Twitter Bot Detection Using Diverse Content Features and Applying Machine Learning Algorithms

被引:5
作者
Alarfaj, Fawaz Khaled [1 ]
Ahmad, Hassaan [2 ]
Khan, Hikmat Ullah [2 ]
Alomair, Abdullah Mohammaed [1 ]
Almusallam, Naif [1 ]
Ahmed, Muzamil [2 ]
机构
[1] King Faisal Univ, Sch Business, Management Informat Syst, Al Hufuf 31982, Saudi Arabia
[2] COMSATS Univ Islamabad, Dept Comp Sci, Wah Campus, Wah Cantt 47040, Pakistan
关键词
bot detection; machine learning; deep learning; feature engineering; cyber security;
D O I
10.3390/su15086662
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
A social bot is an intelligent computer program that acts like a human and carries out various activities in a social network. A Twitter bot is one of the most common forms of social bots. The detection of Twitter bots has become imperative to draw lines between real and unreal Twitter users. In this research study, the main aim is to detect Twitter bots based on diverse content-specific feature sets and explore the use of state-of-the-art machine learning classifiers. The real-world data from Twitter is scrapped using Twitter API and is pre-processed using standard procedure. To analyze the content of tweets, several feature sets are proposed, such as message-based, part-of-speech, special characters, and sentiment-based feature sets. Min-max normalization is considered for data normalization and then feature selection methods are applied to rank the top features within each feature set. For empirical analysis, robust machine learning algorithms such as deep learning (DL), multilayer perceptron (MLP), random forest (RF), naive Bayes (NB), and rule-based classification (RBC) are applied. The performance evaluation based on standard metrics of precision, accuracy, recall, and f-measure reveals that the proposed approach outperforms the existing studies in the relevant literature. In addition, we explore the effectiveness of each feature set for the detection of Twitter bots.
引用
收藏
页数:17
相关论文
共 42 条
[1]  
Aiello L. M., 2012, P 6 INT AAAI C WEBL, P10
[2]  
Ain QT, 2017, INT J ADV COMPUT SC, V8, P424
[3]   Botnet Detection Approach Using Graph-Based Machine Learning [J].
Alharbi, Afnan ;
Alsubhi, Khalid .
IEEE ACCESS, 2021, 9 (09) :99166-99180
[4]   SoK: The Evolution of Sybil Defense via Social Networks [J].
Alvisi, Lorenzo ;
Clement, Allen ;
Epasto, Alessandro ;
Lattanzi, Silvio ;
Panconesi, Alessandro .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :382-396
[5]  
[Anonymous], 2011, Proceedings of the International AAAI Conference on Web and Social Media, DOI DOI 10.1145/1963192.1963301
[6]  
[Anonymous], 2013, P 22 USENIX SEC S WA
[7]  
[Anonymous], 2010, First Monday, DOI [DOI 10.5210/FM.V15I1.2793, 10.5210/fm.v15i1.2793]
[8]  
Beskow DM, 2018, 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), P825, DOI 10.1109/ASONAM.2018.8508322
[9]   Design and analysis of a social botnet [J].
Boshmaf, Yazan ;
Muslukhov, Ildar ;
Beznosov, Konstantin ;
Ripeanu, Matei .
COMPUTER NETWORKS, 2013, 57 (02) :556-578
[10]  
Cai CY, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P128, DOI 10.1109/ISI.2017.8004887