Sockpuppet gang detection on social media sites

Dong LIU , Quanyuan WU , Weihong HAN , Bin ZHOU

Front. Comput. Sci. ›› 2016, Vol. 10 ›› Issue (1) : 124 -135.

PDF (529KB)
Front. Comput. Sci. ›› 2016, Vol. 10 ›› Issue (1) : 124 -135. DOI: 10.1007/s11704-015-4287-7
RESEARCH ARTICLE

Sockpuppet gang detection on social media sites

Author information +
History +
PDF (529KB)

Abstract

Users of social media sites can use more than one account. These identities have pseudo anonymous properties,and as such some users abuse multiple accounts to perform undesirable actions, such as posting false or misleading remarks comments that praise or defame the work of others.The detection of multiple user accounts that are controlled by an individual or organization is important. Herein, we define the problem as sockpuppet gang (SPG) detection. First, we analyze user sentiment orientation to topics based on emotional phrases extracted from their posted comments. Then we evaluate the similarity between sentiment orientations of user account pairs, and build a similar-orientation network (SON) where each vertex represents a user account on a social media site. In an SON, an edge exists only if the two user accounts have similar sentiment orientations to most topics. The boundary between detected SPGs may be indistinct, thus by analyzing account posting behavior features we propose a multiple random walk method to iteratively remeasure the weight of each edge. Finally, we adopt multiple community detection algorithms to detect SPGs in the network. User accounts in the same SPG are considered to be controlled by the same individual or organization. In our experiments on real world datasets, our method shows better performance than other contemporary methods.

Keywords

social media site / sockpuppet gang detection / sentiment orientation / user behavior feature

Cite this article

Download citation ▾
Dong LIU, Quanyuan WU, Weihong HAN, Bin ZHOU. Sockpuppet gang detection on social media sites. Front. Comput. Sci., 2016, 10(1): 124-135 DOI:10.1007/s11704-015-4287-7

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Andrew M. Whole foods executive used alias. New York Times, 2007,12

[2]

Lea R, Taylor M. Historian Orlando Figes admits posting Amazon reviews that trashed rivals. The Guardian, 2010

[3]

Eligon J. Dispute over dead sea scrolls leads to a jail sentence. New York Times, 2010

[4]

Olivier D, Anderson A, Corney M, Mohay G. Mining e-mail content for author identification forensic. ACMSIGMOD Record, 2001, 30(4):55–64

[5]

Corney M. Analyzing e-mail text authorship for forensic purpose. MasDong ter’s Thesis. Australia: University of Software Engineering and Data Communications, 2003

[6]

Abbasi A, Chen H.Writeprints: a stylemetric approach to identity-level identification and similarity detection in cyberspace. ACM Transaction on Information System, 2008, 26(2): 14–24

[7]

RevettK. Behavioral Biometrics: A Remote Access Approach. Chichester:John Wiley & Sons, 2008

[8]

Gao H, Hu J,Wilson C, Li Z C, Chen Y, Zhao B. Detecting and characterizing social spam campaigns. In: Proceedings of the Internet Measurement Conference. 2010, 35–47

[9]

Thomas K, Grier C, Ma J, Paxon Y. Design and evaluation of a realtime URL spam filtering service. In: Proceedings of the 32nd IEEE Symposium on Security and Privacy. 2011

[10]

Yang C, Harkreader R, Zhang J, Shin S, Gu G. Analyzing spammers’social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st International Conference on World Wide Web. 2012, 71–80

[11]

Newman M, Girvan M. Finding and evaluating community structure in networks. Physical Review E, 2004, 69(2): 26113

[12]

Fortunato S, Latora V, Marchiori M. A Method to find community structure based on information centrality. Physical Review E, 2004,70(5): 056104

[13]

Rosvall M and Bergstrom C. An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Acadmy of the United States of America, 2007, 104(18):7327–7331

[14]

Solorio T, Hason R, Mizan M. A case study of sockpuppet detection in wikipedia. In: Proceedings of the Workshop on Language Analysis in Social Media. 2013, 59–68

[15]

Thamar S, Ragib H and Mainul M. Sockpuppet detection in wikipedia:a corpus of real-world deceptive writing for linking identities. In: Proceedings of the 9th International Conference on Language Resources and Evaluation. 2014, 26–31

[16]

Zheng X, Lai Y, Chow K, Hui L C K, Yiu S M. Sockpuppet detection in online discussion forums. In: Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 2011, 374–377

[17]

Bu Z, Xia Z and Wang J. A sock puppet detection algorithm on virtual spaces. Knowledge-Based Systems, 2013, 37:366–377

[18]

Ding X, Liu B and Philip Y. A holistic lexicon-based approach to opinion mining. In: Proceedings of the International Conference on Web Search and Web Data Mining. 2008, 231–240

[19]

Gregory S. Finding overlapping communities in networks by label propagation. In: Proceedings of the 1st International Workshop on Complex Networks. 2009, 47–61

[20]

Blondel V, Guillaume J, Lambiotte R, Lefebvre E. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008, 1–12

RIGHTS & PERMISSIONS

Higher Education Press and Springer-Verlag Berlin Heidelberg

AI Summary AI Mindmap
PDF (529KB)

Supplementary files

Supplementary Material-Highlights in 3-page ppt

1410

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/