DocumentCode :
3071210
Title :
Frustrate Twitter from automation: How far a user can be trusted?
Author :
Sivanesh, S. ; Kavin, K. ; Hassan, A. Abul
Author_Institution :
Regional Center, Dept. of Comput. Sci. & Eng., Anna Univ., Tiruchirappalli, India
fYear :
2013
fDate :
23-24 Aug. 2013
Firstpage :
1
Lastpage :
5
Abstract :
In recent years, the popularity of social networking sites proves a lofty raise in their users. Twitter, a micro blogging service less than seven years old, commands more than 500 million users as of July 2012 and is still growing fast. In Twitter, users exchange their ideas through a text based posts called tweets which can have maximum 140 characters. The prevalence and open structure of Twitter paved a way for automated programs, known as bots, which becomes a tremendous threat for its users. In this paper, we differentiate the trustworthy human users and the automated programs (bots) to make the user understand with whom they are interacting with. We developed a few sample of bot programs to compare their characteristics with the characteristics of normal human user. We observed the difference among human and bot in terms of tweeting behavior, tweet content, account properties and its networking flow characteristics. Based on the experimental results, we effectively differentiate the users into human and bot.
Keywords :
invasive software; social networking (online); trusted computing; Twitter; account properties; bot programs; microblogging service; networking flow characteristics; social networking sites; text based posts; tweet content; tweeting behavior; Automation; Conferences; Feature extraction; Flow graphs; Internet; Twitter; Bot Security; Network; Twitter; classification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Human Computer Interactions (ICHCI), 2013 International Conference on
Conference_Location :
Chennai
Type :
conf
DOI :
10.1109/ICHCI-IEEE.2013.6887787
Filename :
6887787
Link To Document :
بازگشت