4.2 Review

Survey on Astroturfing Detection and Analysis from an Information Technology Perspective

Journal

SECURITY AND COMMUNICATION NETWORKS
Volume 2021, Issue -, Pages -

Publisher

WILEY-HINDAWI
DOI: 10.1155/2021/3294610

Keywords

-

Funding

  1. National Natural Science Foundation of China [61972025, 61802389, 61672092, U1811264, 61966009]
  2. National Key R&D Program of China [2020YFB1005604, 2020YFB2103802]

Ask authors/readers for more resources

With the rise of the Internet, user comments have had a significant impact on information acquisition and e-commerce, as well as attracting researchers' interest. Astroturfing, as a form of online suspicious behavior, can lead to abnormal and damaging actions in cyberspace, prompting an urgent need for detection and prevention measures.
With the development of the Internet, user comments produced an unprecedented impact on information acquisition, goods purchase, and other aspects. For example, the user comments can quickly render a topic the focus of discussion in social networks. It can promote the sales of goods in e-commerce, and it influences the ratings of books, movies, or albums. Among these network applications and services, astroturfing, a kind of online suspicious behavior, can generate abnormal, damaging, and even illegal behaviors in cyberspace that mislead public perception and bring a bad effect on Internet users and society. Hence, the manner of detecting and combating astroturfing behavior has become highly urgent, attracting interest from researchers both from information technology and sociology. In the current paper, we restudy it mainly from the perspective of information technology, summarize the latest research findings of astroturfing detection, analyze the astroturfing feature, classify the machine learning-based detection methods and evaluation criteria, and introduce the main applications. Different from the previous surveys, we also discuss the new future directions of astroturfing detection, such as cross-domain astroturfing detection and user privacy protection.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available