You are on page 1of 6

Rumor Detection System of Social Network based on Deep Reinforcement Learning and

secure Internet
1. Technical Concept
Motivation: As people require to network in society, we are more dependent on social
media than ever before. While people use social networks, rumors can mislead users into
believing wrong information. At the same time, the presence of many rumors on social
networks has become a global risk [1]. All kinds of topical events are fermented in real-time
on social media, giving rise to personal speculation and misinformation. These personal
speculations and misinformation can distort the course of events and cause unnecessary fear
among the uninformed [2].
The rise of social media in life has led to a shift in the venue of information warfare to
social networks. As a security issue, the threat from rumors must be identified as soon as
possible. The rumors must be anticipated and contained as early as possible in the safest,
best-case scenario. In the context of military operations, rumors will impact the support of
combat teams in public opinion. At the same time, when the military uses force in operations,
it will also act on the psychology of soldiers and eliminate the influence of the hostile power
due to the spread of rumors. Hostile forces usually use rumors to spread disinformation to
guide public opinion, then act in the direction of public opinion and generate responsibility
for the action, ultimately causing irreversible adverse social effects. This use of the media
environment to influence and control public opinion is transforming into the core of
information warfare. By identifying rumors, it is possible to better distinguish if some rumors
in the information war are coming from foreign governments.
During the modernization of military equipment, warfighter equipment has also been
greatly enhanced. To ensure that the messages soldiers receive from social media are
accurate, we will use secure IoT devices as an intermediate layer between social networks
and soldiers to identify and filter rumor messages. To improve the security and usability of
the devices, we will use low-power, high-performance, secure IoT devices. We will also use a
deep reinforcement learning model developed in the device to detect rumors in real-time. The
device will be developed independently of the Warfighter device and can be deployed to the
battlefield faster to address potential rumor threats.
Therefore, it is necessary to use deep neural learning algorithms and security IoT devices
to detect rumors online in real-time. High-precision, real-time objective analysis of rumors
spreading early in an event and immediate containment at the early stages of their spread can
effectively aid in developing cybersecurity.
Innovation: Different modeling approaches can be taken to analyze social media output.
Artificial Intelligence offers an extensive array of different methods to achieve this. Deep
learning and neural networks have proven to be highly reliable and accurate. For example,
machine learning approaches use training to recognize patterns within the data and can return
accurate results from relevant queries. Another branch of machine learning, natural language
processing, is a model specifically designed for understanding and processing human
language, making it an excellent model for analyzing users' social media posts.
In previous research conducted by other researchers, the datasets used were mainly binary
classifications (rumors, non-rumors [1]). In contrast, the methods used were centered around
deep learning and machine learning, effectively dealing with datasets with only binary labels
. In this research, to fill in the gaps and shortcomings of previous research and to better
[3]

define a rumor, it is necessary to exploit the dependencies between multiple labels in the
dataset, so we look at complex datasets with multi-label classification. 
To process the complex dataset, we use DRL models and compare them to a sample of
social participants to make Example-based and Label-based evaluations of the model. To
better trace rumor data, we introduce an LSTM-based DRQN model with time series, under
which consideration of event sequences is added. The publication of rumors can also be
accurately traced in the early stages of hot events.
While current advances in cyber information security, such as passwords and data
protection algorithms, have increased trust in information processing, cyber security is more
than securing passwords and data [4]. Internet rumors are also one of the ways that hackers can
execute various cyber-attacks. Since we develop secure IoT devices that will operate
independently of warfighter devices and are not connected to the network, we only use secure
IoT to get social media information from the server and complete localized, real-time
detection. This means that secure IoT devices can better avoid cyber-attacks.
Therefore, it is necessary to use Deep Reinforcement Learning algorithms and secure the
Internet of Things to detect online rumors in real-time. By objectively analyzing rumors
spread in the early stages of an event with high accuracy and in real-time and instantly
containing them in the early stages of their spread, it can effectively help the development of
cyber security.

2. Future Naval Relevance


Since the Navy is on operation due to regional communication operational constraints,
there is a specific information gap with the outside world. With this information gap, hostile
forces can use rumor-mongering to spread disinformation to discredit the operating force in
the host nation, the operation, and the international community. Since the spread of rumors
facilitates terrorist propaganda and ideological indoctrination, early detection of rumors can
also prevent soldiers from falling back in certain situations. We develop a proof-of-concept
prototype to illustrate the importance of enforced information security and verification of
sources of information.

3. Operational Naval Concept


The project will consist of two modules, a rumor detection
system based on deep reinforcement learning for social media
and a hardware device development relying on secure IoT
technology. Among them, the hardware device will be used as
the running platform of the rumor detection system. To meet the
requirements, we designed two modules and three work
packages, as the correct Figure shows the system architecture
model of the project.
Module 1 implements detecting and predicting rumors in
social networks using deep reinforcement learning. Module 1
consists of two work packages, WP1 for pre-processing rumor
data and WP2 for processing real-time rumor detection. Module 2 is responsible for
developing the IoT device and integrating the rumor detection system from Module 1 into the
IoT device to implement an IoT-based rumor detection technology.
WP 1: Rumor Dataset Pre-Processing techniques
Aim: In WP1, the data from social media needs to be pre-processed. This includes
specifying the social media data source and extracting features from the text data using
natural language processing. Then process the data by splitting it into a training and testing
set, fed into the deep reinforcement learning model for optimization.
Deliverable: In order to ensure the reliability of the text message data, this WP1 uses the
Twitter API for the initial screening of social media messages. When keywords in an event
are repeated up to a certain number of times, it is determined that the event is gradually
becoming a hot event. The keywords are also sorted by frequency of occurrence and used as a
dataset for early rumor detection. Once the initial screening has been performed, the data is
further characterized using Natural Language Processing (NLP). NLP has advantages
compared to other methods. For example, NLP can better process and analyze data with
machine learning and deep learning, produce higher accuracy results, and bring the computer
closer to human understanding of language [5]. In other words, NLP algorithms allow
machines to analyze and understand human language and even generate corresponding
linguistic responses. Natural Language Processing (NLP) is especially useful for pre-
processing the data. We use the standard NLP methods to perform the text cleaning process
on tweets, such as removing stop words, repetitive words, special characters, numeric
numbers, and URLs. After completing text cleaning, text pre-processing will be conducted,
including tokenization, stemming, lemmatization, part-of-speech tagging, and named-entity
recognition.
Milestone: To cater to early screening and tracking of rumors, this WP will rely on APIs
provided by social media platforms for initial investigation. The data will also be pre-
processed using NLP and other means. The benefit of this is that the initial screening of
rumor information from data sources prevents interference with the data set by anomalous
data. Furthermore, it will be possible to determine early whether a rumor has occurred.

WP2: Real-Time Rumor Detection


Aim: In WP2, deep reinforcement learning will be used to improve the performance of
early social media rumor detection and to dynamically adjust the classification of rumors
about the rumor data's publication time.
Deliverable: The early detection of rumors is usually in the first few hours of a hot piece of
information. If rumors are detected in the early stages of an event, they can be better
controlled, and the harm caused by them can be contained. Most of the current research is
focused on improving the accuracy of rumor detection but ignores the timeliness of rumor
detection. In previous early rumor detection, different static detection points were usually set
according to a timeline, allowing the detection model to detect at pre-set intervals. However,
there is no uniform pattern to the release of rumors, and this WP will use dynamic detection
points to achieve early detection of rumors.
To set dynamic detection points, the WP plans to use a deep reinforcement learning-based
early model for rumor detection. The model feeds information on social media into the model
in chronological order and discriminates every time an informative message is posted. Tags
such as gender, age, and education level of the social media user are added to the pre-
processing steps to maximize the best use of Q-Learning. Using multi-tagged data allows Q-
Learning to adjust Q-values to different groups of users and thus discriminate rumors more
accurately. The results are fed into the Q-Learning mechanism to determine the current
detection results. A decision is made based on the accuracy rate, and if the accuracy rate
meets the requirements of the rumor, the result is output. Otherwise, the detection will
continue until the requirements are met.
The processed tweets are applied to the feature and opinion word extraction and polarity
identification and then finally fed into the classification model, which will be trained using
deep reinforcement learning (DRL). We selected three DRL models to use for the
classification, which are Deep Q-Network (DQN), Double Deep Q-Network (DDQN), and
Deep Recurrent Q-Network (DRQN).
● Deep Q-Network (DQN): DQN is a Deep Neural Network algorithm that combines
Q-Learning with neural networks to produce predictions of Q values.
● Double Deep Q-Network (DDQN): DQN combines the Double Q-Learning with a
Deep Q-Network, which can be used to improve the prediction of Q-values in cases where
there is a bias.
● Deep Recurrent Q-Network (DRQN): DRQN is based on DQN with the Long Short-
Term Memory (LSTM) feature, which can update the prediction of Q values with time
series.
The classifier segregates the tweets into rumor and non-rumor tweets, and the performance
of the system is analyzed and compared to determine the best model [6].
Milestone: In WP2, using dynamic detection points to filter rumor data will significantly
assist in the early detection of rumors. The WP includes a module to identify dynamic
detection points and a rumor detection module. Using a combination of both modules will
significantly increase the accuracy and timeliness of early detection of social media rumors.

WP3: Rumor Detection Device Based on sIoT


Aim: In WP3, a security IoT-based rumor detection device will be developed, integrating
NLP and DRL models for social network rumor detection based on Module 1 and using
lightweight, low-power security IoT hardware as the detection platform. It will give
maximum help for rumor detection while protecting the safety of combatants. Besides, to
ensure efficient and secure communication with servers, the 5G I-IoT paradigm will be used
as the architecture to provide network support for communication between IoT devices and
cloud servers.
Deliverable: To secure the communication of IoT devices, we will adopt end-to-end
encryption to protect the transmitted data [7]. It contains the server side, device side, and
warfighter side. The server is responsible for collecting social network messages, transmitting
them to the device side for localization detection and prediction, and finally transmitting the
results to the man-portable combat equipment to help combatants improve their ability to
identify rumors. The primary function of the server side is to collect social media data in real-
time using API and transmit the data with time series to the device side through encryption.
The device side integrates the data pre-processing and rumor detection functions of Module
1.1, so the input data can be processed locally. 5G networks can provide lower time delays in
communications, making data more timeliness. Moreover, it can be upwardly compatible
with older mobile technologies, reducing costs at the time of deployment. To improve
communication security between devices, WP3 will also use strong methods such as
authentication, access control, and intrusion detection to stop any data leakage threats.
Milestone: To help warfighters, WP3 plans to develop a 5G IoT device with an integrated
rumor detection system to address early social media rumor detection targeting the Navy.
With WP3's improvements, more warfighters will be able to identify rumors early, helping
warfighters gain a head start in information warfare through this approach.

4. Operational Utility Assessment Plan


We will show a demo machine with essential functions in the acceptance session. The
functionality of the device is demonstrated using a rumor dataset that implements the phone,
which includes data pre-processing, rumor detection, and secure communication of IoT
devices, to meet the research objectives specified at the beginning of this study.
In order to evaluate the rumor detection accuracy and device performance of the device,
rumor detection will be simulated against information spread by hostile forces in the course
of combat. The data will be collected by a remote server and encrypted in real-time, and
transmitted to the device to perform a rumor detection accuracy test, device power
consumption test, and transmission security test within a specified time. The test results are
finally evaluated to demonstrate the effectiveness of the rumor detection system based on
deep reinforcement learning and secure IoT in a simulated environment. We will demonstrate
the robustness, effectiveness, and accuracy of our rumor detection on a mobile sIoT device.

5. Rough Order of Magnitude


This project is aimed at 12 months of development. The total cost of the project is $186,420
(USD – for all currencies in this proposal that the University is asking for 100%
contribution). The PI is taking 17% full-time for this project, which constitutes $25,882. A
Research Assistant of either a postdoctoral researcher or an experienced software engineer
will be employed. He or she will cost $54,870. Conference costs will be involved to
disseminate our research outputs and make impacts on both research and software
communities. Conference and dissemination will cost $7,319. All the costs are fully
justifiable to ensure a high quality of software and prototype in place. We will be happy to
share with you the cost spreadsheet.

References
1. Islam, M.R., Liu, S., Wang, X. and Xu, G., 2020. Deep learning for misinformation detection on online social
networks: a survey and new perspectives. Social Network Analysis and Mining, 10(1), pp.1-20.
2. Kar, D., Bhardwaj, M., Samanta, S. and Azad, A.P., 2020, October. No rumors please! a multi-indic-lingual approach
for COVID fake-tweet detection. In 2021 Grace Hopper Celebration India (GHCI) (pp. 1-5). IEEE.
3. Hernandez-Suarez, A., Sanchez-Perez, G., Toscano-Medina, K., Martinez-Hernandez, V., Perez-Meana, H., Olivares-
Mercado, J. and Sanchez, V., 2018. Social sentiment sensor in Twitter for predicting cyber-attacks using ℓ1
regularization. Sensors, 18(5), p.1380.
4. Varshney, D. and Vishwakarma, DK, 2021. A review on rumor prediction and veracity assessment in online social
network. Expert Systems with Applications, 168, p.114208.
5. Catania, L.J., 2020. Foundations of Artificial Intelligence in Healthcare and Bioscience: A User Friendly Guide for IT
Professionals, Healthcare Providers, Researchers, and Clinicians. Academic Press.
6. Campan, A., Atnafu, T., Truta, T.M. and Nolan, J., 2018, December. Is data collection through twitter streaming API
useful for academic research?. In 2018 IEEE international conference on big data (Big Data) (pp. 3638-3643). IEEE.
7. Hassan, W.H., 2019. Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, pp.283-
294.

You might also like