Analysis of Semantic Attacks in Online Social Networks

  • K. P. Krishna Kumar
  • G. Geethakumari
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)


The emergence of online social networks as an important media for communication and information dissemination during the last decade has also seen the increase in abuse of the media to spread misinformation, disinformation and propaganda. Detecting the types of semantic attacks possible in online social networks would require their accurate classification. Drawing similarities with other social computing systems like Recommender systems, this paper proposes a new taxonomy for semantic attacks in social networks. Further, we propose an algorithm which uses social network as a medium for social computing to analyse the patterns of propagation of information and identify sources of misinformation in them. We construct a new information propagation graph from the social network data and carry out k-core decomposition of the graph to isolate possible contents of misinformation and the user nodes which are involved in their propagation. We used seven different data sets obtained from ‘Twitter’ to validate our results.


online social network semantic attacks social computing disinformation misinformation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering 17(6), 734–749 (2005)CrossRefGoogle Scholar
  2. 2.
    Alvarez-Hamelin, J.I., Dall’Asta, L., Barrat, A., Vespignani, A.: k-core decomposition: A tool for the visualization of large scale networks. arXiv preprint cs/0504107 (2005)Google Scholar
  3. 3.
    Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone’s an influencer: quantifying influence on twitter. In: Proceedings of the 4th International Conference on Web Search and Data Mining, pp. 65–74. ACM (2011)Google Scholar
  4. 4.
    Bastian, M., Heymann, S., Jacomy, M.: Gephi: an open source software for exploring and manipulating networks. In: International AAAI Conference on Weblogs and Social Media, pp. 361–362 (2011)Google Scholar
  5. 5.
    Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Classification features for attack detection in collaborative recommender systems. In: Proceedings of the 12th International Conference on Knowledge Discovery and Data Mining, pp. 542–547. ACM SIGKDD (2006)Google Scholar
  6. 6.
    Fallis, D.: A conceptual analysis of disinformation. In: iConference. Chapel Hill, NC (2009)Google Scholar
  7. 7.
    Hawksey, M.: Twitter Archiving Google Spreadsheet TAGS v5. JISC CETIS MASHe: The Musing of Martin Hawksey (EdTech Explorer) (2013), (last accessed December 29, 2013)
  8. 8.
    Karlova, N.A., Fisher, K.E.: Plz RT: A social diffusion model of misinformation and disinformation for understanding human information behaviour. Information Research 18(1), 1–17 (2013)Google Scholar
  9. 9.
    Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web, pp. 591–600. ACM (2010)Google Scholar
  10. 10.
    OMahony, M.P., Hurley, N.J., Silvestre, G.C.: Attacking recommender systems: The cost of promotion. In: Proceedings of the Workshop on Recommender Systems, in Conjunction with the 17th European Conference on Artificial Intelligence, pp. 24–28. Citeseer (2006)Google Scholar
  11. 11.
    Ratkiewicz, J., Conover, M., Meiss, M., Gonçalves, B., Patil, S., Flammini, A., Menczer, F.: Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th International Conference Companion on World Wwide Web, pp. 249–252. ACM (2011)Google Scholar
  12. 12.
    Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes twitter users: real-time event detection by social sensors. In: Proceedings of the 19th International Conference on World Wide Web, pp. 851–860. ACM (2010)Google Scholar
  13. 13.
    Solis, B.: The information divide: The socialisation of news (2010), (last accessed December 29, 2013)
  14. 14.
    Stahl, B.C.: On the difference or equality of information, misinformation, and disinformation: A critical research perspective. Informing Science: International Journal of an Emerging Transdiscipline 9, 83–96 (2006)Google Scholar
  15. 15.
    Starbird, K., Palen, L.: (How) will the revolution be retweeted?: Information diffusion and the 2011 Egyptian uprising. In: Proceedings of the International Conference on Computer Supported Cooperative Work, pp. 7–16. ACM (2012)Google Scholar
  16. 16.
    Zhang, F.: Reverse bandwagon profile inject attack against recommender systems. In: Proceedings of the 2nd International Symposium on Computational Intelligence and Design (ISCID), pp. 15–18. IEEE (2009)Google Scholar
  17. 17.
    Zhang, F.: Analysis of bandwagon and average hybrid attack model against trust-based recommender systems. In: Proceedinga of the 5th International Conference on Management of e-Commerce and e-Government, pp. 269–273. IEEE (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • K. P. Krishna Kumar
    • 1
  • G. Geethakumari
    • 1
  1. 1.BITS-Pilani, Hyderabad CampusHyderabadIndia

Personalised recommendations