Journal on Communications ›› 2017, Vol. 38 ›› Issue (Z2): 197-210.doi: 10.11959/j.issn.1000-436x.2017275

• Comprehensive Reviews • Previous Articles    

Overview of detection techniques for malicious social bots

Rong LIU1,Bo CHEN1(),Ling YU1,2,Ya-shang LIU1,Si-yuan CHEN1   

  1. 1 School of Computer Science and Technology,Nanjing Normal University,Nanjing 210023,China
    2 Jiangsu Provincial Key Laboratory for Numerical of Large Scale Complex System,Nanjing 210023,China
  • Online:2017-11-01 Published:2018-06-07
  • Supported by:
    CERNET Innovation Project(NGII20160509);Key Subject of Higher Education Teaching Reform of Jiangsu Province(2015JSJG034)

Abstract:

The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.

Key words: social bots, online social network, feature engineering, machine learning, graph, crowdsourcing, parallelism

CLC Number: 

No Suggested Reading articles found!