Detection of Malicious Social Bots Using Learning Automata with URL Features in Twitter Network

Authors

  • M Nithin Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author
  • Meer Eshak Ahammad Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author
  • Nichenametla Shashank Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author
  • Shaik Hyder Ali Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author
  • K.Mudduswamy Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author

DOI:

https://doi.org/10.32628/CSEIT2511317

Abstract

With the rapid growth of social media platforms like Twitter, malicious social bots have become a significant threat, capable of manipulating public opinion, spreading misinformation, and launching cyber-attacks. These bots often mimic human behavior, making their detection a challenging task. This project proposes a novel approach to detect malicious social bots on Twitter by leveraging Learning Automata in combination with URL-based features extracted from user-generated content. The methodology involves analyzing embedded URLs in tweets—such as domain reputation, frequency, and redirection patterns—to identify abnormal behavior commonly associated with bot activity. Learning Automata, a reinforcement learning technique, is employed to adaptively improve the classification of accounts as benign or malicious over time. The proposed model is trained and evaluated on real-world Twitter datasets, demonstrating improved accuracy and adaptability compared to traditional machine learning classifiers. This work contributes to the ongoing efforts in social media security by offering a dynamic, scalable, and feature-rich solution for identifying and mitigating the threat posed by malicious social bots.

Downloads

Download data is not yet available.

References

P. Shi, Z. Zhang, and K.-K.-R. Choo, “Detecting malicious social bots basedonclickstreamsequences,”IEEEAccess,vol.7,pp.28855–28862, 2019.

G.Lingam,R.R.Rout,andD.V.L.N.Somayajulu,“Adaptivedeep Q-learning model for detecting social bots and influential users inonline social networks,” Appl. Intell., vol. 49, no. 11, pp. 3947–3964, Nov. 2019.

D.Choi, J.Han,S.Chun,E.Rappos,S.Robert,and T. T. Kwon, “Bit.ly/practice: Uncovering content publishing and sharingthroughURLshorteningservices,”TelematicsInform.,vol.35, no. 5, pp. 1310–1323, 2018.

S.LeeandJ.Kim,“Fluxingbotnetcommandandcontrolchannels with URL shortening services,” Comput. Commun., vol. 36, no. 3, pp.320–332,Feb.2013.

S.MadisettyandM.S.Desarkar,“Aneuralnetwork-basedensemble approach for spam detection in Twitter,” IEEE Trans. Comput. Social Syst., vol. 5, no. 4, pp. 973–984, Dec. 2018.

H.B .Kazemian and S.Ahmed,“Comparisons of machine learning Techniquesfordetectingmaliciouswebpages,”ExpertSyst.Appl.,vol.42, no. 3, pp. 1166–1177, Feb. 2015.

H.Gupta,M.S.Jamal,S.Madisetty,andM.S.Desarkar,“Aframework for real-time spam detection in Twitter,” in Proc. 10th Int. Conf. Commun.Syst.Netw.(COMSNETS),Jan.2018,pp.380–383.

T.Wu,S.Liu,J.Zhang,andY. Xiang,“Twitterspamdetection basedondeeplearning,”inProc.Australas.Comput.Sci.WeekMulticonf. (ACSW), 2017, p. 3.

Y.Boshmaf,I.Muslukhov,K.Beznosov,andM.Ripeanu,“Key challengesin defendingagainst malicioussocialbots,”Presented at the 5thUSENIXWorkshopLarge-ScaleExploitsEmergentThreats,2012, pp.1–4.

G.Yan,“Peri-watchdog:Huntingforhiddenbotnetsintheperiphery of online social networks,” Comput. Netw., vol. 57, no. 2, pp. 540–555, Feb. 2013. D.Canali,M.Cova,G.Vigna,andC.Kruegel,“Prophiler:Afastfilter for the large-scale detection of malicious Web pages,” in Proc. 20th Int. Conf. World Wide Web (WWW), 2011, pp. 197–206.

Downloads

Published

08-05-2025

Issue

Section

Research Articles