skip to main content
research-article
Public Access

Modeling Temporal Activity to Detect Anomalous Behavior in Social Media

Authors Info & Claims
Published:14 July 2017Publication History
Skip Abstract Section

Abstract

Social media has become a popular and important tool for human communication. However, due to this popularity, spam and the distribution of malicious content by computer-controlled users, known as bots, has become a widespread problem. At the same time, when users use social media, they generate valuable data that can be used to understand the patterns of human communication. In this article, we focus on the following important question: Can we identify and use patterns of human communication to decide whether a human or a bot controls a user? The first contribution of this article is showing that the distribution of inter-arrival times (IATs) between postings is characterized by following four patterns: (i) heavy-tails, (ii) periodic-spikes, (iii) correlation between consecutive values, and (iv) bimodallity. As our second contribution, we propose a mathematical model named Act-M (Activity Model). We show that Act-M can accurately fit the distribution of IATs from social media users. Finally, we use Act-M to develop a method that detects if users are bots based only on the timing of their postings. We validate Act-M using data from over 55 million postings from four social media services: Reddit, Twitter, Stack-Overflow, and Hacker-News. Our experiments show that Act-M provides a more accurate fit to the data than existing models for human dynamics. Additionally, when detecting bots, Act-M provided a precision higher than 93% and 77% with a sensitivity of 70% for the Twitter and Reddit datasets, respectively.

References

  1. Albert-László Barabási. 2005. The origin of bursts and heavy tails in human dynamics. Nature 435, 7039 (2005), 207--211. Google ScholarGoogle ScholarCross RefCross Ref
  2. Marco Bazzi, Francisco Blasques, S. J. Koopman, and André Lucas. 2014. Time varying transition probabilities for markov regime switching models. Tinbergen Institute Discussion Papers (2014).Google ScholarGoogle ScholarCross RefCross Ref
  3. Adrian W. Bowman and Adelchi Azzalini. 2004. Applied Smoothing Techniques for Data Analysis: The Kernel Approach with S-Plus Illustrations. Oxford University Press. 1--196 pages.Google ScholarGoogle Scholar
  4. Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Computing Surveys 43, 3 (2009), 1--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Junghoo Cho and Hector Garcia-Molina. 2003. Estimating frequency of change. ACM Transactions on Internet Technology 3, 3 (2003), 256--290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia. 2010. Who is tweeting on twitter: Human, bot, or cyborg? In Annual Computer Security Applications Conference (ACSAC). ACM, New York, NY, 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Alceu Ferraz Costa, Yuto Yamaguchi, Agma Juci Machado Traina, Caetano Traina Jr., and Christos Faloutsos. 2015. RSC: Mining and modeling temporal activity in social media. In International Conference on Knowledge Discovery and Data Mining. ACM, 269--278.Google ScholarGoogle Scholar
  8. Chris Drummond and Robert C. Holte. 2006. Cost curves: An improved method for visualizing classifier performance. Machine Learning 65 (2006), 95--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jean-Pierre Eckmann, Elisha Moses, and Danilo Sergi. 2004. Entropy of dialogues creates coherent structures in e-mail traffic. Search Results Proceedings of the National Academy of Sciences (PNAS) 101, 7 (2004), 14333--14337.Google ScholarGoogle ScholarCross RefCross Ref
  10. Stephan Günnemann, Nikou Günnemann, and Christos Faloutsos. 2014. Detecting anomalies in dynamic rating data: A robust probabilistic model for rating evolution. In International Conference on Knowledge Discovery and Data Mining (KDD). ACM, New York, NY, 841--850. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. César A. Hidalgo R. 2006. Conditions for the emergence of scaling in the inter-event time of uncorrelated and seasonal systems. Physica A 369, 2 (sep 2006), 877--883. Google ScholarGoogle ScholarCross RefCross Ref
  12. Paul Gerhard Hoel, Sidney C. Port, and Charles J. Stone. 1986. Introduction to Stochastic Processes. Waveland Pr. Inc. 203 pages.Google ScholarGoogle Scholar
  13. Alexander Ihler, Jon Hutchins, and Padhraic Smyth. 2006. Adaptive event detection with time-varying poisson processes. In International Conference on Knowledge Discovery and Data Mining (KDD). ACM, 207--216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Da-Cheng Juan, Lei Li, Huan-Kai Peng, Diana Marculescu, and Christos Faloutsos. 2014. Beyond poisson: Modeling inter-arrival time of requests in a datacenter. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Vol. 1. 198--209. Google ScholarGoogle ScholarCross RefCross Ref
  15. Márton Karsai, Kimmo Kaski, Albert-László Barabási, and János Kertész. 2012. Universal features of correlated bursty behaviour. Scientific Reports 2 (2012), 1--7. Google ScholarGoogle ScholarCross RefCross Ref
  16. Jon Kleinberg. 2003. Bursty and hierarchical structure in streams. In International Conference on Knowledge Discovery and Data Mining (KDD). ACM, 373--397.Google ScholarGoogle Scholar
  17. Narayanan C. Krishnan and Diane J. Cook. 2014. Activity recognition on streaming sensor data. Pervasive and Mobile Computing 10 (2014), 138--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Theodoros Lappas, Marcos R. Vieira, Dimitrios Gunopulos, and Vassilis J. Tsotras. 2012. On the spatiotemporal burstiness of terms. In Very Large Data Bases (VLDB). VLDB Endowment, 836--847. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Siyuan Liu, Lei Chen, and Lionel M Ni. 2014. Anomaly detection from incomplete data. Transactions on Knowledge Discovery from Data (TKDD) 9, 11 (2014), 11:1--11:22.Google ScholarGoogle Scholar
  20. R. Dean Malmgren, Jake M. Hofman, Luis A. N. Amaral, and Duncan J. Watts. 2009a. Characterizing individual communication patterns. In International Conference on Knowledge Discovery and Data Mining (KDD). ACM, 607--616. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Dean Malmgren, D. B. Stouffer, A. S. L. O. Campanharo, and Luis A. N. Amaral. 2009b. On universality in human correspondence activity. Science 325 (2009), 1696--1700. Google ScholarGoogle ScholarCross RefCross Ref
  22. R. Dean Malmgren, Daniel B. Stouffer, Adilson E. Motter, and Luís A. N. Amaral. 2008. A poissonian explanation for heavy tails in e-mail communication. Proceedings of the National Academy of Sciences (PNAS) 105, 47 (2008), 18153--18158. Google ScholarGoogle ScholarCross RefCross Ref
  23. Donald W. Marquardt. 1963. An algorithm for least-squares estimation of nonlinear parameters. Journal of the Society for Industrial and Applied Mathematics 11, 2 (1963), 431--441. Google ScholarGoogle ScholarCross RefCross Ref
  24. João Gama Oliveira and Albert-László Barabási. 2005. Human dynamics: Darwin and Einstein correspondence patterns. Nature 437 (2005), 1251. Google ScholarGoogle ScholarCross RefCross Ref
  25. Raphael Ottoni, Diego Las Casas, João Paulo Pesce, Wagner Meira Jr., Christo Wilson, Alan Mislove, and Virgilio Aleida. 2014. Of pins and tweets: Investigating how users behave across image-and text-based social networks. AAAI Conference on Weblogs and Social Media. AAAI Press, Ann Arbor, MI, USA, 386--395.Google ScholarGoogle Scholar
  26. Suhas Ranganath, Fred Morstatter, Xia Hu, Jiliang Tang, Suhang Wang, and Huan Liu. 2016. Predicting online protest participation of social media users. AAAI Conference on Artificial Intelligence. AAAI Press, Phoenix, AZ, USA, 208--214.Google ScholarGoogle Scholar
  27. Erich Schubert, Arthur Zimek, and Hans Peter Kriegel. 2014. Local outlier detection reconsidered: A generalized view on locality with applications to spatial, video, and network outlier detection. Data Mining and Knowledge Discovery 28, 1 (2014), 190--237. DOI:http://dx.doi.org/10.1007/s10618-012-0300-z Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Ka Cheung Sia, Junghoo Cho, and Hyun-Kyu Cho. 2007. Efficient monitoring algorithm for fast news alerts. Transactions on Knowledge and Data Engineering (TKDE) 19, 7 (2007), 950--961. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mikalai Tsytsarau, Themis Palpanas, and Malu Castellanos. 2014. Dynamics of news events and social media reaction. In International Conference on Knowledge Discovery and Data Mining (KDD). ACM, New York, NY, 901--910. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Pedro O. S. Vaz de Melo, Christos Faloutsos, Renato Assunção, Rodrigo Alvez, and Antonio A. F. Loureiro. 2015. Universal and distinct properties of communication dynamics: How to generate realistic inter-event times. Transactions on Knowledge Discovery from Data (TKDD) 9, 3 (2015), 24:1--24:31.Google ScholarGoogle Scholar
  31. Pedro O. S. Vaz de Melo, Christos Faloutsos, Renato Assunção, and Antonio A. F. Loureiro. 2013. The self-feeding process: A unifying model for communication dynamics in the web. In International Conference on World Wide Web. 1319--1330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Rose Yu, Xinran He, and Yan Liu. 2015. GLAD: Group anomaly detection in social media analysis. In Transactions on Knowledge Discovery from Data (TKDD), vol. 10. 18:1--18:21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Reza Zafarani and Huan Liu. 2015. 10 Bits of surprise: Detecting malicious users with minimum information. In International on Conference on Information and Knowledge Management (CIKM). 423--431.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Chao Michael Zhang and Vern Paxson. 2011. Detecting and analyzing automated activity on twitter. International Conference on Passive and Active Measurement. Springer-Verlag, Atlanta, GA, USA, 102--111. Google ScholarGoogle ScholarCross RefCross Ref
  35. Hengshu Zhu, Hui Xiong, Yong Ge, and Enhong Chen. 2015. Discovery of ranking fraud for mobile apps. Transactions on Knowledge and Data Engineering (TKDE) 27, 1 (2015), 74--87. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Modeling Temporal Activity to Detect Anomalous Behavior in Social Media

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Knowledge Discovery from Data
      ACM Transactions on Knowledge Discovery from Data  Volume 11, Issue 4
      Special Issue on KDD 2016 and Regular Papers
      November 2017
      419 pages
      ISSN:1556-4681
      EISSN:1556-472X
      DOI:10.1145/3119906
      • Editor:
      • Jie Tang
      Issue’s Table of Contents

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 July 2017
      • Accepted: 1 March 2017
      • Revised: 1 October 2016
      • Received: 1 January 2016
      Published in tkdd Volume 11, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader