Swati Vashisht, Sushil Kumar Gupta, Atul Fegade, S. Dhondiyal, Rohit Kumar, G. Revathy
{"title":"借助Twitter上的学习自动机检测恶意社交机器人","authors":"Swati Vashisht, Sushil Kumar Gupta, Atul Fegade, S. Dhondiyal, Rohit Kumar, G. Revathy","doi":"10.1109/IC3I56241.2022.10073346","DOIUrl":null,"url":null,"abstract":"Violent social bots automate social interactions, create fictitious profiles to spread destructive propaganda, or assume the identities of followers to make misleading tweets. Furthermore, malicious social bots disseminate malicious root URLs, which reroute requests from online social media agents to certain malicious servers. Therefore, one of the most crucial jobs of the Twitter network is to distinguish between actual drug users and active social bots. Instead of taking as long to remove as social graph-based features, URL-based features can identify the cruel conduct of social bots. It’s difficult for malicious social bots to change URL redirect chains. This part offers a literacy automaton-grounded vicious social bot discovery (LA-MSBD) for safe (drug) agents on the Twitter network by fusing URL-based functionality with a trust computation model. The research discussed in this paper focuses on designing, utilizing, and evaluating robotic sensors based on deep literacy models rather than adding metadata about position or birthpoint counting. This paper also demonstrates how deep literacy models can compete with conventional machine-ability idioms. The findings of this study demonstrate that in-depth comprehension models can be made more complex by utilizing pre-trained models.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"69 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection of Malicious Social Bots with the Aid of Learning Automata on Twitter\",\"authors\":\"Swati Vashisht, Sushil Kumar Gupta, Atul Fegade, S. Dhondiyal, Rohit Kumar, G. Revathy\",\"doi\":\"10.1109/IC3I56241.2022.10073346\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Violent social bots automate social interactions, create fictitious profiles to spread destructive propaganda, or assume the identities of followers to make misleading tweets. Furthermore, malicious social bots disseminate malicious root URLs, which reroute requests from online social media agents to certain malicious servers. Therefore, one of the most crucial jobs of the Twitter network is to distinguish between actual drug users and active social bots. Instead of taking as long to remove as social graph-based features, URL-based features can identify the cruel conduct of social bots. It’s difficult for malicious social bots to change URL redirect chains. This part offers a literacy automaton-grounded vicious social bot discovery (LA-MSBD) for safe (drug) agents on the Twitter network by fusing URL-based functionality with a trust computation model. The research discussed in this paper focuses on designing, utilizing, and evaluating robotic sensors based on deep literacy models rather than adding metadata about position or birthpoint counting. This paper also demonstrates how deep literacy models can compete with conventional machine-ability idioms. The findings of this study demonstrate that in-depth comprehension models can be made more complex by utilizing pre-trained models.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"69 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10073346\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10073346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of Malicious Social Bots with the Aid of Learning Automata on Twitter
Violent social bots automate social interactions, create fictitious profiles to spread destructive propaganda, or assume the identities of followers to make misleading tweets. Furthermore, malicious social bots disseminate malicious root URLs, which reroute requests from online social media agents to certain malicious servers. Therefore, one of the most crucial jobs of the Twitter network is to distinguish between actual drug users and active social bots. Instead of taking as long to remove as social graph-based features, URL-based features can identify the cruel conduct of social bots. It’s difficult for malicious social bots to change URL redirect chains. This part offers a literacy automaton-grounded vicious social bot discovery (LA-MSBD) for safe (drug) agents on the Twitter network by fusing URL-based functionality with a trust computation model. The research discussed in this paper focuses on designing, utilizing, and evaluating robotic sensors based on deep literacy models rather than adding metadata about position or birthpoint counting. This paper also demonstrates how deep literacy models can compete with conventional machine-ability idioms. The findings of this study demonstrate that in-depth comprehension models can be made more complex by utilizing pre-trained models.