The Socialbot Network

When bots socialize for fame and money

Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

198 Citations (Scopus)

Abstract

Online Social Networks (OSNs) have become an integral part of today's Web. Politicians, celebrities, revolutionists, and others use OSNs as a podium to deliver their message to millions of active web users. Unfortunately, in the wrong hands, OSNs can be used to run astroturf campaigns to spread misinformation and propaganda. Such campaigns usually start off by infiltrating a targeted OSN on a large scale. In this paper, we evaluate how vulnerable OSNs are to a large-scale infiltration by socialbots: computer programs that control OSN accounts and mimic real users. We adopt a traditional web-based botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion. We operated such an SbN on Facebook-a 750 million user OSN-for about 8 weeks. We collected data related to users' behavior in response to a large-scale infiltration where socialbots were used to connect to a large number of Facebook users. Our results show that (1) OSNs, such as Facebook, can be infiltrated with a success rate of up to 80%, (2) depending on users' privacy settings, a successful infiltration can result in privacy breaches where even more users' data are exposed when compared to a purely public access, and (3) in practice, OSN security defenses, such as the Facebook Immune System, are not effective enough in detecting or stopping a large-scale infiltration as it occurs.

Original languageEnglish
Title of host publicationProceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011
Pages93-102
Number of pages10
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event27th Annual Computer Security Applications Conference, ACSAC 2011 - Orlando, FL, United States
Duration: 5 Dec 20119 Dec 2011

Other

Other27th Annual Computer Security Applications Conference, ACSAC 2011
CountryUnited States
CityOrlando, FL
Period5/12/119/12/11

Fingerprint

Infiltration
Immune system
Network security
Computer program listings

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Cite this

Boshmaf, Y., Muslukhov, I., Beznosov, K., & Ripeanu, M. (2011). The Socialbot Network: When bots socialize for fame and money. In Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011 (pp. 93-102) https://doi.org/10.1145/2076732.2076746

The Socialbot Network : When bots socialize for fame and money. / Boshmaf, Yazan; Muslukhov, Ildar; Beznosov, Konstantin; Ripeanu, Matei.

Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. 2011. p. 93-102.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Boshmaf, Y, Muslukhov, I, Beznosov, K & Ripeanu, M 2011, The Socialbot Network: When bots socialize for fame and money. in Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. pp. 93-102, 27th Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, United States, 5/12/11. https://doi.org/10.1145/2076732.2076746
Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M. The Socialbot Network: When bots socialize for fame and money. In Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. 2011. p. 93-102 https://doi.org/10.1145/2076732.2076746
Boshmaf, Yazan ; Muslukhov, Ildar ; Beznosov, Konstantin ; Ripeanu, Matei. / The Socialbot Network : When bots socialize for fame and money. Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. 2011. pp. 93-102
@inproceedings{fdd33d12e44346e480dcac57c3ab204a,
title = "The Socialbot Network: When bots socialize for fame and money",
abstract = "Online Social Networks (OSNs) have become an integral part of today's Web. Politicians, celebrities, revolutionists, and others use OSNs as a podium to deliver their message to millions of active web users. Unfortunately, in the wrong hands, OSNs can be used to run astroturf campaigns to spread misinformation and propaganda. Such campaigns usually start off by infiltrating a targeted OSN on a large scale. In this paper, we evaluate how vulnerable OSNs are to a large-scale infiltration by socialbots: computer programs that control OSN accounts and mimic real users. We adopt a traditional web-based botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion. We operated such an SbN on Facebook-a 750 million user OSN-for about 8 weeks. We collected data related to users' behavior in response to a large-scale infiltration where socialbots were used to connect to a large number of Facebook users. Our results show that (1) OSNs, such as Facebook, can be infiltrated with a success rate of up to 80{\%}, (2) depending on users' privacy settings, a successful infiltration can result in privacy breaches where even more users' data are exposed when compared to a purely public access, and (3) in practice, OSN security defenses, such as the Facebook Immune System, are not effective enough in detecting or stopping a large-scale infiltration as it occurs.",
author = "Yazan Boshmaf and Ildar Muslukhov and Konstantin Beznosov and Matei Ripeanu",
year = "2011",
doi = "10.1145/2076732.2076746",
language = "English",
isbn = "9781450306720",
pages = "93--102",
booktitle = "Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011",

}

TY - GEN

T1 - The Socialbot Network

T2 - When bots socialize for fame and money

AU - Boshmaf, Yazan

AU - Muslukhov, Ildar

AU - Beznosov, Konstantin

AU - Ripeanu, Matei

PY - 2011

Y1 - 2011

N2 - Online Social Networks (OSNs) have become an integral part of today's Web. Politicians, celebrities, revolutionists, and others use OSNs as a podium to deliver their message to millions of active web users. Unfortunately, in the wrong hands, OSNs can be used to run astroturf campaigns to spread misinformation and propaganda. Such campaigns usually start off by infiltrating a targeted OSN on a large scale. In this paper, we evaluate how vulnerable OSNs are to a large-scale infiltration by socialbots: computer programs that control OSN accounts and mimic real users. We adopt a traditional web-based botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion. We operated such an SbN on Facebook-a 750 million user OSN-for about 8 weeks. We collected data related to users' behavior in response to a large-scale infiltration where socialbots were used to connect to a large number of Facebook users. Our results show that (1) OSNs, such as Facebook, can be infiltrated with a success rate of up to 80%, (2) depending on users' privacy settings, a successful infiltration can result in privacy breaches where even more users' data are exposed when compared to a purely public access, and (3) in practice, OSN security defenses, such as the Facebook Immune System, are not effective enough in detecting or stopping a large-scale infiltration as it occurs.

AB - Online Social Networks (OSNs) have become an integral part of today's Web. Politicians, celebrities, revolutionists, and others use OSNs as a podium to deliver their message to millions of active web users. Unfortunately, in the wrong hands, OSNs can be used to run astroturf campaigns to spread misinformation and propaganda. Such campaigns usually start off by infiltrating a targeted OSN on a large scale. In this paper, we evaluate how vulnerable OSNs are to a large-scale infiltration by socialbots: computer programs that control OSN accounts and mimic real users. We adopt a traditional web-based botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion. We operated such an SbN on Facebook-a 750 million user OSN-for about 8 weeks. We collected data related to users' behavior in response to a large-scale infiltration where socialbots were used to connect to a large number of Facebook users. Our results show that (1) OSNs, such as Facebook, can be infiltrated with a success rate of up to 80%, (2) depending on users' privacy settings, a successful infiltration can result in privacy breaches where even more users' data are exposed when compared to a purely public access, and (3) in practice, OSN security defenses, such as the Facebook Immune System, are not effective enough in detecting or stopping a large-scale infiltration as it occurs.

UR - http://www.scopus.com/inward/record.url?scp=84855692796&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84855692796&partnerID=8YFLogxK

U2 - 10.1145/2076732.2076746

DO - 10.1145/2076732.2076746

M3 - Conference contribution

SN - 9781450306720

SP - 93

EP - 102

BT - Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011

ER -