Show simple item record

dc.contributor.authorLatah, Majd
dc.date.accessioned2020-11-17T10:26:51Z
dc.date.available2020-11-17T10:26:51Z
dc.date.issued2020-08-01
dc.identifier.issn0957-4174en_US
dc.identifier.urihttp://hdl.handle.net/10679/7111
dc.identifier.urihttps://www.sciencedirect.com/science/article/abs/pii/S0957417420302074
dc.description.abstractSocial hots represent a new generation of hots that make use of online social networks (OSNs) as command and control (C&C) channels. Malicious social hots have been used as tools for launching large-scale spam campaigns, promoting low-cap stocks, manipulating users' digital influence, and conducting political astroturfing. Recent studies in this area either focus only on general security issues related to social networks or on coarse-grained categorization to support detection approaches. This survey aims to provide a comprehensive analysis from a social network perspective. To this end, we first categorize social bot attacks at different stages, then provide an overview of different types of social hots. Next, we propose a refined taxonomy that shows how different techniques within a category are related or differ from each other, followed by a detailed discussion of the strengths and limitations of each method. Following this, we review the existing datasets and summarize the results of empirical investigations. Finally, we highlight the limitations of existing detection approaches and suggest future directions for further improvement. Our study should help OSN administrators and researchers understand the destructive potential of malicious social hots and improve upon the current defensive strategies.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.relation.ispartofExpert Systems with Applications
dc.rightsrestrictedAccess
dc.titleDetection of malicious social bots: A survey and a refined taxonomyen_US
dc.typeReviewen_US
dc.publicationstatusPublisheden_US
dc.contributor.departmentÖzyeğin University
dc.identifier.volume151en_US
dc.identifier.wosWOS:000530070100020
dc.identifier.doi10.1016/j.eswa.2020.113383en_US
dc.subject.keywordsSecurityen_US
dc.subject.keywordsOnline social networksen_US
dc.subject.keywordsSocial botsen_US
dc.subject.keywordsTaxonomyen_US
dc.subject.keywordsMalicious behavioren_US
dc.identifier.scopusSCOPUS:2-s2.0-85082019787
dc.contributor.ozugradstudentLatah, Majd
dc.contributor.authorMale1
dc.relation.publicationcategoryReview - Institutional PhD Student


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record


Share this page