{"id":"https://openalex.org/W4391889600","doi":"https://doi.org/10.1109/comsnets59351.2024.10427530","title":"From Detection to Dissection: Unraveling Bot Characteristics in the VKontakte Social Network","display_name":"From Detection to Dissection: Unraveling Bot Characteristics in the VKontakte Social Network","publication_year":2024,"publication_date":"2024-01-03","ids":{"openalex":"https://openalex.org/W4391889600","doi":"https://doi.org/10.1109/comsnets59351.2024.10427530"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets59351.2024.10427530","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/comsnets59351.2024.10427530","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001301716","display_name":"Andrey Chechulin","orcid":"https://orcid.org/0000-0001-7056-6972"},"institutions":[{"id":"https://openalex.org/I4210096130","display_name":"Russian Federal Centre of Forensic Science of the Ministry of Justice of the Russian Federation","ror":"https://ror.org/00tbjqq75","country_code":"RU","type":"government","lineage":["https://openalex.org/I4210096130"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Andrey Chechulin","raw_affiliation_strings":["St. Petersburg Federal Research Center of the Russian Academy of Science,International Digital Forensics Centre,St. Petersburg,Russia","International Digital Forensics Centre, St. Petersburg Federal Research Center of the Russian Academy of Science, St. Petersburg, Russia"],"raw_orcid":"https://orcid.org/0000-0001-7056-6972","affiliations":[{"raw_affiliation_string":"St. Petersburg Federal Research Center of the Russian Academy of Science,International Digital Forensics Centre,St. Petersburg,Russia","institution_ids":["https://openalex.org/I4210096130"]},{"raw_affiliation_string":"International Digital Forensics Centre, St. Petersburg Federal Research Center of the Russian Academy of Science, St. Petersburg, Russia","institution_ids":["https://openalex.org/I4210096130"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065180547","display_name":"Maxim Kolomeets","orcid":"https://orcid.org/0000-0002-7873-2733"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maxim Kolomeets","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK","School of Computing, Newcastle University, Newcastle upon Tyne, UK"],"raw_orcid":"https://orcid.org/0000-0002-7873-2733","affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001301716"],"corresponding_institution_ids":["https://openalex.org/I4210096130"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01473785,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"159","last_page":"164"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9617000222206116,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5468494296073914},{"id":"https://openalex.org/keywords/dissection","display_name":"Dissection (medical)","score":0.531263530254364},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.11028814315795898},{"id":"https://openalex.org/keywords/anatomy","display_name":"Anatomy","score":0.06271794438362122}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5468494296073914},{"id":"https://openalex.org/C2775862295","wikidata":"https://www.wikidata.org/wiki/Q2660911","display_name":"Dissection (medical)","level":2,"score":0.531263530254364},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.11028814315795898},{"id":"https://openalex.org/C105702510","wikidata":"https://www.wikidata.org/wiki/Q514","display_name":"Anatomy","level":1,"score":0.06271794438362122}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets59351.2024.10427530","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/comsnets59351.2024.10427530","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.75}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2769471736","https://openalex.org/W2791845985","https://openalex.org/W3019320019","https://openalex.org/W3041367927","https://openalex.org/W3047176094","https://openalex.org/W3125928061","https://openalex.org/W3158299616","https://openalex.org/W4321489581","https://openalex.org/W4380032142","https://openalex.org/W4399121933","https://openalex.org/W6770441318","https://openalex.org/W6855541001"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"The":[0,114],"increasing":[1],"sophistication":[2],"of":[3,36,116,144,153,166,188,191,202,212],"social":[4,42],"bots":[5,38,80,125,182],"and":[6,32,71,111,126,146,156],"their":[7,128],"ability":[8,89,177],"to":[9,57,65,90,178,208,217],"mimic":[10],"human":[11,147],"behaviour":[12,129],"online":[13],"presents":[14],"a":[15,27,48,83,141,159,185,213],"significant":[16,172],"challenge":[17],"in":[18],"distinguishing":[19],"them":[20],"from":[21,106],"genuine":[22],"users.":[23],"This":[24,44,61,93],"paper":[25],"proposes":[26],"novel":[28],"approach":[29,119,170],"for":[30,174,198],"detecting":[31],"estimating":[33],"the":[34,40,117,151,163,167,176,189,199,210,219],"parameters":[35],"such":[37],"within":[39,98],"VKontakte":[41],"network.":[43],"method":[45],"involves":[46],"creating":[47],"dataset":[49,94],"by":[50,81,183],"using":[51,82],"controlled":[52],"attacks":[53],"on":[54],"\u2018honeypot\u2019":[55],"accounts":[56],"measure":[58],"bot":[59,145,154],"activity.":[60],"process":[62],"allows":[63],"us":[64],"assess":[66],"these":[67],"bots'":[68],"cost,":[69],"quality,":[70],"speed.":[72],"Additionally,":[73],"we":[74],"evaluate":[75],"how":[76],"well":[77,136],"users":[78],"trust":[79],"Turing":[84],"test,":[85],"which":[86],"tests":[87],"users'":[88],"identify":[91,150],"bots.":[92,168],"is":[95],"then":[96],"used":[97],"conventional":[99],"machine":[100],"learning":[101],"techniques,":[102],"leveraging":[103],"features":[104],"extracted":[105],"interaction":[107],"graphs,":[108],"text":[109],"content,":[110],"statistical":[112],"distributions.":[113],"evaluation":[115],"proposed":[118],"shows":[120,157],"that":[121],"it":[122,194],"effectively":[123],"detects":[124],"predicts":[127],"with":[130,138,140,162],"considerable":[131],"accuracy.":[132],"It":[133],"can":[134,149],"work":[135],"even":[137],"datasets":[139],"skewed":[142],"balance":[143],"data,":[148],"majority":[152],"networks,":[155],"only":[158],"minor":[160],"correlation":[161],"primary":[164],"characteristics":[165],"Our":[169],"has":[171],"implications":[173],"enhancing":[175],"select":[179],"countermeasures":[180],"against":[181],"providing":[184],"deeper":[186],"understanding":[187],"capabilities":[190],"attackers.":[192],"Furthermore,":[193],"offers":[195],"important":[196],"insights":[197],"forensic":[200],"analysis":[201],"botnet":[203,214],"attacks,":[204],"enabling":[205],"not":[206],"just":[207],"confirm":[209],"presence":[211],"but":[215],"also":[216],"characterise":[218],"attack's":[220],"specifics.":[221]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
