Detecting spams in social networks using ML algorithms - a review

The social network, by the name which has popularised in today's world and growing rapidly at all times and controlling over mankind. The social networks like Twitter, Facebook, and LinkedIn, etc., have become a regular and daily usage of many people. It becomes a good mediator for the people who would like to share some posts, are some of their own videos, or some messages. But there has been major issues that the particular user of the social networks like Twitter and Facebook have the problem of indiscipline actions which we call as spam, by the third person who is knowingly doing this to spoil their intention and good opinion upon each other. Also, these spams help to steal information about the people who using social networks. In this paper, we study and analyse about the spam in social networks and machine learning algorithms to detect such kind of spams. This paper also focuses on the ML algorithms detection rate and false positive rate over different datasets.

[1]  Michalis Faloutsos,et al.  Detecting Malicious Facebook Applications , 2016, IEEE/ACM Transactions on Networking.

[2]  Harpreet Kaur,et al.  Spatial big data analytics of influenza epidemic in Vellore, India , 2014, 2014 IEEE International Conference on Big Data (Big Data).

[3]  M. N. Masrek,et al.  Comparison of Machine Learning algorithms performance in detecting network intrusion , 2010, 2010 International Conference on Networking and Information Technology.

[4]  Anthony Corso,et al.  We Know Where You Are Tweeting From: Assigning a Type of Place to Tweets Using Natural Language Processing and Random Forests , 2014, 2014 IEEE International Congress on Big Data.

[5]  H. N. Suresh,et al.  A novel method for image processing using Particle Swarm Optimization technique , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[6]  Samit Bhattacharya,et al.  Classification of web pages on attractiveness: A supervised learning approach , 2012, 2012 4th International Conference on Intelligent Human Computer Interaction (IHCI).

[7]  R. I. Woodward,et al.  Self-optimizing mode-locked laser using a genetic algorithm , 2016, 2016 Conference on Lasers and Electro-Optics (CLEO).

[8]  Chao Yang,et al.  CATS: Characterizing automation of Twitter spammers , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[9]  AbdulMalik S. Al-Salman,et al.  Combating Comment Spam with Machine Learning Approaches , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).

[10]  Binxing Fang,et al.  Detecting Tag Spam in Social Tagging Systems with Collaborative Knowledge , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

[11]  Vo Thi Ngoc Chau,et al.  Automatic de-identification of medical records with a multilevel hybrid semi-supervised learning approach , 2016, 2016 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF).

[12]  Mehrdad Jalali,et al.  Spam detection in social networks: A review , 2015, 2015 International Congress on Technology, Communication and Knowledge (ICTCK).

[13]  Nikola Vlahovic An evaluation framework and a brief survey of decision tree tools , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[14]  Blake D. Bryant,et al.  IEEE Transactions on Information Forensics and Security , 2018 .

[15]  Paolo Gastaldo,et al.  Semi-supervised machine learning approach for unknown malicious software detection , 2014, 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings.

[16]  Bo Sun,et al.  A survey of user classification in social networks , 2015, 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[17]  Xiao Chen,et al.  6 million spam tweets: A large ground truth for timely Twitter spam detection , 2015, 2015 IEEE International Conference on Communications (ICC).

[18]  Michal Prilepok,et al.  Spam Detection Based on Nearest Community Classifier , 2015, 2015 International Conference on Intelligent Networking and Collaborative Systems.

[19]  Rishabh Kaushal,et al.  Ecosystem of spamming on Twitter: Analysis of spam reporters and spam reportees , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[20]  Jiawei Han,et al.  Survey on web spam detection: principles and algorithms , 2012, SKDD.

[21]  Nik Bessis,et al.  A hybrid spam detection method based on unstructured datasets , 2017, Soft Comput..

[22]  Jun Zhang,et al.  A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection , 2015, IEEE Transactions on Computational Social Systems.

[23]  Alex Alves Freitas,et al.  Towards the automatic design of decision tree induction algorithms , 2011, GECCO.

[24]  Tahir Mehmood,et al.  Machine learning algorithms in context of intrusion detection , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).

[25]  G. Usha Devi,et al.  Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles , 2017, Cluster Computing.

[26]  Uzma Maroof,et al.  Analysis and detection of SPIM using message statistics , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[27]  Deng Libao,et al.  A Hybrid Mutation Scheme-Based Discrete Differential Evolution Algorithm for Multidimensional Knapsack Problem , 2016, 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC).

[28]  Na Li,et al.  Detecting and filtering instant messaging spam - a global and personalized approach , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[29]  Tiago A. Almeida,et al.  TubeSpam: Comment Spam Filtering on YouTube , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).

[30]  Kelton A. P. Costa,et al.  Spam intrusion detection in computer networks using intelligent techniques , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[31]  Thomas M. Chen,et al.  Proliferation and Detection of Blog Spam , 2010, IEEE Security & Privacy.

[32]  Sunil B. Rathod,et al.  Content based spam detection in email using Bayesian classifier , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[33]  Fabricio A. Breve,et al.  Combined unsupervised and semi-supervised learning for data classification , 2016, 2016 IEEE 26th International Workshop on Machine Learning for Signal Processing (MLSP).

[34]  Lin Zhang,et al.  Exploring mobile users and their effects in online social networks: A Twitter case study , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[35]  Rim Faiz,et al.  SVM based approach for opinion classification in Arabic written tweets , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[36]  Bin-Xing Fang,et al.  Comparison of machine learning algorithms in Chinese Web filtering , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[37]  Phivos Mylonas,et al.  Types of contextual information in the social networks era , 2016, 2016 11th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP).

[38]  Weiqing Sun,et al.  Efficient spam detection across Online Social Networks , 2016, 2016 IEEE International Conference on Big Data Analysis (ICBDA).

[39]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[40]  Jenq-Haur Wang,et al.  Using Inter-comment Similarity for Comment Spam Detection in Chinese Blogs , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[41]  Paolo Gastaldo,et al.  A machine learning approach for Twitter spammers detection , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).

[42]  M. Manoj Finest Source-Based Refinery of Spam in Networks , 2017 .

[43]  Ahmed Hamza Osman,et al.  Enhancement of spam detection mechanism based on hybrid $$\varvec{k}$$k-mean clustering and support vector machine , 2015, Soft Comput..

[44]  Zhong Chen,et al.  SpamClean: Towards Spam-Free Tagging Systems , 2009, 2009 International Conference on Computational Science and Engineering.

[45]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.