Botnet Identification on Twitter: A Novel Clustering Approach Based on Similarity
Due to Twitter's potential reach and influence, malicious automated accounts and services have been operating and growing without control. One of the most recognizable is the bot, a piece of programming or automated system reproducing an assignment constantly over time. The bots' owners ca...
Saved in:
Published in: | IEEE access Vol. 12; pp. 149130 - 149146 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
Piscataway
IEEE
2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Due to Twitter's potential reach and influence, malicious automated accounts and services have been operating and growing without control. One of the most recognizable is the bot, a piece of programming or automated system reproducing an assignment constantly over time. The bots' owners can also coordinate them into botnets to increase their capabilities and impact on the platform. In the literature, botnet detection on Twitter is a relatively under-researched topic where researchers need complete and updated collections, as many of the botnets currently reported are outdated or incomplete. Despite Twitter's best efforts to mitigate the botnets' presence by issuing restrictions and bans, they are insufficient due to their accelerated creation and expansion. Therefore, we propose a solution employing an updated botnet collection that identifies with high certainty which botnets a set of bots belongs to. Our experimentation showed that our solution labeled the botnets accurately, achieving an outstanding performance with unknown botnets in most of our experiments and when compared with other works from the literature. We also proved that our solution obtained its best scores without relying on a specific algorithm or configuration. |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2024.3471630 |