Enhanced method to detect spammers in social network

Rajesh Manem, Radhika Krupalini P

Abstract


We present a hybrid methodology for recognizing computerized spammers by amalgamating network based highlights with other element classifications, specifically metadata-, content-, and collaboration based highlights. The curiosity of the proposed methodology lies in the portrayal of clients dependent on their associations with their devotees given that a client can sidestep includes that are identified with his/her own exercises, however sidestepping those dependent on the adherents is troublesome. Nineteen different features, including six newly defined features and two redefined features, are identified for learning three classifiers, namely, random forest, decision tree, and Bayesian network, on a real dataset that comprises benign users and spammers. The separation intensity of various element classes is likewise broke down, and association and network based highlights are resolved to be the best for spam recognition, though metadata-based highlights are ended up being to be the least viable

References


M. Tsikerdekis, “Identity deception prevention using common contribution network data,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 1,pp. 188–199, Jan. 2017.

T. Anwar and M. Abulaish, “Ranking radically influential Web forum users,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 6,pp. 1289–1298, Jun. 2015.

Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, “Design and analysis of social botnet,” Comput. Netw., vol. 57, no. 2, pp. 556–578,2013.

D. Fletcher, “A brief history of spam,” TIME, Nov. 2, 2009.[Online]. Available:http://www.time.com/time/business/article/0,8599,1933796,00.html

Y. Boshmaf, M. Ripeanu, K. Beznosov, and E. Santos-Neto, “Thwarting fake OSN accounts by predicting their victims,” in Proc. AISec, Denver,CO, USA, 2015, pp. 81–89.

A. A. Amleshwaram, N. Reddy, S. Yadav, G. Gu, andC. Yang, “CATS: Characterizing automation of Twitter spammers,” in Proc. COMSNETS, Bengaluru, India, Jan. 2013, pp. 1–10.

K. Lee, J. C. Lee, and S. Webb, “Uncovering social spammers: Socialhoneypots + machine learning,” in Proc. SIGIR, Geneva, Switzerland,Jul. 2010, pp. 435–442.

G. Stringhini, C. Kruegel, and G. Vigna, “Detecting spammers on socialnetworks,” in Proc. ACSAC, Austin, TX, USA, 2010, pp. 1–9.

H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, “SybilGuard:Defending against sybil attacks via social networks,” IEEE/ACM Trans.Netw., vol. 16, no. 3, pp. 576–589, Jun. 2008.

H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao, “Detectingand characterizing social spam campaigns,” in Proc. IMC, Melbourne,VIC, Australia, 2001, pp. 35–47.

W. Wei, F. Xu, C. C. Tan, and Q. Li “Sybildefender: Defend against sybil attacks in large social networks,” in Proc. INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 1951–1959.

C. Yang, R. C. Harkreader, and G. Gu, “Die free or live hard? Empirical evaluation and new design for fighting evolving Twitter spammers,” in Proc. RAID, Menlo Park, CA, USA, 2011, pp. 318–337.

S. Lee and J. Kim, “WarningBird: A near real-time detection system forsuspicious URLs in Twitter stream,” IEEE Trans. Depend. Sec. Comput.,vol. 10, no. 3, pp. 183–195, May 2013.

M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz, “A Bayesianapproach to filtering junk e-mail,” in Proc. Workshop Learn. Text Categorization, Madison, WI, USA, 1998, pp. 98–105.

C. Schäfer, “Detection of compromised email accounts used by a spam botnet with country counting and theoretical geographical travelling speed extracted from metadata,” in Proc. ISSREW, Naples, Italy,Nov. 2014, pp. 329–334.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.