SlideShare a Scribd company logo
Detecting Malicious Social Bots
Based on Click stream Sequences
RAMPELLY ROSHINI (19S41A0576)
MOHAMMED SUFIYAN (19S41A0559)
THATIKONDA SUMANVITHA (19S41A0592)
REVELLI UDAYKIRAN (19S41A0578)
INTERNAL GUIDE
Dr.N.Chandramouli
• Social bots have been used to perform automated analytical services and
provide users with improved quality of service. However, malicious social
bots have also been used to disseminate false information (e.g., fake news),
and this can result in real-world consequences. These features are easily
imitated by social bots; thereby resulting in low accuracy of the analysis.
• A novel method of detecting malicious social bots, including both features
selection based on the transition probability of clickstream sequences and
semi-supervised clustering, is presented in this paper
Introduction:
Existing system:
• Malicious users in social network platforms are likely to exhibit
behavior patterns that different from normal users, because their
goals in maximizing their own needs and purposes (e.g., promote a
certain product or certain political beliefs or ideology).
• User behavior analysis is not only helpful in gaining an in-depth
understanding of user intent, but it is also important to the
detection of malicious social bots' accounts in online social
networks.
• A total of 450 thousand items of data were collected from July 1 to
September 30, 2022.These data were clickstream data of normal users
and social bots on CyVOD.
• It includes user information viewing, video broadcasting, comment
related behaviors, friend related behaviors, comment releasing in circles,
and other related behaviors.
Proposed System:
System Requirements
Software Requirements:
• Coding Language : JAVA
 Application Server : Tomcat 5.0
 Operating System : Windows XP
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql 5.0
 Database Connectivity : JDBC.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 1 TB.
• Ram : 2 GB.
UML DIAGRAM:
Fig: Use case Diagram detection of malicious bots
1. OSN Server:
• In this module, the OSN Server has to login by using valid user name and
password.
• After login successful he can do some operations such as view all user
details and authorize them, list of all friends requests and response ,View
all posts like images and messages user, view all Similar group users like
doctors, Engineers, Business Man, etc.,.
• OSN Server can add some BOTS words to the database and view the all
words added by him and based on that negative words admin can find all
users behavior and also produce chart for that behavior words.
MODULES
• Types of modules:
1.OSN Server
2.USER
2. User:
• In this module, there are n numbers of users are present.
• User should register with group option before doing some operations.
After registration successful he has to wait for admin to authorize him
and after admin authorized user can login by using authorized user
name and password.
• Login successful he will do some operations like view profile details,
Search friends based on keyword or friends name, view the friend
requests, post message with image to all friends. Find posts of friends
and comment on that posts.
Fig 1: OSN Login
• The OSN main page is an admin page. Admin has to login through credentials.
Admin can anticioate the users activites like users posts, users comments and detects
malicious bots which was posted by users.
Fig 2: Registration page
• In Registration page we have to enter the details to register as a user. After
Giving the details user has to click register tab. Now the admin has to authorize
the new user. After authorization now user is successfully registered.
Fig 3: Users List
• The above page can shows number of users list which was authorised by admin. The
user has been specialised in their group. This page is administered by admin and can
also observes users activity.
Fig 4: Search Friends
• This page allows users to search their friends by entering name. If user has account in it
then the page will shows the users profile. If not the page will shows a message like user
is not found.
Fig 5: Friends page
• The searched user profile has been displayed after entering the name. Now the user
can send the request to his friend. After this user can see the posts of his friend and
can also comment on his posts.
Fig 6: Post details
• The above picture describes about the user’s shared post which includes post title, post
description, post speciality message, posted date .Here we can also add pictures to the
shared post.
Fig 7: Users bots behaviour
• Users bots behaviour includes details of the specified users detected by admin. The page
will have user name, comments, bad type, used bot words, total bot words found.
Fig 8: List of bot words
• Here we can find the list of bot words which was previously listed by the admin.
Here we can find the types of bot words used by users.
Fig 9: Analyzing the data of malicious bots through bar graph
• The frequency of bot type words posted or used can be Analysed through the
bar graphs.
Advantages
• Transition probability of user behavior clickstreams increases by an average of
12.8%, in comparison to the detection method based on quantitative analysis of user
behavior.
Disadvantages
• In online social networks, social bots are social accounts controlled by automated
programs that can perform corresponding operations based on a set of procedures.
CONCLUSION
• We proposed a novel method to accurately detect malicious social bots in
online social networks. Experiments showed that transition probability
between user click streams based on the social situation analytics can be
used to detect malicious social bots in online social platforms accurately.
In future research, additional behaviors of malicious social bots will be
further considered and the proposed detection approach will be extended
and optimized to identify specific intentions and purposes of a broader
range of malicious social bots.
1.F. Morstatter, L. Wu, T. H. Nazer, K. M. Carley, and H. Liu,
``A new approach to bot detection: Striking the balance between
precision and recall,'' in Proc. IEEE/ACM Int. Conf. Adv. Social
Netw Mining,San Francisco, CA, USA, Aug. 2016, pp. 533_540.
2.C. A. De Lima Salge and N. Berente, ``Is that social bot
behaving unethically?''Commun. ACM, vol. 60, no. 9, pp. 29_31,
Sep. 2017.
REFERENCES
THANK YOU!
SEMINAR PRESENTED BY:
TEAM 2
CSE-B

More Related Content

What's hot

Supervised Machine Learning
Supervised Machine LearningSupervised Machine Learning
Supervised Machine Learning
Ankit Rai
 
B.E Project: Detection of Bots on Twitter
B.E Project: Detection of Bots on TwitterB.E Project: Detection of Bots on Twitter
B.E Project: Detection of Bots on Twitter
Mufaddal Haidermota
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
Ashish Arora
 
Machine Learning Interview Questions and Answers | Machine Learning Interview...
Machine Learning Interview Questions and Answers | Machine Learning Interview...Machine Learning Interview Questions and Answers | Machine Learning Interview...
Machine Learning Interview Questions and Answers | Machine Learning Interview...
Edureka!
 
Twitter sentiment analysis ppt
Twitter sentiment analysis pptTwitter sentiment analysis ppt
Twitter sentiment analysis ppt
AntaraBhattacharya12
 
Multi Layer Perceptron & Back Propagation
Multi Layer Perceptron & Back PropagationMulti Layer Perceptron & Back Propagation
Multi Layer Perceptron & Back Propagation
Sung-ju Kim
 
deep learning
deep learningdeep learning
deep learning
Hassanein Alwan
 
social network analysis project twitter sentimental analysis
social network analysis project twitter sentimental analysissocial network analysis project twitter sentimental analysis
social network analysis project twitter sentimental analysis
Ashish Mundra
 
Artificial Neural Network Paper Presentation
Artificial Neural Network Paper PresentationArtificial Neural Network Paper Presentation
Artificial Neural Network Paper Presentation
guestac67362
 
Introduction to Complex Networks
Introduction to Complex NetworksIntroduction to Complex Networks
Introduction to Complex Networks
Hossein A. (Saeed) Rahmani
 
Types and roles
Types and rolesTypes and roles
Types and roles
Satyamevjayte Haxor
 
Deep learning tutorial 9/2019
Deep learning tutorial 9/2019Deep learning tutorial 9/2019
Deep learning tutorial 9/2019
Amr Rashed
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
 
Cat and dog classification
Cat and dog classificationCat and dog classification
Cat and dog classification
omaraldabash
 
Image Classification using deep learning
Image Classification using deep learning Image Classification using deep learning
Image Classification using deep learning
Asma-AH
 
Using binary classifiers
Using binary classifiersUsing binary classifiers
Using binary classifiers
butest
 
cnn ppt.pptx
cnn ppt.pptxcnn ppt.pptx
cnn ppt.pptx
rohithprabhas1
 
Community detection in graphs
Community detection in graphsCommunity detection in graphs
Community detection in graphs
Nicola Barbieri
 
Adaptive Resonance Theory (ART)
Adaptive Resonance Theory (ART)Adaptive Resonance Theory (ART)
Adaptive Resonance Theory (ART)
Amir Masoud Sefidian
 
CNNs: from the Basics to Recent Advances
CNNs: from the Basics to Recent AdvancesCNNs: from the Basics to Recent Advances
CNNs: from the Basics to Recent Advances
Dmytro Mishkin
 

What's hot (20)

Supervised Machine Learning
Supervised Machine LearningSupervised Machine Learning
Supervised Machine Learning
 
B.E Project: Detection of Bots on Twitter
B.E Project: Detection of Bots on TwitterB.E Project: Detection of Bots on Twitter
B.E Project: Detection of Bots on Twitter
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 
Machine Learning Interview Questions and Answers | Machine Learning Interview...
Machine Learning Interview Questions and Answers | Machine Learning Interview...Machine Learning Interview Questions and Answers | Machine Learning Interview...
Machine Learning Interview Questions and Answers | Machine Learning Interview...
 
Twitter sentiment analysis ppt
Twitter sentiment analysis pptTwitter sentiment analysis ppt
Twitter sentiment analysis ppt
 
Multi Layer Perceptron & Back Propagation
Multi Layer Perceptron & Back PropagationMulti Layer Perceptron & Back Propagation
Multi Layer Perceptron & Back Propagation
 
deep learning
deep learningdeep learning
deep learning
 
social network analysis project twitter sentimental analysis
social network analysis project twitter sentimental analysissocial network analysis project twitter sentimental analysis
social network analysis project twitter sentimental analysis
 
Artificial Neural Network Paper Presentation
Artificial Neural Network Paper PresentationArtificial Neural Network Paper Presentation
Artificial Neural Network Paper Presentation
 
Introduction to Complex Networks
Introduction to Complex NetworksIntroduction to Complex Networks
Introduction to Complex Networks
 
Types and roles
Types and rolesTypes and roles
Types and roles
 
Deep learning tutorial 9/2019
Deep learning tutorial 9/2019Deep learning tutorial 9/2019
Deep learning tutorial 9/2019
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
Cat and dog classification
Cat and dog classificationCat and dog classification
Cat and dog classification
 
Image Classification using deep learning
Image Classification using deep learning Image Classification using deep learning
Image Classification using deep learning
 
Using binary classifiers
Using binary classifiersUsing binary classifiers
Using binary classifiers
 
cnn ppt.pptx
cnn ppt.pptxcnn ppt.pptx
cnn ppt.pptx
 
Community detection in graphs
Community detection in graphsCommunity detection in graphs
Community detection in graphs
 
Adaptive Resonance Theory (ART)
Adaptive Resonance Theory (ART)Adaptive Resonance Theory (ART)
Adaptive Resonance Theory (ART)
 
CNNs: from the Basics to Recent Advances
CNNs: from the Basics to Recent AdvancesCNNs: from the Basics to Recent Advances
CNNs: from the Basics to Recent Advances
 

Similar to Detecting Malicious Social Bots Based-3.pptx

IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
 
Mingle spot project
Mingle spot projectMingle spot project
Mingle spot project
saikrishnabachuwar
 
Mingle spot project
Mingle spot  project Mingle spot  project
Mingle spot project
saikrishnabachuwar
 
A07010105
A07010105A07010105
A07010105
IJERD Editor
 
Social Media Marketing.pdf
Social Media Marketing.pdfSocial Media Marketing.pdf
Social Media Marketing.pdf
jhon carter
 
7239edefaf061ba9818666362c0e6aaa
7239edefaf061ba9818666362c0e6aaa7239edefaf061ba9818666362c0e6aaa
7239edefaf061ba9818666362c0e6aaa
Anas Metasploit
 
Facebot
FacebotFacebot
Facebot
PuN1sh3r_1
 
Crowdsourcing Systems on world wide web
Crowdsourcing Systems on world wide webCrowdsourcing Systems on world wide web
Crowdsourcing Systems on world wide web
Sanjeev Kumar Jaiswal
 
TRUEWORKER.pptx
TRUEWORKER.pptxTRUEWORKER.pptx
TRUEWORKER.pptx
MsdMsdian
 
crime_management_sysdbms_2024 11[1].pptx
crime_management_sysdbms_2024 11[1].pptxcrime_management_sysdbms_2024 11[1].pptx
crime_management_sysdbms_2024 11[1].pptx
sachinkedari257
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptx
AyushKavariya1
 
Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)
SocialMediaMining
 
Social networks
Social networksSocial networks
Social networks
Jagadeesh Kumar
 
IRJET- Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET-  	  Reputation Systems - Fair Allocation of Points to the Editors in t...IRJET-  	  Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET- Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET Journal
 
Robo10 tr
Robo10 trRobo10 tr
Robo10 tr
Ouzza Brahim
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
IRJET Journal
 
IRJET- Donatio: The Life-Line
IRJET-  	  Donatio: The Life-LineIRJET-  	  Donatio: The Life-Line
IRJET- Donatio: The Life-Line
IRJET Journal
 
Lecture10.ppt
Lecture10.pptLecture10.ppt
Lecture10.ppt
WasekaPropertyportal
 
Blood Bank System Peroject (website) Full Document
 Blood Bank System Peroject (website) Full Document  Blood Bank System Peroject (website) Full Document
Blood Bank System Peroject (website) Full Document
DAV.PG COLLAGE
 
EffectiveCrowdSourcingForProductFeatureIdeation v18
EffectiveCrowdSourcingForProductFeatureIdeation v18EffectiveCrowdSourcingForProductFeatureIdeation v18
EffectiveCrowdSourcingForProductFeatureIdeation v18
Karthikeyan Rajasekharan
 

Similar to Detecting Malicious Social Bots Based-3.pptx (20)

IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
Mingle spot project
Mingle spot projectMingle spot project
Mingle spot project
 
Mingle spot project
Mingle spot  project Mingle spot  project
Mingle spot project
 
A07010105
A07010105A07010105
A07010105
 
Social Media Marketing.pdf
Social Media Marketing.pdfSocial Media Marketing.pdf
Social Media Marketing.pdf
 
7239edefaf061ba9818666362c0e6aaa
7239edefaf061ba9818666362c0e6aaa7239edefaf061ba9818666362c0e6aaa
7239edefaf061ba9818666362c0e6aaa
 
Facebot
FacebotFacebot
Facebot
 
Crowdsourcing Systems on world wide web
Crowdsourcing Systems on world wide webCrowdsourcing Systems on world wide web
Crowdsourcing Systems on world wide web
 
TRUEWORKER.pptx
TRUEWORKER.pptxTRUEWORKER.pptx
TRUEWORKER.pptx
 
crime_management_sysdbms_2024 11[1].pptx
crime_management_sysdbms_2024 11[1].pptxcrime_management_sysdbms_2024 11[1].pptx
crime_management_sysdbms_2024 11[1].pptx
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptx
 
Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)
 
Social networks
Social networksSocial networks
Social networks
 
IRJET- Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET-  	  Reputation Systems - Fair Allocation of Points to the Editors in t...IRJET-  	  Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET- Reputation Systems - Fair Allocation of Points to the Editors in t...
 
Robo10 tr
Robo10 trRobo10 tr
Robo10 tr
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
 
IRJET- Donatio: The Life-Line
IRJET-  	  Donatio: The Life-LineIRJET-  	  Donatio: The Life-Line
IRJET- Donatio: The Life-Line
 
Lecture10.ppt
Lecture10.pptLecture10.ppt
Lecture10.ppt
 
Blood Bank System Peroject (website) Full Document
 Blood Bank System Peroject (website) Full Document  Blood Bank System Peroject (website) Full Document
Blood Bank System Peroject (website) Full Document
 
EffectiveCrowdSourcingForProductFeatureIdeation v18
EffectiveCrowdSourcingForProductFeatureIdeation v18EffectiveCrowdSourcingForProductFeatureIdeation v18
EffectiveCrowdSourcingForProductFeatureIdeation v18
 

Detecting Malicious Social Bots Based-3.pptx

  • 1. Detecting Malicious Social Bots Based on Click stream Sequences RAMPELLY ROSHINI (19S41A0576) MOHAMMED SUFIYAN (19S41A0559) THATIKONDA SUMANVITHA (19S41A0592) REVELLI UDAYKIRAN (19S41A0578) INTERNAL GUIDE Dr.N.Chandramouli
  • 2. • Social bots have been used to perform automated analytical services and provide users with improved quality of service. However, malicious social bots have also been used to disseminate false information (e.g., fake news), and this can result in real-world consequences. These features are easily imitated by social bots; thereby resulting in low accuracy of the analysis. • A novel method of detecting malicious social bots, including both features selection based on the transition probability of clickstream sequences and semi-supervised clustering, is presented in this paper Introduction:
  • 3. Existing system: • Malicious users in social network platforms are likely to exhibit behavior patterns that different from normal users, because their goals in maximizing their own needs and purposes (e.g., promote a certain product or certain political beliefs or ideology). • User behavior analysis is not only helpful in gaining an in-depth understanding of user intent, but it is also important to the detection of malicious social bots' accounts in online social networks.
  • 4. • A total of 450 thousand items of data were collected from July 1 to September 30, 2022.These data were clickstream data of normal users and social bots on CyVOD. • It includes user information viewing, video broadcasting, comment related behaviors, friend related behaviors, comment releasing in circles, and other related behaviors. Proposed System:
  • 5. System Requirements Software Requirements: • Coding Language : JAVA  Application Server : Tomcat 5.0  Operating System : Windows XP  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql 5.0  Database Connectivity : JDBC. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 1 TB. • Ram : 2 GB.
  • 6. UML DIAGRAM: Fig: Use case Diagram detection of malicious bots
  • 7. 1. OSN Server: • In this module, the OSN Server has to login by using valid user name and password. • After login successful he can do some operations such as view all user details and authorize them, list of all friends requests and response ,View all posts like images and messages user, view all Similar group users like doctors, Engineers, Business Man, etc.,. • OSN Server can add some BOTS words to the database and view the all words added by him and based on that negative words admin can find all users behavior and also produce chart for that behavior words. MODULES • Types of modules: 1.OSN Server 2.USER
  • 8. 2. User: • In this module, there are n numbers of users are present. • User should register with group option before doing some operations. After registration successful he has to wait for admin to authorize him and after admin authorized user can login by using authorized user name and password. • Login successful he will do some operations like view profile details, Search friends based on keyword or friends name, view the friend requests, post message with image to all friends. Find posts of friends and comment on that posts.
  • 9. Fig 1: OSN Login • The OSN main page is an admin page. Admin has to login through credentials. Admin can anticioate the users activites like users posts, users comments and detects malicious bots which was posted by users.
  • 10. Fig 2: Registration page • In Registration page we have to enter the details to register as a user. After Giving the details user has to click register tab. Now the admin has to authorize the new user. After authorization now user is successfully registered.
  • 11. Fig 3: Users List • The above page can shows number of users list which was authorised by admin. The user has been specialised in their group. This page is administered by admin and can also observes users activity.
  • 12. Fig 4: Search Friends • This page allows users to search their friends by entering name. If user has account in it then the page will shows the users profile. If not the page will shows a message like user is not found.
  • 13. Fig 5: Friends page • The searched user profile has been displayed after entering the name. Now the user can send the request to his friend. After this user can see the posts of his friend and can also comment on his posts.
  • 14. Fig 6: Post details • The above picture describes about the user’s shared post which includes post title, post description, post speciality message, posted date .Here we can also add pictures to the shared post.
  • 15. Fig 7: Users bots behaviour • Users bots behaviour includes details of the specified users detected by admin. The page will have user name, comments, bad type, used bot words, total bot words found.
  • 16. Fig 8: List of bot words • Here we can find the list of bot words which was previously listed by the admin. Here we can find the types of bot words used by users.
  • 17. Fig 9: Analyzing the data of malicious bots through bar graph • The frequency of bot type words posted or used can be Analysed through the bar graphs.
  • 18. Advantages • Transition probability of user behavior clickstreams increases by an average of 12.8%, in comparison to the detection method based on quantitative analysis of user behavior. Disadvantages • In online social networks, social bots are social accounts controlled by automated programs that can perform corresponding operations based on a set of procedures.
  • 19. CONCLUSION • We proposed a novel method to accurately detect malicious social bots in online social networks. Experiments showed that transition probability between user click streams based on the social situation analytics can be used to detect malicious social bots in online social platforms accurately. In future research, additional behaviors of malicious social bots will be further considered and the proposed detection approach will be extended and optimized to identify specific intentions and purposes of a broader range of malicious social bots.
  • 20. 1.F. Morstatter, L. Wu, T. H. Nazer, K. M. Carley, and H. Liu, ``A new approach to bot detection: Striking the balance between precision and recall,'' in Proc. IEEE/ACM Int. Conf. Adv. Social Netw Mining,San Francisco, CA, USA, Aug. 2016, pp. 533_540. 2.C. A. De Lima Salge and N. Berente, ``Is that social bot behaving unethically?''Commun. ACM, vol. 60, no. 9, pp. 29_31, Sep. 2017. REFERENCES
  • 21. THANK YOU! SEMINAR PRESENTED BY: TEAM 2 CSE-B