Tutorial: Identifying Malicious Actors on Social Media

نویسندگان

  • Srijan Kumar
  • Francesca Spezzano
  • V. S. Subrahmanian
چکیده

Online social media platforms are severely compromised by the existence of malicious actors such as bots on Twitter, vandals on Wikipedia, fake accounts on Facebook, trolls on Twitter and Slashdot, and spammers who seem to be omnipresent. This tutorial presents methods to identify malicious actors in at least 4 settings: Twitter, Facebook, Slashdot, and Wikipedia. We will look at 4 broad categories of methods: (i) network based techniques where the structure of the social network is used, (ii) text based methods where the linguistic content of posts is examined, (iii) behavior-based methods which study actions of users, and (iv) real-time processes which enable defenders of social media to keep a step ahead of malicious actors. The tutorial will identify commonly used features for classifying actors into malicious vs. benign and will give a brief explanation of different algorithms both specific to social platforms and general algorithms that are platform neutral.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Politeness Effect: Pedagogical Agents and Learning Gains

Pedagogical agent research seeks to exploit Reeves and Nass’s Media Equation, which holds that users respond to interactive media as if they were social actors. Investigations have tended to focus on the media used to realize the pedagogical agent, e.g., the use of animated talking heads and voices, and the results have been mixed. This paper focuses instead on the manner in which a pedagogical...

متن کامل

The Politeness Effect 1 Running head: THE POLITENESS EFFECT The Politeness Effect: Pedagogical Agents and Learning Outcomes

Pedagogical agent research seeks to exploit Reeves and Nass’s Media Equation theory, which holds that users respond to interactive media as if they were social actors. Investigations have tended to focus on the media used to realize the pedagogical agent, e.g., the use of animated talking heads and voices, and the results have been mixed. This paper focuses instead on the manner in which a peda...

متن کامل

KDD 2017 Tutorial: Data-Driven Approaches towards Malicious Behavior Modeling

Œe safety, reliability and usability of web platforms are o‰en compromised by malicious entities, such as vandals on Wikipedia, bot connections on TwiŠer, fake likes on Facebook, and several more. Computational models developed with large-scale real-world behavioral data have shown signi€cant progress in identifying these malicious entities. Œis tutorial discusses three broad directions of stat...

متن کامل

Efficient Identification of Overlapping Communities

In this paper, we present an efficient algorithm for finding overlapping communities in social networks. Our algorithm does not rely on the contents of the messages and uses the communication graph only. The knowledge of the structure of the communities is important for the analysis of social behavior and evolution of the society as a whole, as well as its individual members. This knowledge can...

متن کامل

Tutorial on Large Scale Networks

In the last 20 years, network structures arise in various fields, such as social media, biology, and technology. This trend has motivated the statistical analysis in networks. This tutorial will give a brief overview of some recent works, including:

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016