whereas Sybil accounts spend their
time harvesting profiles and befriending other accounts. Intuitively, social
bot activities tend to be simpler in
terms of variety of behavior exhibited.
By also identifying highly predictive
features such as invitation frequency,
outgoing requests accepted, and network clustering coefficient, Renren
is able to classify accounts into two
categories: bot-like and human-like
prototypical profiles. 42 Sybil accounts
on Renren tend to collude and work
together to spread similar content:
this additional signal, encoded as
content and temporal similarity, is
used to detect colluding accounts. In
some ways, the Renren approach37, 42
combines the best of network- and
behavior-based conceptualizations
of Sybil detection. By achieving good
results even utilizing only the last 100
click events for each user, the Renren
system obviates to the need to store
and analyze the entire click history
for every user. Once the parameters
are tweaked against ground truth,
the algorithm can be seeded with a
fixed number of known legitimate accounts and then used for mostly unsupervised classification. The “Sybil
until proven otherwise” approach
(the opposite of the innocent-by-association strategy) baked into this
framework does lend itself to detecting previously unknown methods of
attack: the authors recount the case
of spambots embedding text in images to evade detection by content analysis and URL blacklists. Other systems implementing mixed methods,
like CopyCatch4 and SynchroTrap, 10
also score comparatively low false
positive rates with respect to, for example, network-based methods.
Master of Puppets
If social bots are the puppets, additional efforts will have to be directed
at finding their “masters.” Governmentsg and other entities with sufficient resourcesh have been alleged
to use social bots to their advantage.
g Russian Twitter political protests ‘swamped
by spam’; www.bbc.com/news/technol-
ogy-16108876
h Fake Twitter accounts used to promote tar
sands pipeline; www.theguardian.com/envi-
ronment/2011/aug/05/fake-twitter-tar-sands-
pipeline
Assuming the availability of effective
detection technologies, it will be crucial to reverse engineer the observed
social bot strategies: who they target,
how they generate content, when they
take action, and what topics they talk
about. A systematic extrapolation of
such information may enable identification of the puppet masters.
Efforts in the direction of studying
platforms vulnerability have already
started. Some researchers, 17 for example, reverse-engineer social bots
reporting alarming results: simple
automated mechanisms that produce
contents and boost followers yield
successful infiltration strategies and
increase the social influence of the
bots. Other teams are creating bots
themselves: Tim Hwang’s22 and Sune
Lehmann’si groups continuously
challenge our understanding of what
strategies effective bots employ, and
help quantify the susceptibility of
people to their influence. 35, 36 Briscoe
et al. 8 studied the deceptive cues of
language employed by influence bots.
Tools like Bot or Not? have been made
available to the public to shed light on
the presence of social bots online.
Yet many research questions remain
open. For example, nobody knows exactly how many social bots populate
social media, or what share of content
can be attributed to bots—estimates
vary wildly and we might have observed
only the tip of the iceberg. These are important questions for the research community to pursue, and initiatives such
as DARPA’s SMISC bot detection challenge, which took place in the spring of
2015, can be effective catalysts of this
emerging area of inquiry. 32
Bot behaviors are already quite sophisticated: they can build realistic
social networks and produce credible
content with human-like temporal
patterns. As we build better detection systems, we expect an arms race
similar to that observed for spam in
the past. 21 The need for training instances is an intrinsic limitation of
supervised learning in such a scenario; machine learning techniques such
as active learning might help respond
to newer threats. The race will be over
i You are here because of a robot; sunelehm-
ann.com/2013/12/04/youre-here-because-of-a-
robot/
If social bots
are the puppets,
additional efforts
will have to be
directed at finding
their “masters.”