Academia.eduAcademia.edu

Outline

The DARPA Twitter Bot Challenge

2016, Computer

https://doi.org/10.1109/MC.2016.183

Abstract

A number of organizations ranging from terrorist groups such as ISIS to politicians and nation states reportedly conduct explicit campaigns to influence opinion on social media, posing a risk to democratic processes. There is thus a growing need to identify and eliminate "influence bots"-realistic, automated identities that illicity shape discussion on sites like Twitter and Facebook-before they get too influential. Spurred by such events, DARPA held a 4-week competition in February/March 2015 in which multiple teams supported by the DARPA Social Media in Strategic Communications program competed to identify a set of previously identified "influence bots" serving as ground truth on a specific topic within Twitter. Past work regarding influence bots often has difficulty supporting claims about accuracy, since there is limited ground truth (though some exceptions do exist [3,7]). However, with the exception of [3], no past work has looked specifically at identifying influence bots on a specific topic. This paper describes the DARPA Challenge and describes the methods used by the three top-ranked teams.

References (32)

  1. Dickerson, J. P., Kagan, V., & Subrahmanian, V. S. (2014, August). Using sentiment to detect bots on Twitter: Are humans more opinionated than bots?. In Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on (pp. 620--627). IEEE.
  2. Kata, A. (2012). Anti--vaccine activists, Web 2.0, and the postmodern paradigm-An overview of tactics and tropes used online by the anti--vaccination movement. Vaccine, 30(25), 3778-- 3789.
  3. K. Lee, B. D. Eoff, and J. Caverlee, "Seven months with the devils: a long--term study of content polluters on Twitter," in AAAI International Conference on Weblogs and Social Media, 2011.
  4. Kagan, V., Stevens, A. and Subrahmanian, V.S.. Using Twitter Sentiment to Forecast the 2013 Pakistani Election and the 2014 Indian Election. IEEE Intelligent Systems, pp. 2--5, Jan-- Feb 2015.
  5. Danezis, G. and Mittal, P. "SybilInfer: Detecting sybil nodes using social networks," in Network and Distributed System Security Symposium (NDSS), 2009.
  6. Yu, H., Kaminsky, M., Gibbons, P. B., & Flaxman, A. (2006, September). Sybilguard: defending against sybil attacks via social networks. In ACM SIGCOMM Computer Communication Review (Vol. 36, No. 4, pp. 267--278). ACM.
  7. Weizenbaum, J. (1966). ELIZA-a computer program for the study of natural language communication between man and machine. Communications of the ACM, 9(1), 36--45.
  8. Simmons, R. F. (1970). Natural language question--answering systems: 1969. Communications of the ACM, 13(1), 15--30.
  9. Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. "Detecting automation of Twitter accounts: Are you a human, bot, or cyborg?" IEEE Transactions on Dependable and Secure Computing, Vol. 9, no. 6, pp. 811-824, 2012.
  10. Blei, D. M., Ng, A. Y., & Jordan, M. I. (2003). Latent dirichlet allocation. Journal of Machine Learning research, 3, 993--1022.
  11. Subrahmanian, V. S., & Reforgiato, D. (2008). AVA: Adjective--verb--adverb combinations for sentiment analysis. Intelligent Systems, IEEE, 23(4), 43--50.
  12. Cesarano, C., Dorr, B., Picariello, A., Reforgiato, D., Sagoff, A., & Subrahmanian, V. (2004). Oasys: An opinion analysis system. In AAAI spring symposium on computational approaches to analyzing weblogs.
  13. Hong, L. and Davison, B.D. Empirical study of topic modeling in twitter. In Workshop on Social Media Analytics, 2010.
  14. Cai, D. A. (2011). Graph Regularized Nonnegative Matrix Factorization for Data Representation. IEEE Trans. Pattern Anal. Mach. Intell., 1548----1560.
  15. Kriegel, H. P., & Pfeifle, M. (2005, August). Density--based clustering of uncertain data. In Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining (pp. 672--677). ACM.
  16. Ratkiewicz, J., Conover, M., Meiss, M., Gonçalves, B., Patil, S., Flammini, A., & Menczer, F. (2011, March). Truthy: mapping the spread of astroturf in microblog streams. In Proceedings of the 20th international conference companion on World wide web (pp. 249--252). ACM.
  17. P.R. Gregory. Inside Putin's Campaign Of Social Media Trolling And Faked Ukrainian Crimes, Forbes.com, May 11 2014, http://www.forbes.com/sites/paulroderickgregory/2014/05/11/inside--putins--campaign--of-- social--media--trolling--and--faked--ukrainian--crimes/
  18. Yoav Freund and Robert E. Schapire (1997). A decision--theoretic generalization of online learning and an application to boosting. Journal of Computer and System Sciences; 55(1):119----139.
  19. Linhong Zhu, Aram Galstyan, James Cheng, Kristina Lerman, "Tripartite Graph Clustering for Dynamic Sentiment Analysis on Social Media ", in Proc. of SIGMOD'14, 2014.
  20. R. Ghosh, T. Surachawala, and K. Lerman, "Entropy--based Classification of 'Retweeting' Activity on Twitter," in SNA--KDD, 2011.
  21. Greg Ver Steeg and Aram Galstyan, "Information Transfer in Social Media," in Proc. of WWW'12, 2012.
  22. Vincent D Blondel, Jean--Loup Guillaume, Renaud Lambiotte, Etienne Lefebvre, "Fast unfolding of communities in large networks", Vincent D Blondel, Jean--Loup Guillaume, Renaud Lambiotte, Etienne Lefebvre, Journal of Statistical Mechanics: Theory and Experiment 2008 (10), P10008 (12pp) doi: 10.1088/1742--5468/2008/10/P10008.
  23. Kumar, S., Spezzano, F., & Subrahmanian, V. S. (2014, August). Accurately detecting trolls in Slashdot Zoo via decluttering. In Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on (pp. 188--195). IEEE.
  24. Shane, S., & Hubbard, B. ( Aug 20 2014). ISIS Displaying a Deft Command of Varied Media. New York Times, http://www.nytimes.com/2014/08/31/world/middleeast/isis--displaying--a-- deft--command--of--varied--media.html
  25. Breunig, M. M., Kriegel, H. P., Ng, R. T., & Sander, J. (2000, May). LOF: identifying density-- based local outliers. In ACM sigmod record (Vol. 29, No. 2, pp. 93--104). ACM.
  26. Aiello, L. M., Deplano, M., Schifanella, R., & Ruffo, G. (2012). People are Strange when you're a Stranger: Impact and Influence of Bots on Social Networks. Links, 697(483,151), 1-- 566.
  27. S. Lehmann and P. Sapieżyński. You're here Because of a Robot. http://sunelehmann.com/2013/12/04/youre--here--because--of--a--robot/
  28. Nissen, T. E. (2014). Terror.com: IS's Social Media Warfare in Syria and Iraq. Contemporary Conflicts: Military Studies Magazine, 2(2).
  29. V.S. Subrahmanian is a Professor of Computer Science, a past Director of the University of Maryland Institute for Advanced Computer Studies, and a founder of Sentimetrix.
  30. Amos Azaria is a postdoctoral researcher at Carnegie Mellon University in the Machine Learning department.
  31. Skylar Durst is a graduate student of Computer Science at the California Polytechnic State University (SLO) and full--time data architect at Sentimetrix Vadim Kagan is a technologist with over 30 years of experience in building large--scale systems; he is a founder and president of SentiMetrix Aram Galstyan is a Project Leader at the USC Information Sciences Institute and a Research Associate Professor of Computer Science at USC Kristina Lerman is a Project Leader at the Information Sciences Institute and holds a joint appointment as a Research Associate Professor in the USC Computer Science Department.
  32. Alessandro Flammini is an associate professor in the School of Informatics and Computing at Indiana University.