Is that Twitter account a bot? Researchers make app to find out

The app looks at public Twitter data to identify phony accounts

Researchers' app looks at different signals to determine an account's bot-ness.

Researchers' app looks at different signals to determine an account's bot-ness.

They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.

Twitter's got bots, and researchers are fighting back. At Indiana University in Bloomington, researchers have developed an app, called "Bot or Not," designed to identify accounts on Twitter that are controlled by insidious robots or software.

You can't trust everything you see on Twitter, even when it's posted by actual people. But the researchers' tool was developed as part of a larger effort to raise awareness about how much more easily misinformation can be spread when it's done by bot accounts that feed off each other.

Plenty of bots on Twitter are benign -- they may automatically tweet out links to research papers or product updates.

But then there are the bots that mislead, exploit and manipulate online conversations with rumors, spam, misinformation and slander, researchers say.

"It's political astroturf," said Fil Menczer, an informatics and computer science professor who directs IU's Center for Complex Networks and Systems Research.

Some Twitter accounts may be programmed to post messages with links to fake news stories, and then cyclically repost the links, making them go viral. Others may spread misinformation to hurt a political candidate.

Beyond Twitter messages themselves, "bot accounts comprise a crucial part of misinformation campaigns on Twitter," Menczer said. "We know they exist, but are there millions of them? Tens of millions? Tens of thousands? We're not sure," he said.

There are also companies that sell Twitter followers, which are not always real. Newt Gingrich was scrutinized some years ago over his allegedly phony followers.

The "Bot or Not" app seeks to weed out at least some of the bot accounts. The app, which can be accessed on IU's site, lets users type in any Twitter handle, and its algorithm looks at over 1,100 features to determine how likely it is to be a bot on a 100-point scale. Users must authorize the app to query Twitter on their behalf.

It's all based on public Twitter data from the site's API (application programming interface). Patterns such as length of time between posts, the scope of the account's own follower network -- even the sentiment of the posts -- is all factored in to make a determination.

Some Twitter accounts already deemed to be fakes by the tool? Apparently Justin Bieber attracts bots: @JusBieberPhotos ("the official Justin Bieber photo Twitter account") and @StanBieberfan were called out by the researchers.

The app is very much in beta. Researchers are currently working to refine its algorithm, and figure out which signals are really the best to include, results that will likely appear in a future paper.

Their fear is that spammers will adjust accordingly. "It's an arms race," Menczer said. "Bots will get smarter in the process."

Zach Miners covers social networking, search and general technology news for IDG News Service. Follow Zach on Twitter at @zachminers. Zach's e-mail address is

Join the CSO newsletter!

Error: Please check your email address.

Tags Internet-based applications and servicesdata breachsocial networkingscamstwitterspywaresocial mediadata protectioninternetmalwareanalyticssecurity

More about IDG

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Zach Miners

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts