SlideShare a Scribd company logo
Detection of Spam
Tipping Behaviour on
Foursquare
Anupama Aggarwal¶, Prof P. Kumaraguru “PK”¶ ,
Prof J. Almeida*
¶

Indraprastha Institute of Information Technology (IIIT-Delhi, India)
* Universidade Federal de Minas Gerais (UFMG, Brazil)

1
Foursquare 101
‣ Location Based Social Network
‣ 33 Million Users *
‣ 3.5 Billion checkins *
‣ 31% of mobile social media users use Foursquare *

* As of January 2013

2
Location
Sharing
OSN

Foursquare 101

Friends Activity

Your Last
Checkin

Venue

Friends
Suggestions

Venue
Suggestions
Tip : Suggested Activity
for a Venue
Tip can be Liked or Saved
Spam Tips
Advertising / Marketing

‣ Tips unrelated to Venue

Scam / Phishing

4
Spam
according to

Foursquare ToS
‣ Tips with links to websites selling software, realtor contact
info, a listing for your business, or other promotion
‣ Tips with inappropriate language or negativity directed at
another person
‣ Unauthorized or unsolicited advertising, junk
5
Contributions
‣ Characterizing irregular user behaviour
‣

We observed different categories of spam users

‣

We characterize features distinguishing these spam users

‣ Automatic detection of spammers
‣

Distinguish between spam and legitimate Foursquare users

‣

Cluster spam users into different categories according to their behaviour

6
Data Crawling

2,400,594 tips
613,298 users

7
Observed Categories of
Spam Users
‣ Marketing : These users post tips to promote and
advertise a specific product/ brand / venue / external URL
‣ Malicious : Such Foursquare users post external  URLs in
Tips which direct to spam / phishing / malware websites
‣ Abusive / Derogatory: These users try to deface or
bad-mouth another person
‣ Self Promotion: These users try to draw attention to
themselves
8
Ground Truth Data
Annotation Portal

2,000 Legitimate users
1,900 Spammers
9
Features used to
detect Spammers
‣ User Attributes
‣

Properties of the Foursquare user profile and his checkins

‣ Social Attributes
‣

Friends network of the Foursquare user under inspection

‣ Content Attributes
‣

Details about Tips posted by the Foursquare user
10
Features used
Category

χ2 rank

Feature

User
Attributes

1
3
4
5
11
12
15

Number of Tips
Ratio of Check-ins and Tips
Number of Check-ins
Number of Badges
Number of Mayorships
Ratio of Check-ins and Badges
Number of Photos posted

Social
Attributes

6

Number of Friends

2

Similarity score of Tips

7
8
9
10
13
14

Number of URLs posted
Average number of words in Tips
Average number of characters in Tips
Ratio of number of likes and number of Tips
Average number of spam words in Tips
Average number of phone-numbers posted in Tips

Content
Attributes

11
Few Observations
‣ Spammers post same/similar Tips on multiple venues
‣ A large fraction of spam Tips contain URLs
‣ Spam Tips may also have phone numbers
‣ Legitimate users have more Friends
‣ Spammers have very few Friends but large number of Tips

12
Relation b/w Tips and
Checkins
Tips

Irregular User Behaviour

Check-ins
Tips Distribution

Legitimate users

Spammers

14
Classification Results
Classification
Algorithm

Precision
(Spam)

Precision
(Safe)

Recall
(Spam)

Recall
(Safe)

Accuracy

KNN

83.2%

86.6%

86.3%

83.5%

84.89%

Decision
Tree

88.1%

89.2%

88.3%

85.8%

89.53%

Random
Forest

89.3%

90.2%

88.3%

90.3%

89.76%

15
Detection of Spam Classes
‣ Expectation-Maximization (EM) clustering
‣ Spammers Categories ‣

Advertising / Marketing

‣

Self Promotion

‣

Abusive

‣

Malicious

16
Detection of Spam Classes
‣ Clustering Accuracy for spammer categories -

Advertising

88.23%

Self-Promotion

87.23%

Abusive

78.88%

Malicious

0%

17
Conclusion
‣ Analyzed spammers behaviour on Foursquare
‣ We obtained an accuracy of 89.76% with Random Forest
classifier to distinguish spammers from legitimate users
‣ We classified the spammers into four broad categories
‣ We were able to to detect users belonging to Advertising,
Self-promotion and Abusive categories with an accuracy of
88.23%, 87.23% and 78.88%
18
Future Work
‣ Refine our methodology by use of other classification
algorithms
‣ Use multiclass classification to detect users in any of the
spam categories
‣ Correlation of content and the URLs posted by different
users can help us in identifying several spam campaigns on
Foursquare

19
Thank You!
Questions ?

20
For any further information, please write to
pk@iiitd.ac.in
precog.iiitd.edu.in

21

More Related Content

Similar to Detection of Spam Tipping Behaviour on Foursquare

Learn how personas can shape your optimization program
Learn how personas can shape your optimization programLearn how personas can shape your optimization program
Learn how personas can shape your optimization program
VWO
 
Data Science and Online Dating.pptx
Data Science and Online Dating.pptxData Science and Online Dating.pptx
Data Science and Online Dating.pptx
Piyush Prashant
 
Introduction to Online Dating 2flirts.pptx
Introduction to Online Dating  2flirts.pptxIntroduction to Online Dating  2flirts.pptx
Introduction to Online Dating 2flirts.pptx
jeffwallter1
 
Collective Opinion Spam Detection Bridging Review Networks and Metadata
Collective Opinion Spam Detection Bridging Review Networks and MetadataCollective Opinion Spam Detection Bridging Review Networks and Metadata
Collective Opinion Spam Detection Bridging Review Networks and Metadata
Shebuti Rayana
 
How to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlineHow to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating Online
Paul Bossky
 
When should we ask, when should be measure?
When should we ask, when should be measure?When should we ask, when should be measure?
When should we ask, when should be measure?
Ray Poynter
 
Tinder clone app tinder business model & how it works!
Tinder clone app tinder business model  & how it works!Tinder clone app tinder business model  & how it works!
Tinder clone app tinder business model & how it works!
Moon Technolabs Pvt. Ltd.
 
Dating App Guide 2022: Increasing The Dating App Downloads In Just 2 Months
Dating App Guide 2022: Increasing The Dating App Downloads In Just 2 MonthsDating App Guide 2022: Increasing The Dating App Downloads In Just 2 Months
Dating App Guide 2022: Increasing The Dating App Downloads In Just 2 Months
Moon Technolabs Pvt. Ltd.
 
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
Priyanka Aash
 
#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...
#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...
#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...
Emma Mirrington
 
MKTG521 Circle Tie Marketing Research
MKTG521 Circle Tie   Marketing ResearchMKTG521 Circle Tie   Marketing Research
MKTG521 Circle Tie Marketing Research
Rehab Wahsh
 
Deb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing Summit
Deb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing SummitDeb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing Summit
Deb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing Summit
Ruperta Daher
 
Quality In Action #7: Going Beyond Background Check
Quality In Action #7: Going Beyond Background CheckQuality In Action #7: Going Beyond Background Check
Quality In Action #7: Going Beyond Background Check
Mentoring Partnership of Minnesota
 
Converting Free Users to Paid Users - Fowa Miami 2009
Converting Free Users to Paid Users - Fowa Miami 2009Converting Free Users to Paid Users - Fowa Miami 2009
Converting Free Users to Paid Users - Fowa Miami 2009
Carsonified Team
 
best dating apps chicago
best dating apps chicagobest dating apps chicago
best dating apps chicago
jeniferevans1
 
Connecting with Microsoft Travellers
Connecting with Microsoft Travellers Connecting with Microsoft Travellers
Connecting with Microsoft Travellers
Deb O'Sullivan
 
E marketer traveler_reviews-online_communities_reshape_marketing_strategies
E marketer traveler_reviews-online_communities_reshape_marketing_strategiesE marketer traveler_reviews-online_communities_reshape_marketing_strategies
E marketer traveler_reviews-online_communities_reshape_marketing_strategies
AdCMO
 
Fact-Checking Workshop by API & PolitiFact
Fact-Checking Workshop by API & PolitiFactFact-Checking Workshop by API & PolitiFact
Fact-Checking Workshop by API & PolitiFact
Center for Cooperative Media
 
The Fact Checking Project from the American Press Institute
The Fact Checking Project from the American Press InstituteThe Fact Checking Project from the American Press Institute
The Fact Checking Project from the American Press Institute
Joe Amditis
 
InstaFind Power Point Presentation
InstaFind Power Point PresentationInstaFind Power Point Presentation
InstaFind Power Point Presentation
lhsu0903
 

Similar to Detection of Spam Tipping Behaviour on Foursquare (20)

Learn how personas can shape your optimization program
Learn how personas can shape your optimization programLearn how personas can shape your optimization program
Learn how personas can shape your optimization program
 
Data Science and Online Dating.pptx
Data Science and Online Dating.pptxData Science and Online Dating.pptx
Data Science and Online Dating.pptx
 
Introduction to Online Dating 2flirts.pptx
Introduction to Online Dating  2flirts.pptxIntroduction to Online Dating  2flirts.pptx
Introduction to Online Dating 2flirts.pptx
 
Collective Opinion Spam Detection Bridging Review Networks and Metadata
Collective Opinion Spam Detection Bridging Review Networks and MetadataCollective Opinion Spam Detection Bridging Review Networks and Metadata
Collective Opinion Spam Detection Bridging Review Networks and Metadata
 
How to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlineHow to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating Online
 
When should we ask, when should be measure?
When should we ask, when should be measure?When should we ask, when should be measure?
When should we ask, when should be measure?
 
Tinder clone app tinder business model & how it works!
Tinder clone app tinder business model  & how it works!Tinder clone app tinder business model  & how it works!
Tinder clone app tinder business model & how it works!
 
Dating App Guide 2022: Increasing The Dating App Downloads In Just 2 Months
Dating App Guide 2022: Increasing The Dating App Downloads In Just 2 MonthsDating App Guide 2022: Increasing The Dating App Downloads In Just 2 Months
Dating App Guide 2022: Increasing The Dating App Downloads In Just 2 Months
 
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
 
#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...
#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...
#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...
 
MKTG521 Circle Tie Marketing Research
MKTG521 Circle Tie   Marketing ResearchMKTG521 Circle Tie   Marketing Research
MKTG521 Circle Tie Marketing Research
 
Deb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing Summit
Deb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing SummitDeb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing Summit
Deb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing Summit
 
Quality In Action #7: Going Beyond Background Check
Quality In Action #7: Going Beyond Background CheckQuality In Action #7: Going Beyond Background Check
Quality In Action #7: Going Beyond Background Check
 
Converting Free Users to Paid Users - Fowa Miami 2009
Converting Free Users to Paid Users - Fowa Miami 2009Converting Free Users to Paid Users - Fowa Miami 2009
Converting Free Users to Paid Users - Fowa Miami 2009
 
best dating apps chicago
best dating apps chicagobest dating apps chicago
best dating apps chicago
 
Connecting with Microsoft Travellers
Connecting with Microsoft Travellers Connecting with Microsoft Travellers
Connecting with Microsoft Travellers
 
E marketer traveler_reviews-online_communities_reshape_marketing_strategies
E marketer traveler_reviews-online_communities_reshape_marketing_strategiesE marketer traveler_reviews-online_communities_reshape_marketing_strategies
E marketer traveler_reviews-online_communities_reshape_marketing_strategies
 
Fact-Checking Workshop by API & PolitiFact
Fact-Checking Workshop by API & PolitiFactFact-Checking Workshop by API & PolitiFact
Fact-Checking Workshop by API & PolitiFact
 
The Fact Checking Project from the American Press Institute
The Fact Checking Project from the American Press InstituteThe Fact Checking Project from the American Press Institute
The Fact Checking Project from the American Press Institute
 
InstaFind Power Point Presentation
InstaFind Power Point PresentationInstaFind Power Point Presentation
InstaFind Power Point Presentation
 

More from IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
IIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
IIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
IIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
IIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
IIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
IIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad
 

More from IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 

Detection of Spam Tipping Behaviour on Foursquare

  • 1. Detection of Spam Tipping Behaviour on Foursquare Anupama Aggarwal¶, Prof P. Kumaraguru “PK”¶ , Prof J. Almeida* ¶ Indraprastha Institute of Information Technology (IIIT-Delhi, India) * Universidade Federal de Minas Gerais (UFMG, Brazil) 1
  • 2. Foursquare 101 ‣ Location Based Social Network ‣ 33 Million Users * ‣ 3.5 Billion checkins * ‣ 31% of mobile social media users use Foursquare * * As of January 2013 2
  • 3. Location Sharing OSN Foursquare 101 Friends Activity Your Last Checkin Venue Friends Suggestions Venue Suggestions Tip : Suggested Activity for a Venue Tip can be Liked or Saved
  • 4. Spam Tips Advertising / Marketing ‣ Tips unrelated to Venue Scam / Phishing 4
  • 5. Spam according to Foursquare ToS ‣ Tips with links to websites selling software, realtor contact info, a listing for your business, or other promotion ‣ Tips with inappropriate language or negativity directed at another person ‣ Unauthorized or unsolicited advertising, junk 5
  • 6. Contributions ‣ Characterizing irregular user behaviour ‣ We observed different categories of spam users ‣ We characterize features distinguishing these spam users ‣ Automatic detection of spammers ‣ Distinguish between spam and legitimate Foursquare users ‣ Cluster spam users into different categories according to their behaviour 6
  • 8. Observed Categories of Spam Users ‣ Marketing : These users post tips to promote and advertise a specific product/ brand / venue / external URL ‣ Malicious : Such Foursquare users post external  URLs in Tips which direct to spam / phishing / malware websites ‣ Abusive / Derogatory: These users try to deface or bad-mouth another person ‣ Self Promotion: These users try to draw attention to themselves 8
  • 9. Ground Truth Data Annotation Portal 2,000 Legitimate users 1,900 Spammers 9
  • 10. Features used to detect Spammers ‣ User Attributes ‣ Properties of the Foursquare user profile and his checkins ‣ Social Attributes ‣ Friends network of the Foursquare user under inspection ‣ Content Attributes ‣ Details about Tips posted by the Foursquare user 10
  • 11. Features used Category χ2 rank Feature User Attributes 1 3 4 5 11 12 15 Number of Tips Ratio of Check-ins and Tips Number of Check-ins Number of Badges Number of Mayorships Ratio of Check-ins and Badges Number of Photos posted Social Attributes 6 Number of Friends 2 Similarity score of Tips 7 8 9 10 13 14 Number of URLs posted Average number of words in Tips Average number of characters in Tips Ratio of number of likes and number of Tips Average number of spam words in Tips Average number of phone-numbers posted in Tips Content Attributes 11
  • 12. Few Observations ‣ Spammers post same/similar Tips on multiple venues ‣ A large fraction of spam Tips contain URLs ‣ Spam Tips may also have phone numbers ‣ Legitimate users have more Friends ‣ Spammers have very few Friends but large number of Tips 12
  • 13. Relation b/w Tips and Checkins Tips Irregular User Behaviour Check-ins
  • 16. Detection of Spam Classes ‣ Expectation-Maximization (EM) clustering ‣ Spammers Categories ‣ Advertising / Marketing ‣ Self Promotion ‣ Abusive ‣ Malicious 16
  • 17. Detection of Spam Classes ‣ Clustering Accuracy for spammer categories - Advertising 88.23% Self-Promotion 87.23% Abusive 78.88% Malicious 0% 17
  • 18. Conclusion ‣ Analyzed spammers behaviour on Foursquare ‣ We obtained an accuracy of 89.76% with Random Forest classifier to distinguish spammers from legitimate users ‣ We classified the spammers into four broad categories ‣ We were able to to detect users belonging to Advertising, Self-promotion and Abusive categories with an accuracy of 88.23%, 87.23% and 78.88% 18
  • 19. Future Work ‣ Refine our methodology by use of other classification algorithms ‣ Use multiclass classification to detect users in any of the spam categories ‣ Correlation of content and the URLs posted by different users can help us in identifying several spam campaigns on Foursquare 19
  • 21. For any further information, please write to pk@iiitd.ac.in precog.iiitd.edu.in 21