which includes literature concerned about social media bots detection methods ...
3.6 Graphical Modeling to Detect Bots. The graphical modeling of social media accounts to uncloak Sybil chime in owing to the inability of the various machine learning approaches to curb Sybil attacks. With the application of a machine learning model, the adversary still finds ways to evade detection.
While researchers develop a variety of methods to detect social media bot accounts, attackers adapt their bots to avoid detection. ... this study is the first systematic literature review based on ...
In today's digitalized era, Online Social Networking platforms are growing to be a vital aspect of each individual's daily life. The availability of the vast amount of information and their open nature attracts the interest of cybercriminals to create malicious bots. Malicious bots in these platforms are automated or semi-automated entities used in nefarious ways while simulating human ...
Social media has become more popular in the last few years. It has been used in public health development and healthcare settings to promote healthier lifestyles. Given its important role in today's culture, it is necessary to understand its current trends and future directions in public health. This review aims to describe and summarize how public health professionals have been using social ...
A Literature Review. Method of Detecting Bots on Social Media. A Literature Review. Botambu Collins1, Dinh Tuyen Hoang1,2, Dai Tho Dang1, and Dosam Hwang1(B) Department of Computer Engineering, Yeungnam University, Gyeongsan, South Korea. [email protected], [email protected], [email protected], [email protected].
This literature review attempts. to compile and compare the most recent advancements in Machine Learning-based techniques f or the detection and clas. sification of bots on five primary social ...