<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2024-10-2-92-101</article-id><article-id custom-type="edn" pub-id-type="custom">ZTCHLS</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-573</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Подход к обнаружению вредоносных ботов  в социальной сети ВКонтакте и оценка  их параметров</article-title><trans-title-group xml:lang="en"><trans-title>Approach to Detecting Malicious Bots  in the Vkontakte Social Network  and Assessing Their Parameters</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7056-6972</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Чечулин</surname><given-names>А. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Chechulin</surname><given-names>A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат технических наук, доцент, ведущий научный сотрудник лаборатории проблем компьютерной безопасности Санкт-Петербургского Федерального исследовательского центра Российской академии наук, доцент кафедры защищенных систем связи Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">chechulin.aa@sut.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-7873-2733</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Коломеец</surname><given-names>М. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Kolomeets</surname><given-names>M.</given-names></name></name-alternatives><bio xml:lang="ru"><p>научный сотрудник школы вычислительной техники </p></bio><email xlink:type="simple">maksim.kalameyets@newcastle.ac.uk</email><xref ref-type="aff" rid="aff-2"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский Федеральный исследовательский центр Российской академии наук; Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">St. Petersburg Federal Research Center of the Russian Academy of Sciences; The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><aff-alternatives id="aff-2"><aff xml:lang="ru">Ньюкаслский университет<country>Россия</country></aff><aff xml:lang="en">Newcastle University<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2024</year></pub-date><pub-date pub-type="epub"><day>04</day><month>05</month><year>2024</year></pub-date><volume>10</volume><issue>2</issue><fpage>92</fpage><lpage>101</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Чечулин А.А., Коломеец М.В., 2024</copyright-statement><copyright-year>2024</copyright-year><copyright-holder xml:lang="ru">Чечулин А.А., Коломеец М.В.</copyright-holder><copyright-holder xml:lang="en">Chechulin A., Kolomeets M.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/573">https://tuzs.sut.ru/jour/article/view/573</self-uri><abstract><p>Появление новых разновидностей ботов в социальных сетях и совершенствование их возможностей имитации естественного поведения реальных пользователей представляют собой актуальную проблему в области защиты социальных сетей и онлайн сообществ. В данной работе предлагается новый подход к обнаружению и оценке параметров ботов в рамках социальной сети ВКонтакте. Основой предложенного подхода является создание наборов данных с использованием метода «контрольной покупки» ботов, который позволяет оценить такие характеристики как стоимость, качество и скорость действия ботов, а с использованием теста Тьюринга также насколько пользователи доверяют ботам. В совокупности с общепринятыми методами машинного обучения и признаками, извлеченными из графов взаимодействий, текстовых сообщений и статистических распределений, становится возможным достаточно точно не только обнаруживать ботов, но и предсказывать их характеристики. В работе демонстрируется, что итоговая модель, построенная на основе предлагаемого подхода, робастна к разбалансированным данным и может идентифицировать большинство видов ботов, так как имеет лишь незначительную корреляцию с их основными характеристиками. Предложенный подход может использоваться в рамках выбора контрмер для защиты социальных сетей и исторического анализа, позволяя не только подтвердить присутствие ботов, но и характеризовать специфику атаки.</p></abstract><trans-abstract xml:lang="en"><p>The emergence of new varieties of bots in social networks and the improvement of their capabilities to imitate the natural behavior of real users represent a significant problem in the field of protection of social networks and online communities. This paper proposes a new approach to detecting and assessing the parameters of bots within the social network «VKontakte». The basis of the proposed approach is the creation of datasets using the method of «controlled purchase» of bots, which allows one to assess bots’ characteristics such as price, quality, and speed of action of bots, and using the Turing Test to assess how much users trust bots. In combination with traditional machine learning methods and features extracted from interaction graphs, text messages, and statistical distributions, it becomes possible to not only detect bots accurately but also predict their characteristics. This paper demonstrates that the trained machine learning model, based on the proposed approach, is robust to imbalanced data and can identify most types of bots as it has only a minor correlation with their main characteristics. The proposed approach can be used within the choice of countermeasures for the protection of social networks and for historical analysis, which allows not only to confirm the presence of bots but also to characterize the specifics of the attack.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>безопасность социальных сетей</kwd><kwd>социальные боты</kwd><kwd>социальная инженерия</kwd><kwd>метрики</kwd><kwd>дезинформация</kwd><kwd>фейковые аккаунты</kwd><kwd>анализ рисков</kwd></kwd-group><kwd-group xml:lang="en"><kwd>social media security</kwd><kwd>social bots</kwd><kwd>social engineering</kwd><kwd>metrics</kwd><kwd>disinformation</kwd><kwd>fake accounts</kwd><kwd>risk analysis</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement>Работа Андрея Чечулина была профинансирована в рамках бюджетного проекта FFZF-2022-0007. Максим Коломеец не получал финансирования в рамках данного исследования.</funding-statement></funding-group><funding-group xml:lang="en"><funding-statement>Andrey Chechulin’s work was funded under the budget project FFZF-2022-0007. Maxim Kolomeets received no funding for this study.</funding-statement></funding-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Cresci S. A decade of social bot detection // Communications of the ACM. 2020. Vol. 63. Iss. 10. PP. 72–83. DOI:10.1145/ 3409116</mixed-citation><mixed-citation xml:lang="en">Cresci S. A decade of social bot detection. Communications of the ACM. 2020; 63(10):72–83. DOI:10.1145/3409116</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Samoilenko S.A., Suvorova I. Artificial intelligence and deepfakes in strategic deception campaigns: The US and Russian experiences // In: The Palgrave Handbook of Malicious Use of AI and Psychological Security. Cham: Springer International Publishing, 2023. PP. 507–529. DOI:10.1007/978-3-031-22552-9_19</mixed-citation><mixed-citation xml:lang="en">Samoilenko S.A., Suvorova I. Artificial intelligence and deepfakes in strategic deception campaigns: The US and Russian experiences. In: The Palgrave Handbook of Malicious Use of AI and Psychological Security. Cham: Springer International Publishing; 2023. PP. 507–529. DOI:10.1007/978-3-031-22552-9_19</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Yang K., Menczer F. Anatomy of an AI-powered malicious social botnet // arXiv preprint arXiv:2307.16336.2023. DOI:10.48550/arXiv.2307.16336</mixed-citation><mixed-citation xml:lang="en">Yang K., Menczer F. Anatomy of an AI-powered malicious social botnet. arXiv preprint arXiv:2307.16336. 2023. DOI:10.48550/arXiv.2307.16336</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Gilani Z., Farahbakhsh R., Tyson G., Wang L., Crowcroft J. Of bots and humans (on twitter) // Proceedings of the International Conference on Advances in Social Networks Analysis and Mining. (New York, USA, 31 July 2017). Association for Computing Machinery, 2017. DOI:10.1145/3110025.3110090</mixed-citation><mixed-citation xml:lang="en">Gilani Z., Farahbakhsh R., Tyson G., Wang L., Crowcroft J. Of bots and humans (on twitter). Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 31 July 2017, New York, USA. Association for Computing Machinery; 2017. DOI:10.1145/3110025.3110090</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Orabi M., Mouheb D., Al Aghbari Z., Kamel I. Detection of bots in social media: a systematic review // Information Processing and Management. 2020. Vol. 57. Iss. 4. P. 102250. DOI:10.1016/j.ipm.2020.102250</mixed-citation><mixed-citation xml:lang="en">Orabi M., Mouheb D., Al Aghbari Z., Kamel I. Detection of bots in social media: a systematic review. Information Processing and Management. 2020;57(4):102250. DOI:10.1016/j.ipm.2020.102250</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Коломеец М.В., Чечулин А.А. Метрики вредоносных социальных ботов // Труды учебных заведений связи. 2023. Т. 9. № 1. С. 94−104. DOI:10.31854/1813-324X-2023-9-1-94-104. EDN:HEFHFR</mixed-citation><mixed-citation xml:lang="en">Kolomeets M., Chechulin A. Properties of Malicious Social Bots. Proceedings of Telecommunication Universities. 2023;9(1): 94−104. DOI:10.31854/1813-324X-2023-9-1-94-104. EDN:HEFHFR</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Zegzhda P.D., Malyshev E.V., Pavlenko E.Y. The use of an artificial neural network to detect automatically managed accounts in social networks // Automatic Control and Computer Sciences. 2017. Vol. 51. Iss. 8. PP. 874–880. DOI:10.3103/S0146411617080296. EDN:UYCEUW</mixed-citation><mixed-citation xml:lang="en">Zegzhda P. D., Malyshev E. V., Pavlenko E. Y. The use of an artificial neural network to detect automatically managed accounts in social networks. Automatic Control and Computer Sciences. 2017;51(8):874–880. DOI:10.3103/S014641161708 0296. EDN:UYCEUW</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Samokhvalov D.I. Machine learning-based malicious users' detection in the VKontakte social network // Proceedings of the Institute for System Programming of the RAS. 2020. Vol. 32. Iss. 3. PP. 109–117. DOI:10.15514/ISPRAS-2020-32(3)-10</mixed-citation><mixed-citation xml:lang="en">Samokhvalov D.I. Machine learning-based malicious users' detection in the VKontakte social network. Proceedings of the Institute for System Programming of the RAS. 2020;32(3):109–117. DOI:10.15514/ISPRAS-2020-32(3)-10</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Kaveeva A.D., Gurin K.E. Artificial VKontakte profiles and their impact on the social network of users // Journal of Sociology and Social Anthropology. 2018. Vol. 21. Iss. 2. PP. 214–231. DOI:10.31119/jssa.2018.21.2.8. EDN:XZOGHB</mixed-citation><mixed-citation xml:lang="en">Kaveeva A.D., Gurin K.E. Artificial VKontakte profiles and their impact on the social network of users // Journal of Sociology and Social Anthropology. 2018;21(2):214–231. DOI:10.31119/jssa.2018.21.2.8. EDN:XZOGHB</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Kolomeets M., Tushkanova O., Levshun D., Chechulin A. Camouflaged bot detection using the friend list // Proceedings of the 29th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP, Valladolid, Spain, 10–12 March 2021). IEEE, 2021. PP. 253–259. DOI:10.1109/PDP52278.2021.00048. EDN:ZDXFHS</mixed-citation><mixed-citation xml:lang="en">Kolomeets M., Tushkanova O., Levshun D., Chechulin A. Camouflaged bot detection using the friend list. Proceedings of the 29th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP, 10–12 March 2021, Valladolid, Spain. IEEE; 2021. DOI:10.1109/PDP52278.2021.00048. EDN:ZDXFHS</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Skorniakov K., Turdakov D., Zhabotinsky A. Make Social Networks Clean Again: Graph Embedding and Stacking Classifiers for Bot Detection // Proceedings of the Workshops, co-located with 27th ACM International Conference on Information and Knowledge Management (CIKM, Torino, Italy, 22 October 2018). ISP RAS, 2019. Vol. 2482. EDN:IHZECD</mixed-citation><mixed-citation xml:lang="en">Skorniakov K., Turdakov D., Zhabotinsky A. Make Social Networks Clean Again: Graph Embedding and Stacking Classifiers for Bot Detection. Proceedings of the Workshops, co-located with 27th ACM International Conference on Information and Knowledge Management, CIKM, 22 October 2018, Torino, Italy, vol.2482. ISP RAS; 2019. EDN:IHZECD</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Kolomeets M. MKMETRIC2022 – dataset with VKontakte bot identifiers and their metrics // guardeec/datasets. 2022. URL: https://github.com/guardeec/datasets#mkmetric2022 (Accessed 20.04.2024)</mixed-citation><mixed-citation xml:lang="en">Kolomeets M. MKMETRIC2022 – dataset with VKontakte bot identifiers and their metrics. guardeec/datasets. 2022. URL: https://github.com/guardeec/datasets#mkmetric2022 [Accessed 20 April 2024]</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Zhou Z., Guan H., Bhat M., Hsu J. Detecting Fake News with NLP: Challenges and Possible Directions. 2018. URL: https://meghu2791.github.io/Fake_News_Detection.pdf (Accessed 20.04.2024)</mixed-citation><mixed-citation xml:lang="en">Zhou Z., Guan H, Bhat M., Hsu J. Detecting Fake News with NLP: Challenges and Possible Directions. 2018. URL: https://meghu2791.github.io/Fake_News_Detection.pdf [Accessed 20.04.2024]</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
