A Framework for Spam Detection in Twitter Based on Recommendation System

The rapidly growing online social networking sites have been infiltrated by a large amount of spam. Spammers are a particular kind of ill-intentioned users who degrade the quality of OSNs information through misusing all possible services provided by OSNs. Social spammers spread many intensive posts/tweets to lure legitimate users to malicious or commercial sites containing malware downloads, phishing, and drug sales. Given the fact that Twitter is not immune towards the social spam problem, different researchers have designed various detection methods, which inspect individual tweets or accounts for the existence of spam contents. Today, social networks are exposed to various threats that exploit their vulnerability. However, although of the high detection rates of the account-based spam detection methods, these methods are not suitable for filtering tweets in the real-time detection because of the need for information from Twitter’s servers. At tweet spam detection level, many light features have been proposed for real-time filtering; however, the existing classification models separately classify a tweet without considering the state of previous handled tweets associated with a topic. First, they propose the identification of spam tweet by the security approach based on social honeypots and then they propose a method based on an algorithm "content filtering" in order to detect those that are similar to spam tweet detected by the approach of honeypots. Our approach has greatly improved the quality of abstraction in terms of performance and design. The algorithm is also fast and simple to implement. Experimental results show the stability and accuracy (over 99%), F-measure 98% of our approach.

[1]  Jun Zhang,et al.  Detecting spamming activities in twitter based on deep‐learning technique , 2017, Concurr. Comput. Pract. Exp..

[2]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[3]  Danah Boyd,et al.  Detecting Spam in a Twitter Network , 2009, First Monday.

[4]  Komminist Weldemariam,et al.  BINSPECT: Holistic Analysis and Detection of Malicious Web Pages , 2012, SecureComm.

[5]  Alex Hai Wang,et al.  Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[6]  Ponnurangam Kumaraguru,et al.  PhishAri : Automatic Realtime Phishing Detection on Twitter Anupama Aggarwal , 2012 .

[7]  Gianluca Stringhini,et al.  COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.

[8]  Vanyashree Mardi,et al.  Text-Based Spam Tweets Detection Using Neural Networks , 2020 .

[9]  R. Jašek,et al.  APT detection system using honeypots , 2013 .

[10]  V. Caron,et al.  United states. , 2018, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[11]  Virgílio A. F. Almeida,et al.  Detecting Spammers on Twitter , 2010 .

[12]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[13]  Igor Santos,et al.  Twitter Content-Based Spam Filtering , 2013, SOCO-CISIS-ICEUTE.

[14]  Habiba Chaoui,et al.  Detecting Malicious Users in Social Network via Collaborative Filtering , 2017, BDCA'17.

[15]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[16]  Mohammad Zulkernine,et al.  EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference.

[17]  Christos Faloutsos,et al.  Detecting suspicious following behavior in multimillion-node social networks , 2014, WWW.

[18]  Younès El Bouzekri El Idrissi,et al.  A security approach for social networks based on honeypots , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).

[19]  Kyumin Lee,et al.  The social honeypot project: protecting online communities from spammers , 2010, WWW '10.

[20]  Divya,et al.  Techniques to Detect Spammers in Twitter- A Survey , 2014 .

[21]  Sylvio Barbon Junior,et al.  Authorship verification applied to detection of compromised accounts on online social networks , 2017, Multimedia Tools and Applications.

[22]  Kanliang Wang,et al.  A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.

[23]  Chao Yang,et al.  CATS: Characterizing automation of Twitter spammers , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[24]  Michalis Faloutsos,et al.  Efficient and Scalable Socware Detection in Online Social Networks , 2012, USENIX Security Symposium.

[25]  Calton Pu,et al.  Social Honeypots: Making Friends With A Spammer Near You , 2008, CEAS.

[26]  Wael Hassan Gomaa,et al.  Credibility Detection in Twitter Using Word N-gram Analysis and Supervised Machine Learning Techniques , 2020, International Journal of Intelligent Engineering and Systems.

[27]  Xiao Sun,et al.  RETRACTED ARTICLE: Detecting anomalous emotion through big data from social networks based on a deep learning method , 2018, Multimedia Tools and Applications.

[28]  Simon Fong,et al.  Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[29]  J. Prakash,et al.  Detecting Malicious Posts in Social Networks Using Text Analysis , 2016 .

[30]  Juan Martínez-Romo,et al.  Detecting malicious tweets in trending topics using a statistical analysis of language , 2013, Expert Syst. Appl..

[31]  Tshilidzi Marwala,et al.  Automated Detection of Human Users in Twitter , 2015, INNS Conference on Big Data.

[32]  Danna Zhou,et al.  d. , 1934, Microbial pathogenesis.

[33]  Xingshe Zhou,et al.  Autonomic and Trusted Computing , 2010, Lecture Notes in Computer Science.

[34]  Ayon Chakraborty,et al.  SPAM : A Framework for Social Profile Abuse Monitoring , .

[35]  Wei Hu,et al.  Twitter spammer detection using data stream clustering , 2014, Inf. Sci..

[36]  Yi Yang,et al.  Spam ain't as diverse as it seems: throttling OSN spam with templates underneath , 2014, ACSAC.

[37]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.