Votebot

Last updated

A votebot is a software automation built to fraudulently participate in online polls, elections, and to upvote and downvote on social media.

Contents

Simple votebots are easy to code and deploy, yet they are often effective against many polls online, as the developer of the poll software must take this kind of attack into account and do extra work to defend against it.

Technique used

The WWW uses the HTTP protocol to transfer information. Votebots are designed to imitate legitimate user behaviour, such as voting in an online poll by interacting with the server hosting the poll using the HTTP protocol. The bot thus emulates the behavior of a human using a web browser, but can repeat this emulated behavior many times, thus casting many votes.

Distinguishing bots from humans

In many voting projects, developers try to distinguish bots from legitimate users. For example, some websites restrict the number of votes one IP address can make in a time period. Votebots frequently bypass this rule by using proxy or VPN IP addresses. Other web sites analyze the account created by a votebot and its history of actions in the system to identify potential votebots. Votebots in turn counter this by trying to simulate human activity such as logging in and out before voting. Other sites employ CAPTCHAs, which votebots farm out to Mechanical Turks.

Targeted sites

YouTube, Facebook, Twitter and Reddit are major target of votebots. [1] Many small, temporary voting projects are also targeted. Many people try to program or buy malicious scripts to vote for themselves in some processes, and it is hard to count the number of attacks happening every day.

See also

Related Research Articles

<span class="mw-page-title-main">HTTPS</span> Extension of the HTTP communications protocol to support TLS encryption

Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS, or HTTP over SSL.

<span class="mw-page-title-main">Denial-of-service attack</span> Cyber attack disrupting service by overloading the provider of the service

In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

<span class="mw-page-title-main">Proxy server</span> Computer server that makes and receives requests on behalf of a user

In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.

Various anti-spam techniques are used to prevent email spam.

In computer science, a software agent or software AI is a computer program that acts for a user or other program in a relationship of agency, which derives from the Latin agere : an agreement to act on one's behalf. Such "action on behalf of" implies the authority to decide which, if any, action is appropriate. Agents are colloquially known as bots, from robot. They may be embodied, as when execution is paired with a robot body, or as software such as a chatbot executing on a phone or other computing device. Software agents may be autonomous or work together with other agents or people. Software agents interacting with people may possess human-like qualities such as natural language understanding and speech, personality or embody humanoid form.

<span class="mw-page-title-main">Botnet</span> Collection of compromised internet-connected devices controlled by a third party

A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software. The word "botnet" is a portmanteau of the words "robot" and "network". The term is usually used with a negative or malicious connotation.

A pingback is one of four types of linkback methods for Web authors to request notification when somebody links to one of their documents. This enables authors to keep track of who is linking to, or referring to their articles. Some weblog software and content management systems, such as WordPress, Movable Type, Serendipity, and Telligent Community, support automatic pingbacks where all the links in a published article can be pinged when the article is published. Other content management systems, such as Drupal and Joomla, support pingbacks through the use of addons or extensions.

<span class="mw-page-title-main">Cheating in online games</span> Practice of subverting video game rules or mechanics to gain an unfair advantage

Cheating in online games is the subversion of the rules or mechanics of online video games to gain an unfair advantage over other players, generally with the use of third-party software. What constitutes cheating is dependent on the game in question, its rules, and consensus opinion as to whether a particular activity is considered to be cheating.

<span class="mw-page-title-main">Internet security</span> Branch of computer security

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

Click fraud is a type of fraud that occurs on the Internet in pay-per-click (PPC) online advertising. In this type of advertising, the owners of websites that post the ads are paid based on how many site visitors click on the ads. Fraud occurs when a person, automated script, computer program or an auto clicker imitates a legitimate user of a web browser, clicking on such an ad without having an actual interest in the target of the ad's link in order to increase revenue. Click fraud is the subject of some controversy and increasing litigation due to the advertising networks being a key beneficiary of the fraud.

An Internet bot, web robot, robot or simply bot, is a software application that runs automated tasks (scripts) over the Internet, usually with the intent to imitate human activity on the Internet, such as messaging, on a large scale. An Internet bot plays the client role in a client–server model whereas the server role is usually played by web servers. Internet bots are able to perform tasks, that are simple and repetitive, much faster than a person could ever do. The most extensive use of bots is for web crawling, in which an automated script fetches, analyzes and files information from web servers. More than half of all web traffic is generated by bots.

Email harvesting or scraping is the process of obtaining lists of email addresses using various methods. Typically these are then used for bulk email or spam.

A spoofed URL describes one website that poses as another website. It often applies a mechanism that exploits bugs in web browser technology, allowing a malicious computer attack. Such attacks are most effective against computers that lack recent security patches. Others are designed for the purpose of a parody.

A social news website is a website that features user-posted stories. Such stories are ranked based on popularity, as voted on by other users of the site or by website administrators. Users typically comment online on the news posts and these comments may also be ranked in popularity. Since their emergence with the birth of Web 2.0, social news sites have been used to link many types of information, including news, humor, support, and discussion. All such websites allow the users to submit content and each site differs in how the content is moderated. On the Slashdot and Fark websites, administrators decide which articles are selected for the front page. On Reddit and Digg, the articles that get the most votes from the community of users will make it to the front page. Many social news websites also feature an online comment system, where users discuss the issues raised in an article. Some of these sites have also applied their voting system to the comments, so that the most popular comments are displayed first. Some social news websites also have a social networking service, in that users can set up a user profile and follow other users' online activity on the website.

DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware that overrides a computer's TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behaviour of a trusted DNS server so that it does not comply with internet standards.

<span class="mw-page-title-main">Hacker News</span> Social news website

Hacker News is a social news website focusing on computer science and entrepreneurship. It is run by the investment fund and startup incubator Y Combinator. In general, content that can be submitted is defined as "anything that gratifies one's intellectual curiosity."

Ben Eisenkop, better known by his Reddit pseudonym Unidan, is an American ecologist. He became popular on the social media website Reddit as the "excited biologist" who answered questions and explained concepts related to biology and ecology before being banned. He was banned from the website for vote fraud – using multiple secret accounts to increase the popularity of his own posts and decrease the popularity of competitors' posts.

A social bot, or also described as a social AI or social algorithm, is a software agent that communicates autonomously on social media. The messages it distributes can be simple and operate in groups and various configurations with partial human control (hybrid) via algorithm. Social bots can also use artificial intelligence and machine learning to express messages in more natural human dialogue.

Internet manipulation refers to the co-optation of digital technology, such as social media algorithms and automated scripts, for commercial, social, or political purposes. Such tactics may be employed with the explicit intent to manipulate public opinion, polarise citizens, silence political dissidents, harm corporate or political adversaries and improve personal or brand reputation. Hackers, hired professionals and private citizens have all been reported to engage in internet manipulation using software – typically Internet bots such as social bots, votebots and clickbots.

<span class="mw-page-title-main">Lemmy (software)</span> Open source social news software

Lemmy is free and open-source software for running self-hosted social news aggregation and discussion forums. The site has similar features to Reddit or Hacker News. Lemmy instances are run by a large number of individuals or corporations, each with their own content moderation policies. Users on individual instances submit posts with links, text, or pictures to user-created boards called “communities”. Communities are user created and local to each instance, however they may be posted to from other instances. Using a system of upvotes and downvotes users can influence what content appears at the top of the main feeds and of each community. Moderation is conducted by admins of each instance and moderators of specific communities.

References

  1. Herkewitz, William (2013-08-08). "Upvotes, Downvotes, and the Science of the Reddit Hivemind". Popular Mechanics. Retrieved 15 June 2021.