Tutorial: Identifying Malicious Actors on Social Media
نویسندگان
چکیده
Online social media platforms are severely compromised by the existence of malicious actors such as bots on Twitter, vandals on Wikipedia, fake accounts on Facebook, trolls on Twitter and Slashdot, and spammers who seem to be omnipresent. This tutorial presents methods to identify malicious actors in at least 4 settings: Twitter, Facebook, Slashdot, and Wikipedia. We will look at 4 broad categories of methods: (i) network based techniques where the structure of the social network is used, (ii) text based methods where the linguistic content of posts is examined, (iii) behavior-based methods which study actions of users, and (iv) real-time processes which enable defenders of social media to keep a step ahead of malicious actors. The tutorial will identify commonly used features for classifying actors into malicious vs. benign and will give a brief explanation of different algorithms both specific to social platforms and general algorithms that are platform neutral.
منابع مشابه
The Politeness Effect: Pedagogical Agents and Learning Gains
Pedagogical agent research seeks to exploit Reeves and Nass’s Media Equation, which holds that users respond to interactive media as if they were social actors. Investigations have tended to focus on the media used to realize the pedagogical agent, e.g., the use of animated talking heads and voices, and the results have been mixed. This paper focuses instead on the manner in which a pedagogical...
متن کاملThe Politeness Effect 1 Running head: THE POLITENESS EFFECT The Politeness Effect: Pedagogical Agents and Learning Outcomes
Pedagogical agent research seeks to exploit Reeves and Nass’s Media Equation theory, which holds that users respond to interactive media as if they were social actors. Investigations have tended to focus on the media used to realize the pedagogical agent, e.g., the use of animated talking heads and voices, and the results have been mixed. This paper focuses instead on the manner in which a peda...
متن کاملKDD 2017 Tutorial: Data-Driven Approaches towards Malicious Behavior Modeling
e safety, reliability and usability of web platforms are oen compromised by malicious entities, such as vandals on Wikipedia, bot connections on Twier, fake likes on Facebook, and several more. Computational models developed with large-scale real-world behavioral data have shown signicant progress in identifying these malicious entities. is tutorial discusses three broad directions of stat...
متن کاملEfficient Identification of Overlapping Communities
In this paper, we present an efficient algorithm for finding overlapping communities in social networks. Our algorithm does not rely on the contents of the messages and uses the communication graph only. The knowledge of the structure of the communities is important for the analysis of social behavior and evolution of the society as a whole, as well as its individual members. This knowledge can...
متن کاملTutorial on Large Scale Networks
In the last 20 years, network structures arise in various fields, such as social media, biology, and technology. This trend has motivated the statistical analysis in networks. This tutorial will give a brief overview of some recent works, including:
متن کامل