Physica D
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Machine learning in automated text categorization
ACM Computing Surveys (CSUR)
A generalized analysis of variance program utilizing binary logic
ACM '59 Preprints of papers presented at the 14th national meeting of the Association for Computing Machinery
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Using simulated data in support of research on regression analysis
WSC '04 Proceedings of the 36th conference on Winter simulation
An effective defense against email spam laundering
Proceedings of the 13th ACM conference on Computer and communications security
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Characterizing residential broadband networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Detecting covert timing channels: an entropy-based approach
Proceedings of the 14th ACM conference on Computer and communications security
Why we twitter: understanding microblogging usage and communities
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis
Proceedings of the first workshop on Online social networks
Measurement and classification of humans and bots in internet chat
SS'08 Proceedings of the 17th conference on Security symposium
A measurement-driven analysis of information propagation in the flickr social network
Proceedings of the 18th international conference on World wide web
How and why people Twitter: the role that micro-blogging plays in informal communication at work
Proceedings of the ACM 2009 international conference on Supporting group work
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
Your botnet is my botnet: analysis of a botnet takeover
Proceedings of the 16th ACM conference on Computer and communications security
Twitter power: Tweets as electronic word of mouth
Journal of the American Society for Information Science and Technology
Chatter on the red: what hazards threat reveals about the social life of microblogged information
Proceedings of the 2010 ACM conference on Computer supported cooperative work
Walking in facebook: a case study of unbiased sampling of OSNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
Phi.sh/$oCiaL: the phishing landscape through short URLs
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Identifying automatic posting systems in microblogs
EPIA'11 Proceedings of the 15th Portugese conference on Progress in artificial intelligence
Spam filtering in twitter using sender-receiver relationship
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Identifying communicator roles in twitter
Proceedings of the 21st international conference companion on World Wide Web
Detecting social spam campaigns on twitter
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Mixing methods and theory to explore web activity
Proceedings of the 3rd Annual ACM Web Science Conference
Proceedings of the CUBE International Information Technology Conference
Twitter games: how successful spammers pick targets
Proceedings of the 28th Annual Computer Security Applications Conference
Fluxing botnet command and control channels with URL shortening services
Computer Communications
Blog or block: Detecting blog bots through behavioral biometrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
@i seek 'fb.me': identifying users across multiple online social networks
Proceedings of the 22nd international conference on World Wide Web companion
Context Oriented Analysis of Interest Reflection of Tweeted Webpages based on Browsing Behavior
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Twitter n-gram corpus with demographic metadata
Language Resources and Evaluation
Hi-index | 0.00 |
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularity and open structure of Twitter have attracted a large number of automated programs, known as bots, which appear to be a double-edged sword to Twitter. Legitimate bots generate a large amount of benign tweets delivering news and updating feeds, while malicious bots spread spam or malicious contents. More interestingly, in the middle between human and bot, there has emerged cyborg referred to either bot-assisted human or human-assisted bot. To assist human users in identifying who they are interacting with, this paper focuses on the classification of human, bot and cyborg accounts on Twitter. We first conduct a set of large-scale measurements with a collection of over 500,000 accounts. We observe the difference among human, bot and cyborg in terms of tweeting behavior, tweet content, and account properties. Based on the measurement results, we propose a classification system that includes the following four parts: (1) an entropy-based component, (2) a machine-learning-based component, (3) an account properties component, and (4) a decision maker. It uses the combination of features extracted from an unknown user to determine the likelihood of being a human, bot or cyborg. Our experimental evaluation demonstrates the efficacy of the proposed classification system.