Submit Search
Upload
Spammer Detection and Fake User Identification on Social Networks
•
0 likes
•
5 views
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i11/IRJET-V10I1103.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
IRJET Journal
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET Journal
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET Journal
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET Journal
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
RESHAN FARAZ
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
cscpconf
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
Recommended
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
IRJET Journal
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET Journal
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET Journal
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET Journal
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
RESHAN FARAZ
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
cscpconf
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
Fake News Detection
Fake News Detection
IRJET Journal
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
IRJET Journal
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
IRJET Journal
PPT.pptx
PPT.pptx
BTechMagcom
Identifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College London
Greg Kawere
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IJERA Editor
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
IJECEIAES
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
IRJET Journal
Fake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
IRJET Journal
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
IRJET Journal
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
ijaia
F017433947
F017433947
IOSR Journals
nm
nm
Zainab Nayyar
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
762019109
762019109
IJRAT
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Spammer Detection and Fake User Identification on Social Networks
Fake News Detection
Fake News Detection
IRJET Journal
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
IRJET Journal
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
IRJET Journal
PPT.pptx
PPT.pptx
BTechMagcom
Identifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College London
Greg Kawere
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IJERA Editor
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
IJECEIAES
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
IRJET Journal
Fake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
IRJET Journal
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
IRJET Journal
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
ijaia
F017433947
F017433947
IOSR Journals
nm
nm
Zainab Nayyar
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
762019109
762019109
IJRAT
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET Journal
Similar to Spammer Detection and Fake User Identification on Social Networks
(20)
Fake News Detection
Fake News Detection
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
PPT.pptx
PPT.pptx
Identifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College London
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
Fake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
F017433947
F017433947
nm
nm
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
762019109
762019109
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
result management system report for college project
result management system report for college project
Tonystark477637
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Recently uploaded
(20)
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
result management system report for college project
result management system report for college project
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Spammer Detection and Fake User Identification on Social Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 26 Spammer Detection and Fake User Identification on Social Networks Prathyusha Bukkaraya1, Dr KSRK Sarma2, 1Student, Department of Computer Science & Engineering, Vidya Jyothi Institute of Technology 2 Associate Professor, Department of Computer Science & Engineering, Vidya Jyothi Institute of Technology ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A huge number of individuals from everywhere the world utilize informal communication destinations. The things that individuals do on person to person communication destinations like Twitter and Facebook immensely affect their day to day routines, in some cases in a not so great kind of way. Spammers utilize famous long range interpersonal communication locales to spread a ton of pointless and unsafe data. For instance, Twitter has become one of the most abused foundations ever. Along these lines, it lets a ton of garbage through. Counterfeit clients send undesirable tweets to different clients to promote administrations or sites, which annoys genuine clients as well as dials back the utilization of assets. Likewise, counterfeit names have made it more straightforward to spread misleading data to clients, which makes it simpler for harming material to get out. Spammers and phony clients on Twitter are currently a well-known subject of concentrate in present day online social networks (OSNs). In this review, we take a gander at a portion of the manners in which that tricksters on Twitter can be found. Likewise, a rundown of Twitter spam location techniques is given, which bunches the strategies by how well they can find: (I) counterfeit substance, (ii) spam in view of URL, (iii) spam in famous subjects, and (iv) Counterfeit individuals. The techniques that are shown are additionally analyzed in view of various attributes, like client qualities, material qualities, chart qualities, structure attributes, and time attributes. We trust that the review we are introducing will be a decent way for specialists to find the main new improvements in Twitter spam distinguishing proof in one spot. Key Words: Spammer Detection, Social Network 1.INTRODUCTION In this study, we take a gander at a portion of the manners in which that tricksters on Twitter can be found. Likewise, a rundown of Twitter spam discovery strategies is given, which bunches the techniques by how well they can find: (I) counterfeit substance, (ii) spam in light of URL, (iii) spam in famous points, and (iv) counterfeit individuals. The techniques that are shown are additionally thought about in light of various attributes, like client qualities, material qualities, chart attributes, structure attributes, and time attributes. We trust that the review we are introducing will be a decent way for specialists to find the main new improvements in Twitter spam recognizable proof in one spot. Fake clients send undesirable tweets to different clients to publicize administrations or sites, which irritates genuine clients as well as dials back the utilization of assets. Likewise, counterfeit names have made it simpler to spread misleading data to clients, which makes it more straightforward for harming material to get out. Spammers and fake clients on Twitter are presently a famous subject of concentrate in current online social networks (OSNs). 2. LITERATURE REVIEW B. Erçahin et, al. (2017) spam on Twitter has turned into an extremely huge issue. Late examination has zeroed in on utilizing measurable qualities of tweets and ML techniques to track down garbage on Twitter. In our marked tweets informational index, in any case, we see that the factual elements of spam tweets change after some time. Subsequently, the presentation of current ML based models deteriorates. "Twitter Spam Float" is the name given to this issue. To tackle this issue, we initially do a profound measurable investigation of 1,000,000 spam tweets and 1,000,000 non-spam tweets, and afterward we think of another Lfun strategy. The arrangement can find "changed" spam tweets among tweets that haven't been named and add them to the method involved with showing the classifier. To test the proposed plan, various investigations are finished. The outcomes show that our recommended Lfun strategy can make spam recognizable proof significantly more precise in reality. F. Benevenuto et, al. (2010) data quality in virtual entertainment is turning out to be increasingly significant, however web-scale information makes it difficult for specialists to assess and fix a ton of some unacceptable data, or "phony news," on these stages. This paper makes an approach to naturally detect counterfeit news on Twitter by figuring out how to foresee the exactness evaluations in two Twitter datasets that emphasis on believability: CREDBANK, which is a publicly supported dataset of precision appraisals for occasions on Twitter, and PHEME, which is a dataset of potential tales on Twitter and editorial appraisals of how genuine they are. We utilize this strategy
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 27 On Twitter content from BuzzFeed's phony news dataset and find that models prepared on publicly supported laborers show improvement over models prepared on writers' assessments or on a dataset that incorporates both publicly supported specialists and columnists. Each of the three records are likewise accessible to general society and are set up similarly. Then, at that point, a component investigation finds the highlights that are the best indicators for public and media evaluations of rightness, and the outcomes are lined up with what has been finished previously. We end by discussing how truth and reliability are unique, and why models made by individuals who aren't specialists are better at finding counterfeit news on Twitter than models made by journalists. S. Gharge et, al. (2017) spammers continue to come to Twitter since it is so well known. Spammers send undesirable tweets to Twitter clients to push sites or administrations that are awful for typical clients. Specialists have thought of various plans to stop con artists. Late work is for the most part about how to utilize ML strategies to way, and designers and specialists can involve Twitter's Streaming Programming interface to get public tweets progressively. Existing ML based streaming spam recognition techniques have not been tried to perceive how well they work. In this review, we attempted to close the hole by assessing accomplishment according to three unique perspectives: information, elements, and models. Utilizing a confidential URL-based security device, in excess of 600 million public tweets were assembled to make a major ground-truth. For constant spam recognizable proof, we likewise took 12 basic characteristics from tweets to use as pointers. The issue of recognizing spam was then different into a paired order issue in the element space. This sort of issue can be addressed by standard ML techniques. We took a gander at how various things, similar to the proportion of spam to non-spam, highlight discretization, preparing information size, information test, time-related information, and ML techniques, impacted the progress of spam discovery. The outcomes show that finding spam tweets progressively is still hard, and that an effective method for finding them ought to consider information, highlights, and a model. T. Wu et, al. (2018) In this review, we take a gander at the issue of finding spammers in informal organizations according to the perspective of blend demonstrating. This assists us with thinking of a legitimate, unstructured method for tracking down spammers. In our technique, we start by giving every client of the interpersonal organization a "highlight vector" that shows how it acts and how it collaborates with different clients. Then, we recommend a factual structure that utilizes the Dirichlet circulation to track down savages. This structure depends on the assessed clients' element vectors. The proposed strategy can in a flash differentiate among spammers and genuine clients, while other unattended techniques need an individual to put casual end settings together to track down spammers. Likewise, our strategy is general as in it tends to be utilized on an assortment of person to person communication locales. To show that the proposed strategy works, we did tests with genuine information from Instagram and Twitter. S. J. Soman at, al. (2016) Policing have a vital impact in examining open information, and they need great ways of figuring out data that could create problems. In actuality, policing see informal communities like Twitter, pushing an eye on what's along on and making profiles of clients. Despite the fact that there are a many individuals who utilize the web, some of them use microblogs to irritate others or spread unsafe data. Grouping clients and sorting out who the savages are is an effective method for disposing of futile substance on Twitter. This work proposes a framework that utilizes a non-uniform examining of elements inside a dark box ML Framework and a variety of the Random Forests Calculation to find savages in Twitter traffic. Tests are finished with both a notable gathering of Twitter clients and another gathering of Twitter clients. The new Twitter assortment is comprised of 54 attributes that depict clients who have been set apart as savages or genuine clients. The aftereffects of investigations show that the upgraded include picking technique works. 3. FEASIBILITY STUDY The feasibility of the project is studied during this phase and some cost estimates are analyzed with a normal plan for the project is taken forward. During the system analysis the feasibility study is carried to make sure that the project is done smoothly and not going to be a load for the company. 3.1 ECONOMICAL FEASIBILITY This study is mainly stressed to check the monetary impact of the system on the organization. It deals with the sum of money that the company can put forth on the research and also for the enhancement is checked. Here we should make sure that the ideal framework should be developed within the spending limit, this can be obtained by using some of the advancements which are freely accessible and only purchasing the products that are unreservedly accessible. 3.2 TECHNICAL FEASIBILITY This study is mainly related to find the technical feasibility, which means it entirely focus on the technical requirements of the framework. There should not be extreme interest on the accessible technical resources for any of the system. If the interest is high on the accessible technical assets it will prompt to high demands of the client. The system which was ought to should have modest
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 28 necessity, with only few or no changes are required to actualize the proposed system. 3.3 SOCIAL FEASIBILITY This study handles with the level of acknowledgement of the system by the user. This study also includes the way of training the user to utilize the system efficiently. The user ought to the system productively and should not compromise with the system. The measure the user accepts the system relies on the way we educate the user by legitimate procedures and should make him acquainted with the system. So that the user feel that he knows the system and his certainty levels will raise to work with the system which is invited accomplishment for a project. 3.4 SCHEDULE FEASIBILITY In this study our main focus is centered on the time to complete the project. A project is said to be fizzled if it takes more computational time to complete before it is being useful. In accordingly, this means it is an estimate to find out how much time the system will take to fully develop, and to find out whether it can be finished in the specified time by using few techniques like payback period. Schedule feasibility is a measure to find how meaningful the project schedule is designed. Whether project is started in time? Is deadline reasonable? Will be finished in time? And whether deadline is necessary or not A small deviation can be implied in the original schedule which was opted at the beginning of the project. The project development is doable as far as schedule is considered. 4. SYSTEM REQUIREMENTS 4.1 SOFTWARE REQUIREMENTS The utilitarian prerequisites or general portrayal papers incorporate the item's perspective and elements, the working framework and work space, pictures needs, plan cutoff points, and client directions. The utilization of targets and execution limits gives a wide image of the task's assets and shortcomings and how to manage them. Python Idel 3.7 Version (or) Anaconda 3.7 (or) Jupiter (or) Google Colab 4.2 HARDWARE REQUIREMENTS The base equipment needs fluctuate a great deal on the product that a given Enthought Python, Covering, or Versus Code client is making. Applications that need to store a great deal of things or gatherings in memory will require more RAM, while applications that need to do a ton of math or occupations rapidly will require a quicker processor. Operating System: Windows, Linux Processor: Minimum Intel i3 Ram: Minimum 4 GB Hard Disk: Minimum 250 GB 5. SYSTEM ARCHITECTURE The techniques shown are likewise looked at in light of various qualities, like client attributes (retweets, tweets, companions, and so on) and message attributes (messages in tweets). 1) Fake substance: In the event that a record has few fans contrasted with the quantity of individuals who follow it, it's doubtful to be reliable and bound to be spam. Similarly, satisfied based highlights incorporate the standing of tweets, HTTP connections, remarks and replies, and "moving" topics. For the time capability, a record is a spam account in the event that it sends a ton of tweets in a specific measure of time. 2) Spam URL Identification: The individual based highlights are found by seeing things like how old the record is and the number of favorites, records, and tweets the client has. The JSON design is handled to find the client based highlights that have been found. Then again, tweet-based highlights incorporate how much (I) answers, (ii) hashtags, (iii) client remarks, and (iv) URLs. We will involve a technique for ML called Nave Bayes to check in the event that a spam URL is in a tweet. 3) Tracking down Spam in Moving Points: In this technique, the text of tweets will be arranged by the Naive Bayes calculation to check whether they contain spam words or not. This program will search for garbage URLs, words with grown-up happy, and tweets that are something very similar. On the off chance that Nave Bayes thinks a tweet is SPAM, it will return 1, and on the off chance that it doesn't believe it's SPAM, it will bring 0 back. 4) Fake Client ID: These incorporate how much companions and individuals who follow the record, the age of the record, and so forth. Then again, satisfied highlights are attached to the tweets that clients post. Spam bots post a ton of comparable substance, while individuals who don't spam don't post copy tweets. In this technique, characteristics (following, follows, and tweet content to track down spam or non-spam content utilizing Naive Bayes Calculation) will be taken from tweets and afterward put into spam or non-spam classes utilizing Naive Bayes Calculation. Afterward, an
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 29 random forest technique will be utilized to prepare this element to sort out whether or not a record is phony or not. The features.txt record is where the extricated elements will be all saved. Naive Bayes classifier is saved in the ‘model' envelope. Fig 5.1: Proposed Methodology 6. IMPLEMENTATION It involves creating a robust data pipeline to collect user activity, employing machine learning algorithms such as Random Forest or deep neural networks for pattern recognition, utilizing feature engineering to capture behavioral nuances, and integrating APIs of popular social networks for real-time monitoring. Additionally, a user reporting mechanism and automated analysis of reported content could be implemented to enhance the accuracy of the system and facilitate continuous improvement. 6.1 MODULES 1. Upload Twitter JSON Format Tweets Dataset: Utilizing this module, I'm adding the "tweets" envelope, which has tweets from various clients in JSON design. We can see all tweets from all clients stacked. 2. Load Naive Bayes To Analyze Tweet Text or URL: You can stack the Naive Bayes calculation with this bundle. 3. Detect Fake Content, Spam URL, Trending Topic & Fake Account: Utilizing this apparatus, you can utilize Nave Bayes classifier and different strategies to really look at each tweet for counterfeit substance, spam URLs, and phony records. 4. Run Random Forest Prediction: Utilizing this module to prepare an random forest classifier with separated tweet highlights. This random forest classifier model will be utilized to anticipate/recognize fake or spam represents future tweets. 5. Detection Graph: You can utilize this instrument to figure out the number of tweets, spam, and fake records there are. 6.2 SOFTWARE ENVIRONMENT Python is a universally useful deciphered, intuitive, object- situated, and high level programming language. Python was made during the year 1985-1990 by Guido van Rossum. As like Perl, Python source code can be accessible in the GNU General Public License (GPL). Python programming language utilizes little English catchphrases regularly where as other programming languages utilizes hard syntax, and it has less grammatical development when contrasted with different languages. Python is known to be straightforward uncommon programming language. 6.3 FUNCTIONS IN PYTHON It is possible, and extremely valuable, to characterize our very own functions in Python. As a rule, in the event that you have to complete a figuring just once, at that point utilize the interpreter. 6.3.1 Variables The term variables in programming language refer to the memory locations that are used to store values. So when we create a variable the interpreter allocates some memory to the variable based on the data type of the variable and it also decides which type of data to be stored in the memory reserved for that variable. So by using different data types we can store different data which are useful for our programming. For example we can store different data such as integers, characters, strings and also decimal numbers based on our requirement. 6.3.2 Standard Data Types When writing programs we need to work with different types of data. Python provides provision to work with different types of data such as integers, decimal numbers, characters, strings and many more. Python provides various data types that help us to use different type of data. Based on the type of data the interpreter automatically allocates memory for the data. 6.4 MODULES 6.4.1 NUMPY Numpy is one of the fundamental packages that help for scientific computation with the help of python. NumPy makes the programming language Python all the more dominant information structures, permits the usage of multi- dimensional arrays and matrices. These information structures give certification to proficient computations with matrices and furthermore arrays. This
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 30 usage is even pointed on enormous matrices and furthermore exhibits, which are surely understand under the name of "Big data". In addition to this it also provides a large library of high-level mathematical functions which can operate on matrices and arrays. Other than its conspicuous logical uses, NumPy can likewise be utilized as a productive multi-dimensional compartment of conventional information. Subjective information types can be characterized utilizing Numpy which permits NumPy to consistently and quickly coordinate with a wide assortment of databases. To install numpy via pip command: Pip installs numpy 6.4.2 PANDAS Pandas are data manipulation tool which was developed by Wes McKinney. Pandas are worked over the Numpy bundle and its key information structure is known as the Data Frame. Data Frames enable us to store and furthermore to control tabular information in the rows of perceptions and in the columns of factors. Pandas is the most popularly used library for data analysis. To import pandas data structure into python environment we use import pandas as pd 6.4.3 SKLEARN Scikit-learn gives a wide scope of managed and furthermore solo learning calculations with the assistance of reliable interfaces in Python. It is a free AI library accessible for python programming. Scikit-learn, yields an estimator is a Python object that can actualize the methods such as fit(X, y) and predict (T). SVC, which executes the help vector order. Scikit-learn are authorized under a tolerant disentangled BSD permit. Components of scikit-learn: Scikit-learn library comes with a lot of features: 6.4.4 SUPERVISED LEARNING ALGORITHMS Think about any regulated learning calculation you may have found out about and there is an exceptionally high shot that it is a piece of scikit-learn. Starting from Generalized models (e.g Linear Regression), Support Vector Machines (SVM), Decision Trees to Bayesian strategies – all of them use a part of scikit-learn tool compartment. The usage of calculations is one of the main reasons behind the extreme use of scikit-learn. We began utilizing scikit to tackle administered learning issues and would prescribe that to individuals new to scikit/AI too. 6.4.5 MATPLOTLIB Matplotlib is one of the plotting library which can be used for 2D graphics in python programming language. It can also be helpful in scripts of python, shell, GUI toolkits and also in other web application servers. There are numerous different toolboxes which are accessible that can expand python matplotlib usefulness. In any case, some of them need separate downloads, others can be delivered with the assistance of matplotlib source code however need outside conditions. Matplotlib makes easy things and also makes hard things possible. By using this we can generate plots, bar charts, error charts, scatterplots, histograms, power spectra, etc. 6.4.6 KERAS Keras is the Open Source Neural Network library which was written in Python that runs on top of Tensor flow. It was designed to be fast and very easy to use. It was developed by a Google engineer, François Chollet. Keras is a High-Level API which handles the manner in which we do models, by characterizing layers, or setting up different info yield models. In this level, Keras assembles our model with preparing process with fit capacity and furthermore misfortune and streamlining agent capacities. Keras doesn't deal with any low-level calculations. Keras won't deal with Low- Level API, for example, making the computational chart, making tensors or different factors since it was being dealt with by the "backend" motor. Rather, it deals with all these by utilizing another library to do it, which is known as the "Backend. So we presume that Keras is an abnormal state API wrapper for the low- level API, which is skilled to keep running on above of TensorFlow or Theano and it is an API which was intended for people and not for machines. Keras offers a straightforward and steady APIs, it additionally limits the quantity of client activities that are required for the basic use cases and furthermore gives an unmistakable input on client mistake which makes it simple to learn and utilize 6.4.7 TENSOR FLOW Tensor Flow is a free and open-source programming library utilized for dataflow and differentiable programming over an extent of endeavors. It is a significant math library, and is furthermore used for AI applications, for instance, neural systems. It is used for both research and age at Google. 7. RESULTS AND OUTPUT SCREENS Fig 7.1: Transfer Twitter JSON Arrangement
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 31 Fig 7.2: Tweets Organizer Fig 7.3: Tweets from all Individuals Fig 7.4: Tweets Assortment In the screen over, the qualities were all taken from the tweets assortment and afterward broke down to sort out regardless of whether a tweet is spam. In the text region over, each record's qualities are separated by a clear line, and each tweet record shows values like TWEET TEXT, Devotees, FOLLOWING, and so forth, as well as whether the record is phony or genuine and regardless of whether the tweet text has spam words. Presently, click the "Run Random Forest Forecast" button to prepare an arbitrary woods classifier with the recovered tweet highlights. This arbitrary backwoods classifier model will be utilized to anticipate/identify phony or spam represents future tweets. Look down over the text region to see each tweet's data. Fig 7.5: Random Forest Guage Fig 7.6: Spammer and Fake User Identification In the above picture, the x-hub shows the quantity of tweets, fake records, and tweets with spam words, and the y-pivot shows the number of every there are. Above is a Location Chart that shows the complete number of tweets, spam, and fake accounts. In the above picture, the x-hub shows the quantity of tweets, fake accounts, and tweets with spam words, and the y-pivot shows the number of every there are. 8. CONCLUSION Utilizing the above techniques, we can sort out whether or not a tweet is a typical message or spam. By finding and disposing of these garbage messages, you can assist informal communities with getting a decent name on the lookout. In the event that informal organizations didn't dispose of spam posts, they would lose clients. Presently, a great many people depend on interpersonal organizations to learn about news, business, and family. Protecting social networks from spammers can assist them with acquiring a decent picture. 9. REFERENCES [1] B. Erçahin, Ö. Aktaş, D. Kilinç, and C. Akyol, ‘‘Twitter fake account detection,’’ in Proc. Int. Conf. Comput. Sci. Eng. (UBMK), Oct. 2017, pp. 388–392.
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 32 [2] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, ‘‘Detecting spammers on Twitter,’’ in Proc. Collaboration, Electron. Messaging, AntiAbuse Spam Conf. (CEAS), vol. 6, Jul. 2010, p. 12. [3] S. Gharge, and M. Chavan, ‘‘An integrated approach for malicious tweets detection using NLP,’’ in Proc. Int. Conf. Inventive Commun. Comput. Technol. (ICICCT), Mar. 2017, pp. 435– 438. [4] T. Wu, S. Wen, Y. Xiang, and W. Zhou, ‘‘Twitter spam detection: Survey of new approaches and comparative study,’’ Comput. Secur., vol. 76, pp. 265– 284, Jul. 2018. [5] S. J. Soman, ‘‘A survey on behaviors exhibited by spammers in popular social media networks,’’ in Proc. Int. Conf. Circuit, Power Comput. Technol. (ICCPCT), Mar. 2016, pp. 1–6.
Download now