Penetrating a Social Network: The Follow-back Problem

04/08/2018
by   Fanyu Que, et al.
0

Modern threats have emerged from the prevalence of social networks. Hostile actors, such as extremist groups or foreign governments, utilize these networks to run propaganda campaigns with different aims. For extremists, these campaigns are designed for recruiting new members or inciting violence. For foreign governments, the aim may be to create instability in rival nations. Proper social network counter-measures are needed to combat these threats. Here we present one important counter-measure: penetrating social networks. This means making target users connect with or follow agents deployed in the social network. Once such connections are established with the targets, the agents can influence them by sharing content which counters the influence campaign. In this work we study how to penetrate a social network, which we call the follow-back problem. The goal here is to find a policy that maximizes the number of targets that follow the agent. We conduct an empirical study to understand what behavioral and network features affect the probability of a target following an agent. We find that the degree of the target and the size of the mutual neighborhood of the agent and target in the network affect this probability. Based on our empirical findings, we then propose a model for targets following an agent. Using this model, we solve the follow-back problem exactly on directed acyclic graphs and derive a closed form expression for the expected number of follows an agent receives under the optimal policy. We then formulate the follow-back problem on an arbitrary graph as an integer program. To evaluate our integer program based policies, we conduct simulations on real social network topologies in Twitter. We find that our polices result in more effective network penetration, with significant increases in the expected number of targets that follow the agent.

READ FULL TEXT

page 7

page 9

page 11

page 16

page 26

page 27

page 29

research
06/09/2018

A Logical Framework for Verifying Privacy Breaches of Social Networks

We present a novel approach to deal with transitivity permission-delegat...
research
05/17/2018

Detecting cyber threats through social network analysis: short survey

This article considers a short survey of basic methods of social network...
research
06/27/2019

Critical Edge Identification: A K-Truss Based Model

In a social network, the strength of relationships between users can sig...
research
11/17/2020

Marketing resource allocation in duopolies over social networks

One of the key features of this paper is that the agents' opinion of a s...
research
02/21/2019

Policies for growth of influence networks in task-oriented groups: elitism and egalitarianism outperform welfarism

Communication or influence networks are probably the most controllable o...
research
08/03/2020

Identifying the k Best Targets for an Advertisement Campaign via Online Social Networks

We propose a novel approach for the recommendation of possible customers...
research
07/07/2018

Stochastic Coupon Probing in Social Networks

In this paper, we study stochastic coupon probing problem in social netw...

Please sign up or login with your details

Forgot password? Click here to reset