Detecting Malicious Users in Online Dating Application

The flood of malicious users whose baleful behaviors seriously affect the social experience of others leads to the loss of common users. Currently, the detection and control of malicious users in mobile social applications mainly depend on users' reports, which is not timely. In this paper, we present the approaches to identify the malicious users according to information integrity, behavior characteristics and conversation content in early time. Considering statistical methods, we propose the Time Series (TIME) model based on the analysis of users' time behavior characteristics. And thinking from the theme of the users' session, the improved Latent Dirichlet Allocation (LDA) malicious topic model is designed which has improved the sensitivity of the model to detect malicious topics. To ensure the feasibility and accuracy of the models, we compare our models with the traditional machine learning methods of Decision Tree (DEC) and Support Vector Machine (SVM) in online dating application. The final evaluation results have demonstrated that the precision of our models has exceeded the traditional model over 8% in the identification of malicious users.

[1]  Krishna P. Gummadi,et al.  Inferring who-is-who in the Twitter social network , 2012, WOSN '12.

[2]  Filippo Menczer,et al.  Online Human-Bot Interactions: Detection, Estimation, and Characterization , 2017, ICWSM.

[3]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[4]  Muhammad Al-Qurishi,et al.  Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks , 2018, IEEE Transactions on Industrial Informatics.

[5]  Ee-Peng Lim,et al.  Detecting product review spammers using rating behaviors , 2010, CIKM.

[6]  Nor Badrul Anuar,et al.  Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..

[7]  Filippo Menczer,et al.  Early detection of promoted campaigns on social media , 2017, EPJ Data Science.

[8]  Hossam Faris,et al.  Feature engineering for detecting spammers on Twitter: Modelling and analysis , 2018, J. Inf. Sci..

[9]  Yu Wang,et al.  Statistical Features-Based Real-Time Detection of Drifted Twitter Spam , 2017, IEEE Transactions on Information Forensics and Security.

[10]  Onn Shehory,et al.  Comments Mining With TF-IDF: The Inherent Bias and Its Removal , 2019, IEEE Transactions on Knowledge and Data Engineering.

[11]  Albert Y. Zomaya,et al.  Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter , 2018, IEEE Transactions on Dependable and Secure Computing.

[12]  Gang Wang,et al.  Unsupervised Clickstream Clustering for User Behavior Analysis , 2016, CHI.

[13]  Danah Boyd,et al.  Detecting Spam in a Twitter Network , 2009, First Monday.

[14]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[15]  Pilsung Kang,et al.  Multi-co-training for document classification using various document representations: TF-IDF, LDA, and Doc2Vec , 2019, Inf. Sci..

[16]  Barbara Carminati,et al.  Risk Assessment in Social Networks Based on User Anomalous Behaviors , 2018, IEEE Transactions on Dependable and Secure Computing.