期刊文献+

Sockpuppet gang detection on social media sites 被引量:1

Sockpuppet gang detection on social media sites
原文传递
导出
摘要 Users of social media sites can use more than one account. These identities have pseudo anonymous properties, and as such some users abuse multiple accounts to perform undesirable actions, such as posting false or misleading re- marks comments that praise or defame the work of others. The detection of multiple user accounts that are controlled by an individual or organization is important. Herein, we define the problem as sockpuppet gang (SPG) detection. First, we analyze user sentiment orientation to topics based on emo- tional phrases extracted from their posted comments. Then we evaluate the similarity between sentiment orientations of user account pairs, and build a similar-orientation network (SON) where each vertex represents a user account on a so- cial media site. In an SON, an edge exists only if the two user accounts have similar sentiment orientations to most topics. The boundary between detected SPGs may be indistinct, thus by analyzing account posting behavior features we propose a multiple random walk method to iteratively remeasure the weight of each edge. Finally, we adopt multiple community detection algorithms to detect SPGs in the network. User ac- counts in the same SPG are considered to be controlled by the same individual or organization. In our experiments on real world datasets, our method shows better performance than other contemporary methods. Users of social media sites can use more than one account. These identities have pseudo anonymous properties, and as such some users abuse multiple accounts to perform undesirable actions, such as posting false or misleading re- marks comments that praise or defame the work of others. The detection of multiple user accounts that are controlled by an individual or organization is important. Herein, we define the problem as sockpuppet gang (SPG) detection. First, we analyze user sentiment orientation to topics based on emo- tional phrases extracted from their posted comments. Then we evaluate the similarity between sentiment orientations of user account pairs, and build a similar-orientation network (SON) where each vertex represents a user account on a so- cial media site. In an SON, an edge exists only if the two user accounts have similar sentiment orientations to most topics. The boundary between detected SPGs may be indistinct, thus by analyzing account posting behavior features we propose a multiple random walk method to iteratively remeasure the weight of each edge. Finally, we adopt multiple community detection algorithms to detect SPGs in the network. User ac- counts in the same SPG are considered to be controlled by the same individual or organization. In our experiments on real world datasets, our method shows better performance than other contemporary methods.
机构地区 School of Computer
出处 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第1期124-135,共12页 中国计算机科学前沿(英文版)
关键词 social media site sockpuppet gang detection sentiment orientation user behavior feature social media site, sockpuppet gang detection,sentiment orientation, user behavior feature
  • 相关文献

参考文献20

  • 1Andrew M. Whole foods executive used alias. New York Times, 2007, 12.
  • 2Lea R, Taylor M. Historian Orlando Figes admits posting Amazon re?views that trashed rivals. The Guardian, 2010.
  • 3Eligon J. Dispute over dead sea scrolls leads to a jail sentence. New York Times, 2010.
  • 4Olivier D, Anderson A, Corney M, Mohay G. Mining e-mail content for author identification forensic. ACM SIGMOD Record, 2001,30(4): 55-64.
  • 5Corney M. Analyzing e-mail text authorship for forensic purpose. Master's Thesis. Australia: University of Software Engineering and Data Communications, 2003.
  • 6Abbasi A, Chen H. Writeprints: a stylemetric approach to identity-level identification and similarity detection in cyberspace. ACM Transaction on Information System, 2008, 26(2): 14-24.
  • 7Revert, K. Behavioral Biometrics: A Remote Access Approach. Chich?ester: John Wiley & Sons, 2008.
  • 8Gao H, Hu J, Wilson C, Li Z C, Chen Y; Zhao B. Detecting and charac?terizing social sparn campaigns. In: Proceedings of the Internet Mea?surement Conference. 2010, 35--47.
  • 9Thomas K, Grier C, Ma J, Paxon Y. Design and evaluation of a real?time URL spam filtering service. In: Proceedings of the 32nd IEEE Symposium on Security and Privacy. 2011.
  • 10Yang C, Harkreader R, Zhang J, Shin S, Gu G. Analyzing spamrners' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter, In: Proceedings of the 21st International Con?ference on World Wide Web. 2012, 71-80.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部