Skip to main content
Log in

Its all in a name: detecting and labeling bots by their name

  • S.I. : SBP-BRiMS 2018
  • Published:
Computational and Mathematical Organization Theory Aims and scope Submit manuscript

Abstract

Automated social media bots have existed almost as long as the social media environments they inhabit. Their emergence has triggered numerous research efforts to develop increasingly sophisticated means to detect these accounts. These efforts have resulted in a cat and mouse cycle in which detection algorithms evolve trying to keep up with ever evolving bots. As part of this continued evolution, our research proposes a multi-model ‘tool-box’ approach in order to conduct detection at various tiers of data granularity. To support this toolbox approach this research also uses random string detection applied to user names to filter twitter streams for bot accounts and use this as labeled training data for follow on research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Ananthalakshmi A (2018) Ahead of Malaysian polls, bots flood twitter with pro-government

  • Bawaba A (2017) The loop. Thousands of twitter bots are attempting to silence reporting on yemen

  • Beskow D, Carley KM (2018a) Bot conversations are different: leveraging network metrics for bot detection in twitter. In: 2018 international conference on advances in social networks analysis and mining (ASONAM), pp 176–183. IEEE

  • Beskow D, Carley KM (2018b) Introducing bothunter: a tiered approach to detection and characterizing automated activity on twitter. In: Halil B, Ayaz H, Chris D, Robert T (eds) International conference on social computing, behavioral-cultural modeling and prediction and behavior representation in modeling and simulation. Springer, Berlin

  • Beskow D, Carley KM (2018c) Using random string classification to filter and annotate automated accounts. In: Halil B, Ayaz H, Chris D, Robert T (eds) International conference on social computing, behavioral-cultural modeling and prediction and behavior representation in modeling and simulation. Springer, Berlin

  • Bessi A, Ferrara E (2016) Social bots distort the 2016 US presidential election online discussion

  • Chu Z, Gianvecchio S, Wang H, Jajodia S (2010) Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of the 26th annual computer security applications conference, pp 21–30. ACM

  • Davis CA, Varol O, Ferrara E, Flammini A, Menczer F (2016) Botornot: a system to evaluate social bots. In: Proceedings of the 25th international conference companion on world wide web, pp 273–274. International World Wide Web Conferences Steering Committee

  • Ferrara E (2017) Measuring social spam and the effect of bots on information diffusion in social media. arXiv:1708.08134

  • Freeman DM (2013) Using naive bayes to detect spammy names in social networks. In: Proceedings of the 2013 ACM workshop on artificial intelligence and security, pp 3–12. ACM

  • Freitas C, Benevenuto F, Ghosh S, Veloso A (2015) Reverse engineering socialbot infiltration strategies in twitter. In: Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining 2015, pp 25–32. ACM

  • Glaser A (2017) Russian bots are trying to sow discord on twitter after Charlottesville

  • Graham T, Ackland R (2016) Do socialbots dream of popping the filter bubble? Socialbots and their friends: digital media and the automation of sociality, p. 187

  • Howard PN, Kollanyi B (2016) Bots Bence Kollanyi,# strongerin,# brexit: computational propaganda during the uk-eu referendum. Browser download this paper

  • Krishnamurthy B, Gill P, Arlitt M (2008) A few chirps about twitter. In: Proceedings of the first workshop on Online social networks, pp 19–24. ACM

  • Lee K, Eoff BD, Caverlee J (2011) A long-term study of content polluters on twitter. In: ICWSM, seven months with the devils

  • Lumezanu C, Feamster N, Klein H (2012) # bias: measuring the tweeting behavior of propagandists. In: Sixth international AAAI conference on weblogs and social media

  • Matthew B, Kathleen CM (2016) From tweets to intelligence: understanding the Islamic Jihad supporting community on twitter. In: Social, cultural, and behavioral modeling: 9th international conference, SBP-BRiMS 2016, Washington, DC, USA, June 28–July 1, 2016, Proceedings 9, pp. 346–355. Springer, Berlin

  • Namazifar M (2015) Detecting randomly generated strings

  • Neudert LM, Kollanyi B, Howard PN (2017) Junk news and bots during the German federal presidency election: what were German voters sharing over twitter?

  • Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825–2830

    Google Scholar 

  • Raghuram J, Miller DJ, Kesidis G (2014) Unsupervised, low latency anomaly detection of algorithmically generated domain names by generative probabilistic modeling. J Adv Res 5(4):423–433

    Article  Google Scholar 

  • Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423

    Article  Google Scholar 

  • Subrahmanian VS, Azaria A, Durst S, Kagan V, Galstyan A, Lerman K et al. (2016) The darpa twitter bot challenge. Computer 49(6):38–46

    Article  Google Scholar 

  • Twitter rate limiting. https://developer.twitter.com/en/docs/basics/rate-limiting. Accessed 2 May 2018

  • Verkamp J-P, Gupta M (2013) Five incidents, one theme: twitter spam as a weapon to drown voices of protest. In: FOCI

  • Yadav S, Kumar KRA., Reddy AL, Supranamaya R (2010) Detecting algorithmically generated malicious domain names. In: Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp 48–61. ACM

Download references

Acknowledgements

This work was supported in part by the Office of Naval Research (ONR) Multidisciplinary University Research Initiative Award N000140811186 and Award N000141812108, the Army Research Laboratory Award W911NF1610049, Defense Threat Reductions Agency Award HDTRA11010102, and the Center for Computational Analysis of Social and Organization Systems (CASOS). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the ONR, ARL, DTRA, or the U.S. government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David M. Beskow.

Additional information

Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Beskow, D.M., Carley, K.M. Its all in a name: detecting and labeling bots by their name. Comput Math Organ Theory 25, 24–35 (2019). https://doi.org/10.1007/s10588-018-09290-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10588-018-09290-1

Keywords

Navigation