social networking (online)security of datapurchasinginfiltration scalestealthy behaviourinfiltration timefully stealthy socialbot networksocialbot network design strategyacceptable costsestablishment strategyautomatic establishmentanalytical modeldetection evasion techniquesonline social networkfake accountsintelligent softwarestealthy socialbot network establishmenteconomic feasibility study