SlideShare a Scribd company logo
2017 IEEE/WIC/ACM International Joint Conference on Web Intelligence(WI) and IntelligentAgent
Technologies(IAT)
Spammer Taxonomy Using Strategic Approach over bench Mark structural Social
Networks Attributes
Balogun Abiodun Kamoru1,
Azmi B. Jaafar2,
Masrah Azrifah Azmi Murad3
, Marzanah Binti Jabar4
Department of information Systems and Software Engineering, Faculty of Computer Science and Information
technology,Universiti Putra Malaysia, Serdang 43300,Selangor D.E.Malaysia.
e-mail: balogun@consultant.com, Azmij@upm.edu.my, Masrah@upm.edu.my, Marzanah@upm.edu.my
Abstract
Social network has become so popular with overwhelming high rate of growth, due to this popularity theonline social
networks is facing the issues of spamming, which has leads to unsubstantialeconomic loss to this menace of spamand
spammers activities. It has leads to uncontrollable dissemination of viruses and malwares, promotionalads, phishing, and
scams. spam activities has enter a new dangerous dimension, the spammers have step up their games and tactics online
social networks, it consumes large amounts of network bandwidth leading to less revenue and significant economic loss to
both private and public sectors. From the previous scholars work on spammer classification taxonomy, various machine
learning techniques have been extensively used to detect spamactivities and spammers in online social networks. There are
various classifier that are learn over content-based features extracted from theuser's interactions and profiles to label them
as spam/spammers or legitimate. But recently, new network structural bench mark features have been proposed for
spammer detection task, but their importance using structuralbench mark learning methods has not been extensively
evaluated yet. In this research work, we evaluate thethe metric performance of some structuralbench mark learning methods
using scientific and strategic approach based attributes extracted from an interaction network for the task of spammer
detection in online social network.
General Word: Spam Detection, Bench Mark. Information Security
Keywords: Social Network Security; Spam Detection; Spam taxonomy; Machine Learning; Strategic/Scientifc
Approaches/Techniques.
I. INTRODUCTION
spam and spamming activities are undoubtedly a very serious problem in online social
networks, spam has really enter a dangerous dimension which prompt response from the
various research scholars to embark on the spammer classification taxonomy. one of the big
challenges and issues faced by online social networks(OSN) is to deal with undesirable users
and their malicious users (spammers) to project irrelevant information to as large number of
legitimate users as possible. The motive behind spamming commonly includes promoting
products, Viral marketing, spreading fads, espionage activities, cyber war, and in some cases
possibly to harass legitimate users to decrease their trust in a particular services [1]. Thus,
spam email is ubiquitous and so is its usage abusive.
According to Symantec Intelligence Report,(SIR,2017) [2] indicate that the global ratio of
spam in email traffic is 71.9% , furthermore, adversaries have taken advantage of the ability
to send countless emails anonymously, at the speed of light, to carry on vicious activities ( e.g
advertising of fake gods or medications, scams causing financial losses or even severely, to
commit cyber crimes e.g child pornography, identity theft, phishing and malware
distribution, Son Dinh et al,2015 [3].
It becomes highly important to devise a scientific and strategic approaches and techniques to
identify spammers and their behaviour in social network attributes, along this critical
direction many spammer and spam detection methods have been proposed by previous and
existing scholars, which are mostly based on based content analysis of users’ interaction data
value, many counter filtering techniques based on the usage of non-dictionary words and
images in spam objects are often employed by spammers. Content-based spam filtering
systems also demand high value computations. Some spammer detection methods and
techniques are based on learning classification models from network-based topological
features of the interacting nodes in social networks, the attributes includes degree, out-degree,
reciprocity, clustering coefficient.etc.
The impact of social spam is already significant. A social spam message is potentially seen
by all the followers and recipients’ friends. Even worse, it might cause misdirection and
misunderstanding in public domain especially social networks like Facebook, Twitter, Sina
weibo, Tagged, Badoo, Orkut, LinkedIn, my space etc [4].According to Khurana and Kumar
[4], it gives the types of spammers as the following: (a) Fake Users (b) Phishers (c)
Promoters (d) Spammers.
 Fake Users: are the users who impersonate the profile of a genuine users to send
spam content to the friends’ of that user or other users in the network.
 Phishers: are the users who behave like a normal user to acquire personal data of other
genuine users.
 Promoters: are the one who sends malicious links of advertisements or other
promotional links to others so as to obtain their personal information.
 Spammers: are the malicious users who contaminate the information presented by the
legitimate users and in turn pose a risk to the security and privacy of social networks.
Spammers belong to one of the following categories.
While the motives of the spammers are as follows:
 Phishing attacks
 Disseminate pornography
 Spread viruses
 Compromise system reputation.
Recently,in [8], we have proposed some community-based topological features to learn
improved classification models for identifying spammers in online social networks. However,
the results only spanned over single classifiers. In this paper, we aim to evaluate the
performance metrics of the proposed attributes in [8] for learning scientific approach models
on bench mark structural classification, the three bench mark structural learning methods use
are the following- Bagging, Boosting, and Stacking over topological features extracted from
a real-world interaction network with artificially planted spammers on social networks, the
results are generated for both single and bench mark structural classifiers to evaluate their
performance metrics.
Within the past few years, online social networks such as Facebook, Twitter, Weibo, etc, has
become one of the major way for the internet users to keep communications with their
friends. According to Statista report [5] , the number of social network users has reached 1.61
Billion until late 2013, and is estimated to be around 2.33 Billion users globe, until the end of
2017.
With great technical and commercial success, social network platform also provides a larger
amount of opportunities for broadcasting spammers, which spreads malicious messages and
behaviour. According to Nexgate’s report [6] [7] during the first half of 2016, the growth of
social spam has been 355%, much faster than the growth rate of accounts and messages on
the most branded social networks.
II. RELATED WORK
Spam detection methods and techniques usually involve two approaches-content-based
learning and topology based learning. The main idea behind content-based learning revolves
around the observation that spammers use distinguished keywords, URLs, etc. in their
interactions and to define their profiles . such content based attributes are used to learn
classification models to label messages and profiles as legitimate or spam [9]. However, such
approach is often deceived by spammers using copy profiling and content obfuscation. On
the other hand, topology-based learning methods aim to exploit structural social network
attributes like clustering coefficient, community structures, reciprocity, degree,etc. to
characterize network behaviour of legitimate and spammer accounts.
Shrivastava et al. [10] incorporated attributes including clustering coefficient and
neighbourhood independence to deal with Random Link Attacks from spammers. Bhat and
Abulaish [11] extracted features in-links, out-links, cross-links, etc, from a web graph to
classify pages as spam or benign. Other methods include finding physical node clusters based
on network-level attributes from online communication networks[12]. To detect spam
clusters, Gao et al [13] used two widely acknowledged distinguish features of spam
campaign-distributed coverage and bursty nature, the distributed property is quantified using
the number of users that send wall posts in the cluster, whereas the busty property is based on
the intuition that most spam campaigns involve coordinated action by many accounts within
short periods of time [14]. The methods proposed in[8] and [15] used a community
detection method to split the interaction network into communities and then extract
community –based attributes of network nodes (users) to classify them as a spammers or
legitimate.
One of the limitations of the approaches and techniques mentioned earlier is the
classification models used by them are mostly single. In the literature, there exist bench mark
structural classification methods that can be used to improve the performance metrics of
classifiers by learning multiple models over the same training example set and then using
some aggregation method to decide upon a single combined label determined by multiples
classifiers. Although , some Bench Mark Structural Methods have been used in content-
based classification of spammers, they have not yet been evaluated for the topological
attributes. however, the use of Bench Mark Structural learning methods for improving the
performance metrics of spam detection methods has been adopted by many researchers, but
the studies have been mainly oriented towards content-based classification. In [16], the
authors used an ensemble approach or Bench Mark Structure method with sampling
classification strategy incorporating C4.5, bagging, and ada boost. Their results using
Ensemble approach or bench mark structure method showed improvement in web spam
detection performance metrics effectively. Using a text corpus, the authors in [17] aimed to
show the significance of bench mark structure method classifiers for spam detection.
However, they failed to show any significant improvement in the task. In [18] , the authors
highlighted the high performance of Bench Mark method Classifiers involving Adaboost,
Stacking and Decision Tree, against the best and excellent performances of single classifiers
for e-mail spam detection using a content-based approach. In [15], the authors showed that
the classifier proposed by Caruana et al. performed better than the most individual and
classifiers implemented in WEKA for the[18] task of email spam detection. In [11] , the
authors exploited both content-based and link-based features to compile a minimal attributes
set that can be computed incrementally in a quick manner to allow intercepting spam. They
also showed that for a selected feature set, Bench mark Classification techniques previously
published method and the web spam challenge 2008-2016 best results.
III. ENSEMBLE METHODS OR BENCH MARK STRUCTURAL METHODS
The Ensemble method or Bench Mark Structural Method classifiers group multiple machine
learning instances to improve the classification results of a system. It is based on the
assumption that combination of multiple classifiers may be able to produce an overall
classifier which is more stable and accurate than any of its components. According to
Dietterich [19], the performance metric advantage of ensemble classifiers can be attributed
to three key factors: (i) By Combining multiple hypotheses to form an ensemble; their votes
are averaged and the risk of selecting an incorrect hypotheses is reduced, (ii) by starting a
local search in different locations; ensemble can provide a better approximation of the true
underlying, (iii) a weighted sum of the hypothesis within the ensemble, which may extend the
space of representable hypotheses to allow a more accurate representation.
A brief description of the three mostly used ensemble methods or bench mark structural
methods is given in the following paragraphs.
I. BAGGING
Bootstrap aggregation (or bagging), proposed by Quilan [20] , involves training multiple
instances of classifiers on a sample of training examples which are taken at random with
replacement (bootstrap sample). Finally, the labels of the test samples are determined by a
majority vote of each internally learned classifier.
II. BOOSTING
Boosting is referred to Arcing (Adaptive Resampling and Combining) [20], boosting first
involves assigning weights to the training set instances, then on each learning iteration it
increases and decreases the weights for misclassified and correctly classified instances,
respectively. The difficulty of learning problem is effectively increased on each iteration,
with an attempt to minimize the weighted error on training set. It involves repeatedly learning
a weak classifier on various distributed samples of the training data. The classifiers learnt at
each step are then combined into a single strong classifier to achieve a higher accuracy than
the individual components. The final classification decision is a combination of the decisions
made in all rounds, namely a weighted majority vote, where decisions with lower
classification error have higher weight.
III. STACKING
Stacking is an ensemble learning approach or bench mark structural methods which aims to
determine the reliability of its constituent individual classifiers (often different models) to
achieve the highest generalization accuracy [11]. It Involves using a meta-learner, which uses
the predicted classification of the constituent classifiers as input attributes. The meta-
classifier is used to reflect the true performance metric measure of the individual constituent
classifiers.
IV. EXPERIMENTAL AND OBSERVATION RESULT
The main and major aim of this paper is to come up with the evaluation on the performance
metrics of the ensemble classifier or bench mark classifier for spam detection and spammer in
online social networks. In order to do so, community-based structural attributes proposed in
[10] are extracted from a real-world social network dataset with artificially planted
spammers. We compare the performance metric of multiple classifiers including decision
tress, Naivebayes, and k-NN and their ensemble variants implemented in WEKA [21]
software.
Y P(Out-degree=y)
1 0.664
2 0.171
3 0.07
4 0.04
5 0.024
6 0.014
7 0.01
8 0.07
TABLE 1: SPAMMER OUT-DEGREE DISTRIBUTION
A. DATASET
For experimental work, we use a real- world social network dataset representing the wall
post activity of about 63891 Facebook users [22]. The nodes in this network are considered to
be legitimate nodes. We inject additional nodes in the network to simulate spammer behavior.
In this view, we subsequently filter out all the nodes having zero in-degree or out-degree, and
any isolated nodes from the network to represent them as legitimate networks. This results in
a network which 32693 legitimate nodes. Thereafter, in order to simulate spammers, we
generate a set of 1000 isolated nodes for the legitimate network, which create out-links to
randomly selected nodes in the legitimate network. The out-links or the out-degree generated
for the spammers are not random but follow. The messages of the spammers are expected to
be leaqst often reciprocated. Thus, the probability of a legitimate node replying to a spammer
is set to 0.05 [23].
In order to make the detection task more difficult, we generate another set of 1000 spammer
nodes, which try to mimic the clustering property of legitimate nodes. In order to do so, we
have used the LFR- benchmark generator [24] to generate a directed network of 1000 nodes
with embedded community structures. The LFR-benchmark parameters used to generate the
network are shown in Table II.
Parameter Description Value
N Number of nodes 1000
K Average degree 15
Kmax Max degree 60
Cmin Minimum community size 15
Cmax Maximum community size 60
𝜕 Degree exponent -1
₾ Community exponent -1
µ Mixing parameter 0.1
TABLE II : LFR-BENCHMARK PARAMETER DESCRIPTION AND VALUES
Now, for each node in the synthetic network, we rewire a set of its out-links towards a set of
randomly selected nodes in the legitimate network such that spamming out-degree i.e the
rewired out-links follows the distribution given Table I, In this regard, a total of 2000
spammer nodes (out of which 1000 mimic the clustering property of legitimate nodes) are
added to the legitimate network resulting in a total of 34693 nodes. Thereafter, we extract
community -based features proposed in [12]from the network.
B. RESULTS
In order to evaluate the significance of the bench mark structural method using community-
based structural features, we learn a set of classifiers from WEKA classifier on the training
examples containing the community-based features from the datasets mentioned in the
previous section. We evaluate the performance metrics of the three classifiers including J48
(decision-tree) [25], IBk (k-NN using k=5 nearest neighbors) [26], and NaiveBayes [27] by
considering them individually and also by using bagging, boosting and stacking over them.
We use 10-fold cross validation for each classifier on the dataset to evaluate performance
metric.
Table III presents the performance metrics (averaged for the two classes) of the various
individual classifiers on the dataset with planted spammers, wherein it is clear that the
decision tree based classifier J48 performs better than the two classifiers.
Classifier
(Individual)
TP
Rate
FP
Rate
Precision Recall F- Measure
J48 0.963 0.075 0.963 0.963 0.963
IBk (k=4) 0.938 0.159 0.159 0.937 0.937
NaiveBayes 0.914 0.175 0.917 0.914 0.915
TABLE III. PERFORMANCE METRICS OF INDIVIDUAL CLASSIFIERS
Tables IV and V present the performance metric of the bagging and boosting bench mark
structural method over the three base classifiers, respectively for the spammer detection task.
It can be clearly seen from the Tables that the performances metrics of J48 and IBk classifiers
using bagging and boosting bench mark structural method approach is better than their
individual performances metrics. However, in case of Naive Bayes classifier, the bench mark
structural method approaches show low performance metrics than their individual
performance for spammer detection task using structural attributes.
Classifier
(Bagging)
TP
Rate
FP
Rate
Precision Recall F- Measure
J48 0.969 0.067 0.969 0.969 0.969
IBk (k=4) 0.941 0.133 0.942 0.941 0.942
Naivebayes 0.706 0.155 0.857 0.706 0.741
TABLE IV: PERFORMANCE METRIC OF CLASSIFIER USING BAGGING BENCH
MARK STRUCTURAL METHOD
Classifier
(Boosting)
TP
Rate
FP
Rate
Precision Recall F- Measure
J48 0.966 0.082 0.966 0.966 0.966
IBk (k=4) 0.938 0.159 0.937 0.938 0.937
NaiveBayes 0.705 0.155 0.857 0.705 0.74
TABLE V: PERFORMANC METRIC OF CLASSIFIER USING BOOSTING BENCH
MARK STRUCTURAL METHOD
Classifier
(Stacking)
TP
Rate
FP
Rate
Precision Recall F- Measure
J48 (Meta) 0.961 0.085 0.962 0.961 0.961
TABLE VI: PERFORMANCE METRIC OF THE STACKING BENCH MARK
STRUCTURE METHOD INVOLVING ALL THREE CLASSIFIER AND J48 AS THE
META CLASSIFIER
TableVI presents the performance metrics of the stacking bench mark structural method
learning approach which incorporates all three classifiers (J48, IBk, Naive Bayes) as its base
classifiers and J48 as its meta classifier. It can be observed that its performance is lower than
the best case of the other two bench mark structural approaches and closer to the individua;
performance metrics of the J48 classifier.
From these results, it can be observed that the bagging bench mark structural learning
approach using J48 classifier performs important better than the individual performance of
IBk and naive bayes classifiers and also better than the other two bench mark approaches, i.e,
boosting and stacking for the task of spammer detection in online social networks.
V. CONCLUSION
Spam detection in online social networks is challenging, but a highly desirable accomplish
task. Numerous machine learning approaches using content-based features have been used in
previous research to detect email spam. Bench Mark learning approaches like bagging and
boosting that aim to improve the efficiency of the individual classifiers exist in literature,
but they have not been extensively evaluated for the spammer detection task. Moreover, new
structural features based on community structures of online social network users have also
been proposed recently for spammer detection. This paper evaluates the performance metrics
of some bench mark learning approaches for the task of spammer detection in online social
networks. The observation of the experimental results reveal that the bagging bench mark
learning approach using J48 (decision tree) base classifier performs better than its individual
model and also better than some other ensemble or bench mark learning approaches for
spammer detection using structural social network attributes.
REFERENCES
[1] Saini Jacob.S, S.Murugappan. " A study of Spam Detection Algorithm on Social Media
Networks" Journal of Computer Science 10 (10) : 2135-2140, 2014. JCS.
[2] Symantec Intellignce Report
SIR2017)https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
[3] Son Dinh, Taher Azeb, Francis Fortin, Djedjiga Mouheb and Mourad Debbabi; "Spam
Campaign Detection, Analysis, and Investigation" From the proceedings ofThe Digital
Forensic Research ConferenceDFRWS 2015 EUDublin, Ireland (Mar 23rd- 26th) 2015.
[4] Girisha Khurana, Marish Kumar; "Review : Efficient Spam Detection on Social network"
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
Vol 3 Issue VI,June 2015.
[5] https://www.statista.com/
[6] nextgate report (https://www.proofpoint.com/us/solutions/social-media-protection-and-
compliance)
[7] Trust evaluation based content filtering in social interactive data, in: proceedings of the
2013 International Conference on Cloud Computing and big Data (CloudCom-Asia),
IEEE,2013,pp.538-542.
[8] De Wang, danesh Irani, Pu Calton; " A Social-Spam Detection Framework" CEAS-
2011,8th Annual Collaboration, Electronic messaging Anti-Abuse and Spam Conference
Sept.1-2, 2011. Perth Australia.
[9] Nasim Eshraqi, Mehrdad Jalali, Hossein Moattar, " Spam Detection In Social Networks:
A Review".2nd International Congress on technology Communication and Knowledge
(ICTCK,2015) November,11-12,2015. Islamic Azad University, Iran.
[10] Shrivastava, N., Majumder, A. and Rastogi, R.; Mining (Social) Network graphs to
detect random link attacks, In Proceedings of the IEEE-24th International Conference on
Data Engineering (ICDE'08), Washington Dc,USA. IEEE Computer Society. pp 486-
495,2008.
[11] Bhat. S.Y., and Abulaish, M." Community-based features for identifying spammers in
online social networks. In Proceedings of 2013 IEEE/ACM International Conference on
Advances in Social Networks Analysis and Mining, pp.100-107,ACM, 2013.
[12] Freund Y. and Schapire R. E., Experiments with a new boosting algorithm. In
Proceedings of the 13th International Conference on Machine Learning, pp.325-332,1996.
[13] Gao.H, Hu.J, Wilson.C, Li.Z, Chen.Y, Zhao.B.Y. Detecting and characterizing social
spam campaigns Proceedings of the 10th ACM SIGCOMM conference on internet
measurement, ACM (2010), pp. 35–47.
[14] Lam,H. A Learning Approach to spam detection Based on Social Networks. Hong Kong
University of Science and Technology.2007.
[15] Stringhini, G., Kruegel, C, and Vigna, G. Detecting Spammers on Social networks. In
Proceedings of the 26th Annual Computer Security Applicationd Conference
(ACSAC'10),NY, USA,ACM,pp,1-9,2010.
[16] Gan,Q. and Suel, T. Improving web spam classifiers using link structure, In Proceedings
of the 3rd International Workshop on Adversarial Information Retrieval on the Web (AIR
WEB'07) NY,USA,ACM,pp. 17-20.2007.
[17] Ramachandran, A., Feamster, N. and Vempala,S. Filtering Spam with behavioral
blacklisting, In Proceedings of the 14th ACM Conference on Computer and Communications
Security (CCS'07),NY,USA,ACM,pp 342-351.2007.
[18] Caruana, R., et al. Ensemble Selection from Libraries of models. In Proceedings of the
21st International Conferenceon Machine Learning, pp.137-144,2004.
[19] Dietterich, T. G. Ensemble methods in Machine Learning Lecture Notes in Computer
Science, pp,1-5.2000.
[20] Quilan, J. Bagging, Boosting and C4.5. In 13th National Conference on Artificial
Intelligence. AAAI/MIT Press, 1996.
[21] Frank, E., Hall. M., Holmes,G., Kirkby,R., Pfahringer ,B., Witten, I, and Trigg, I. Weka,
In Data Mining and Knowledge Discovery Handbook, O. Maimon and L. Rokach (Eds),
Springer,pp.1305-1314,2005.
[22] Viswanath, B., et al., On The Evolution of User interactionin Facebook. In Proceeding
of the workshop on Online Social Networks, pp.37-42,2009.
[23] Bouguessa, M. An Unsupervised approach for identifying Spammers in Social
Networks. In Proceedings of the IEEE 23rd International Conference on Tools with Artificial
Intelligence (ICTAI'11) Washington,DC, USA, IEEE Computer Society, pp,832-840,2011.
[24] Lancichinetti, A. and Fortunato, S." Benchmarks for testing Community detection
algorithm on directed and weighted graphs with overlapping communities. physical review
E.Vol.80,2009.
[25] Quilan, J.R.. C4.5: Programs for machine learning, SanFrancisco CA, USA, Morgan
Kaufimann Publishers Inc. 1993.
[26] Aha. D. W., et al. Instance-based learning algorithms.Machine Learning, Vol.6,no.1,pp,
37-66. 1991.
[27] John, G. H. and Langley, P. estimating Continous distributions in Bayesians Classifiers.
In Proceedings of the11th Conference on Uncertainty in Artificial Intelligence
(UAI'95), San Francisco, CA, USA, Morgan Kaufimann Publishers Inc,. pp.338-345,1995.

More Related Content

What's hot

Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...
IJECEIAES
 
204
204204
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
Ashish Arora
 
presentation29
presentation29presentation29
presentation29
webuploader
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervision
Suresh S
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social network
akash_mishra
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
 
Microposts2015 - Social Spam Detection on Twitter
Microposts2015 - Social Spam Detection on TwitterMicroposts2015 - Social Spam Detection on Twitter
Microposts2015 - Social Spam Detection on Twitter
azubiaga
 
Data mining based social network
Data mining based social networkData mining based social network
Data mining based social network
Firas Husseini
 
Data mining for social media
Data mining for social mediaData mining for social media
Data mining for social media
rangesharp
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
editorjournal
 
Online social network
Online social networkOnline social network
Online social network
ingenioustech
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
ijsptm
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Media
home
 
Conversation graphs in Online Social Media
Conversation graphs in Online Social MediaConversation graphs in Online Social Media
Conversation graphs in Online Social Media
Marco Brambilla
 
Filter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osnFilter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osn
IAEME Publication
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
IJERA Editor
 
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTINGCOLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
Prasadu Peddi
 
Data collection thru social media
Data collection thru social mediaData collection thru social media
Data collection thru social media
i4box Anon
 

What's hot (19)

Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...
 
204
204204
204
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 
presentation29
presentation29presentation29
presentation29
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervision
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social network
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
Microposts2015 - Social Spam Detection on Twitter
Microposts2015 - Social Spam Detection on TwitterMicroposts2015 - Social Spam Detection on Twitter
Microposts2015 - Social Spam Detection on Twitter
 
Data mining based social network
Data mining based social networkData mining based social network
Data mining based social network
 
Data mining for social media
Data mining for social mediaData mining for social media
Data mining for social media
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
 
Online social network
Online social networkOnline social network
Online social network
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Media
 
Conversation graphs in Online Social Media
Conversation graphs in Online Social MediaConversation graphs in Online Social Media
Conversation graphs in Online Social Media
 
Filter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osnFilter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osn
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTINGCOLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
 
Data collection thru social media
Data collection thru social mediaData collection thru social media
Data collection thru social media
 

Similar to Spammer taxonomy using scientific approach

IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
IRJET Journal
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
ijaia
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
IRJET Journal
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
PravinKshirsagar11
 
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
ijistjournal
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitter
ijtsrd
 
final_research_paper on final fourth year project
final_research_paper on final fourth year projectfinal_research_paper on final fourth year project
final_research_paper on final fourth year project
AnmolSharma31477
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
ijistjournal
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
IRJET Journal
 
tcss.2021.3049232.pdf
tcss.2021.3049232.pdftcss.2021.3049232.pdf
tcss.2021.3049232.pdf
KiranKumar757501
 
Towards a hybrid recommendation approach using a community detection and eval...
Towards a hybrid recommendation approach using a community detection and eval...Towards a hybrid recommendation approach using a community detection and eval...
Towards a hybrid recommendation approach using a community detection and eval...
IJECEIAES
 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docx
AliAgral2
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
vivatechijri
 
762019109
762019109762019109
762019109
IJRAT
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social Networks
IJNSA Journal
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
IJNSA Journal
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
IRJET Journal
 

Similar to Spammer taxonomy using scientific approach (20)

IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
 
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitter
 
final_research_paper on final fourth year project
final_research_paper on final fourth year projectfinal_research_paper on final fourth year project
final_research_paper on final fourth year project
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
tcss.2021.3049232.pdf
tcss.2021.3049232.pdftcss.2021.3049232.pdf
tcss.2021.3049232.pdf
 
Towards a hybrid recommendation approach using a community detection and eval...
Towards a hybrid recommendation approach using a community detection and eval...Towards a hybrid recommendation approach using a community detection and eval...
Towards a hybrid recommendation approach using a community detection and eval...
 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docx
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 
762019109
762019109762019109
762019109
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social Networks
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
 

Recently uploaded

Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Kaxil Naik
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
exukyp
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
z6osjkqvd
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
ywqeos
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
lzdvtmy8
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
Vineet
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
VyNguyen709676
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
1tyxnjpia
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
ytypuem
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
NABLAS株式会社
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 

Recently uploaded (20)

Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 

Spammer taxonomy using scientific approach

  • 1. 2017 IEEE/WIC/ACM International Joint Conference on Web Intelligence(WI) and IntelligentAgent Technologies(IAT) Spammer Taxonomy Using Strategic Approach over bench Mark structural Social Networks Attributes Balogun Abiodun Kamoru1, Azmi B. Jaafar2, Masrah Azrifah Azmi Murad3 , Marzanah Binti Jabar4 Department of information Systems and Software Engineering, Faculty of Computer Science and Information technology,Universiti Putra Malaysia, Serdang 43300,Selangor D.E.Malaysia. e-mail: balogun@consultant.com, Azmij@upm.edu.my, Masrah@upm.edu.my, Marzanah@upm.edu.my Abstract Social network has become so popular with overwhelming high rate of growth, due to this popularity theonline social networks is facing the issues of spamming, which has leads to unsubstantialeconomic loss to this menace of spamand spammers activities. It has leads to uncontrollable dissemination of viruses and malwares, promotionalads, phishing, and scams. spam activities has enter a new dangerous dimension, the spammers have step up their games and tactics online social networks, it consumes large amounts of network bandwidth leading to less revenue and significant economic loss to both private and public sectors. From the previous scholars work on spammer classification taxonomy, various machine learning techniques have been extensively used to detect spamactivities and spammers in online social networks. There are various classifier that are learn over content-based features extracted from theuser's interactions and profiles to label them as spam/spammers or legitimate. But recently, new network structural bench mark features have been proposed for spammer detection task, but their importance using structuralbench mark learning methods has not been extensively evaluated yet. In this research work, we evaluate thethe metric performance of some structuralbench mark learning methods using scientific and strategic approach based attributes extracted from an interaction network for the task of spammer detection in online social network. General Word: Spam Detection, Bench Mark. Information Security Keywords: Social Network Security; Spam Detection; Spam taxonomy; Machine Learning; Strategic/Scientifc Approaches/Techniques. I. INTRODUCTION spam and spamming activities are undoubtedly a very serious problem in online social networks, spam has really enter a dangerous dimension which prompt response from the various research scholars to embark on the spammer classification taxonomy. one of the big challenges and issues faced by online social networks(OSN) is to deal with undesirable users and their malicious users (spammers) to project irrelevant information to as large number of legitimate users as possible. The motive behind spamming commonly includes promoting products, Viral marketing, spreading fads, espionage activities, cyber war, and in some cases possibly to harass legitimate users to decrease their trust in a particular services [1]. Thus, spam email is ubiquitous and so is its usage abusive.
  • 2. According to Symantec Intelligence Report,(SIR,2017) [2] indicate that the global ratio of spam in email traffic is 71.9% , furthermore, adversaries have taken advantage of the ability to send countless emails anonymously, at the speed of light, to carry on vicious activities ( e.g advertising of fake gods or medications, scams causing financial losses or even severely, to commit cyber crimes e.g child pornography, identity theft, phishing and malware distribution, Son Dinh et al,2015 [3]. It becomes highly important to devise a scientific and strategic approaches and techniques to identify spammers and their behaviour in social network attributes, along this critical direction many spammer and spam detection methods have been proposed by previous and existing scholars, which are mostly based on based content analysis of users’ interaction data value, many counter filtering techniques based on the usage of non-dictionary words and images in spam objects are often employed by spammers. Content-based spam filtering systems also demand high value computations. Some spammer detection methods and techniques are based on learning classification models from network-based topological features of the interacting nodes in social networks, the attributes includes degree, out-degree, reciprocity, clustering coefficient.etc. The impact of social spam is already significant. A social spam message is potentially seen by all the followers and recipients’ friends. Even worse, it might cause misdirection and misunderstanding in public domain especially social networks like Facebook, Twitter, Sina weibo, Tagged, Badoo, Orkut, LinkedIn, my space etc [4].According to Khurana and Kumar [4], it gives the types of spammers as the following: (a) Fake Users (b) Phishers (c) Promoters (d) Spammers.  Fake Users: are the users who impersonate the profile of a genuine users to send spam content to the friends’ of that user or other users in the network.  Phishers: are the users who behave like a normal user to acquire personal data of other genuine users.  Promoters: are the one who sends malicious links of advertisements or other promotional links to others so as to obtain their personal information.  Spammers: are the malicious users who contaminate the information presented by the legitimate users and in turn pose a risk to the security and privacy of social networks. Spammers belong to one of the following categories. While the motives of the spammers are as follows:  Phishing attacks  Disseminate pornography  Spread viruses  Compromise system reputation. Recently,in [8], we have proposed some community-based topological features to learn improved classification models for identifying spammers in online social networks. However, the results only spanned over single classifiers. In this paper, we aim to evaluate the
  • 3. performance metrics of the proposed attributes in [8] for learning scientific approach models on bench mark structural classification, the three bench mark structural learning methods use are the following- Bagging, Boosting, and Stacking over topological features extracted from a real-world interaction network with artificially planted spammers on social networks, the results are generated for both single and bench mark structural classifiers to evaluate their performance metrics. Within the past few years, online social networks such as Facebook, Twitter, Weibo, etc, has become one of the major way for the internet users to keep communications with their friends. According to Statista report [5] , the number of social network users has reached 1.61 Billion until late 2013, and is estimated to be around 2.33 Billion users globe, until the end of 2017. With great technical and commercial success, social network platform also provides a larger amount of opportunities for broadcasting spammers, which spreads malicious messages and behaviour. According to Nexgate’s report [6] [7] during the first half of 2016, the growth of social spam has been 355%, much faster than the growth rate of accounts and messages on the most branded social networks. II. RELATED WORK Spam detection methods and techniques usually involve two approaches-content-based learning and topology based learning. The main idea behind content-based learning revolves around the observation that spammers use distinguished keywords, URLs, etc. in their interactions and to define their profiles . such content based attributes are used to learn classification models to label messages and profiles as legitimate or spam [9]. However, such approach is often deceived by spammers using copy profiling and content obfuscation. On the other hand, topology-based learning methods aim to exploit structural social network attributes like clustering coefficient, community structures, reciprocity, degree,etc. to characterize network behaviour of legitimate and spammer accounts. Shrivastava et al. [10] incorporated attributes including clustering coefficient and neighbourhood independence to deal with Random Link Attacks from spammers. Bhat and Abulaish [11] extracted features in-links, out-links, cross-links, etc, from a web graph to classify pages as spam or benign. Other methods include finding physical node clusters based on network-level attributes from online communication networks[12]. To detect spam clusters, Gao et al [13] used two widely acknowledged distinguish features of spam campaign-distributed coverage and bursty nature, the distributed property is quantified using the number of users that send wall posts in the cluster, whereas the busty property is based on the intuition that most spam campaigns involve coordinated action by many accounts within short periods of time [14]. The methods proposed in[8] and [15] used a community detection method to split the interaction network into communities and then extract community –based attributes of network nodes (users) to classify them as a spammers or legitimate.
  • 4. One of the limitations of the approaches and techniques mentioned earlier is the classification models used by them are mostly single. In the literature, there exist bench mark structural classification methods that can be used to improve the performance metrics of classifiers by learning multiple models over the same training example set and then using some aggregation method to decide upon a single combined label determined by multiples classifiers. Although , some Bench Mark Structural Methods have been used in content- based classification of spammers, they have not yet been evaluated for the topological attributes. however, the use of Bench Mark Structural learning methods for improving the performance metrics of spam detection methods has been adopted by many researchers, but the studies have been mainly oriented towards content-based classification. In [16], the authors used an ensemble approach or Bench Mark Structure method with sampling classification strategy incorporating C4.5, bagging, and ada boost. Their results using Ensemble approach or bench mark structure method showed improvement in web spam detection performance metrics effectively. Using a text corpus, the authors in [17] aimed to show the significance of bench mark structure method classifiers for spam detection. However, they failed to show any significant improvement in the task. In [18] , the authors highlighted the high performance of Bench Mark method Classifiers involving Adaboost, Stacking and Decision Tree, against the best and excellent performances of single classifiers for e-mail spam detection using a content-based approach. In [15], the authors showed that the classifier proposed by Caruana et al. performed better than the most individual and classifiers implemented in WEKA for the[18] task of email spam detection. In [11] , the authors exploited both content-based and link-based features to compile a minimal attributes set that can be computed incrementally in a quick manner to allow intercepting spam. They also showed that for a selected feature set, Bench mark Classification techniques previously published method and the web spam challenge 2008-2016 best results. III. ENSEMBLE METHODS OR BENCH MARK STRUCTURAL METHODS The Ensemble method or Bench Mark Structural Method classifiers group multiple machine learning instances to improve the classification results of a system. It is based on the assumption that combination of multiple classifiers may be able to produce an overall classifier which is more stable and accurate than any of its components. According to Dietterich [19], the performance metric advantage of ensemble classifiers can be attributed to three key factors: (i) By Combining multiple hypotheses to form an ensemble; their votes are averaged and the risk of selecting an incorrect hypotheses is reduced, (ii) by starting a local search in different locations; ensemble can provide a better approximation of the true underlying, (iii) a weighted sum of the hypothesis within the ensemble, which may extend the space of representable hypotheses to allow a more accurate representation. A brief description of the three mostly used ensemble methods or bench mark structural methods is given in the following paragraphs.
  • 5. I. BAGGING Bootstrap aggregation (or bagging), proposed by Quilan [20] , involves training multiple instances of classifiers on a sample of training examples which are taken at random with replacement (bootstrap sample). Finally, the labels of the test samples are determined by a majority vote of each internally learned classifier. II. BOOSTING Boosting is referred to Arcing (Adaptive Resampling and Combining) [20], boosting first involves assigning weights to the training set instances, then on each learning iteration it increases and decreases the weights for misclassified and correctly classified instances, respectively. The difficulty of learning problem is effectively increased on each iteration, with an attempt to minimize the weighted error on training set. It involves repeatedly learning a weak classifier on various distributed samples of the training data. The classifiers learnt at each step are then combined into a single strong classifier to achieve a higher accuracy than the individual components. The final classification decision is a combination of the decisions made in all rounds, namely a weighted majority vote, where decisions with lower classification error have higher weight. III. STACKING Stacking is an ensemble learning approach or bench mark structural methods which aims to determine the reliability of its constituent individual classifiers (often different models) to achieve the highest generalization accuracy [11]. It Involves using a meta-learner, which uses the predicted classification of the constituent classifiers as input attributes. The meta- classifier is used to reflect the true performance metric measure of the individual constituent classifiers. IV. EXPERIMENTAL AND OBSERVATION RESULT The main and major aim of this paper is to come up with the evaluation on the performance metrics of the ensemble classifier or bench mark classifier for spam detection and spammer in online social networks. In order to do so, community-based structural attributes proposed in [10] are extracted from a real-world social network dataset with artificially planted spammers. We compare the performance metric of multiple classifiers including decision tress, Naivebayes, and k-NN and their ensemble variants implemented in WEKA [21] software. Y P(Out-degree=y) 1 0.664 2 0.171 3 0.07 4 0.04
  • 6. 5 0.024 6 0.014 7 0.01 8 0.07 TABLE 1: SPAMMER OUT-DEGREE DISTRIBUTION A. DATASET For experimental work, we use a real- world social network dataset representing the wall post activity of about 63891 Facebook users [22]. The nodes in this network are considered to be legitimate nodes. We inject additional nodes in the network to simulate spammer behavior. In this view, we subsequently filter out all the nodes having zero in-degree or out-degree, and any isolated nodes from the network to represent them as legitimate networks. This results in a network which 32693 legitimate nodes. Thereafter, in order to simulate spammers, we generate a set of 1000 isolated nodes for the legitimate network, which create out-links to randomly selected nodes in the legitimate network. The out-links or the out-degree generated for the spammers are not random but follow. The messages of the spammers are expected to be leaqst often reciprocated. Thus, the probability of a legitimate node replying to a spammer is set to 0.05 [23]. In order to make the detection task more difficult, we generate another set of 1000 spammer nodes, which try to mimic the clustering property of legitimate nodes. In order to do so, we have used the LFR- benchmark generator [24] to generate a directed network of 1000 nodes with embedded community structures. The LFR-benchmark parameters used to generate the network are shown in Table II. Parameter Description Value N Number of nodes 1000 K Average degree 15 Kmax Max degree 60 Cmin Minimum community size 15 Cmax Maximum community size 60 𝜕 Degree exponent -1 ₾ Community exponent -1 µ Mixing parameter 0.1 TABLE II : LFR-BENCHMARK PARAMETER DESCRIPTION AND VALUES Now, for each node in the synthetic network, we rewire a set of its out-links towards a set of randomly selected nodes in the legitimate network such that spamming out-degree i.e the rewired out-links follows the distribution given Table I, In this regard, a total of 2000
  • 7. spammer nodes (out of which 1000 mimic the clustering property of legitimate nodes) are added to the legitimate network resulting in a total of 34693 nodes. Thereafter, we extract community -based features proposed in [12]from the network. B. RESULTS In order to evaluate the significance of the bench mark structural method using community- based structural features, we learn a set of classifiers from WEKA classifier on the training examples containing the community-based features from the datasets mentioned in the previous section. We evaluate the performance metrics of the three classifiers including J48 (decision-tree) [25], IBk (k-NN using k=5 nearest neighbors) [26], and NaiveBayes [27] by considering them individually and also by using bagging, boosting and stacking over them. We use 10-fold cross validation for each classifier on the dataset to evaluate performance metric. Table III presents the performance metrics (averaged for the two classes) of the various individual classifiers on the dataset with planted spammers, wherein it is clear that the decision tree based classifier J48 performs better than the two classifiers. Classifier (Individual) TP Rate FP Rate Precision Recall F- Measure J48 0.963 0.075 0.963 0.963 0.963 IBk (k=4) 0.938 0.159 0.159 0.937 0.937 NaiveBayes 0.914 0.175 0.917 0.914 0.915 TABLE III. PERFORMANCE METRICS OF INDIVIDUAL CLASSIFIERS Tables IV and V present the performance metric of the bagging and boosting bench mark structural method over the three base classifiers, respectively for the spammer detection task. It can be clearly seen from the Tables that the performances metrics of J48 and IBk classifiers using bagging and boosting bench mark structural method approach is better than their individual performances metrics. However, in case of Naive Bayes classifier, the bench mark structural method approaches show low performance metrics than their individual performance for spammer detection task using structural attributes.
  • 8. Classifier (Bagging) TP Rate FP Rate Precision Recall F- Measure J48 0.969 0.067 0.969 0.969 0.969 IBk (k=4) 0.941 0.133 0.942 0.941 0.942 Naivebayes 0.706 0.155 0.857 0.706 0.741 TABLE IV: PERFORMANCE METRIC OF CLASSIFIER USING BAGGING BENCH MARK STRUCTURAL METHOD Classifier (Boosting) TP Rate FP Rate Precision Recall F- Measure J48 0.966 0.082 0.966 0.966 0.966 IBk (k=4) 0.938 0.159 0.937 0.938 0.937 NaiveBayes 0.705 0.155 0.857 0.705 0.74 TABLE V: PERFORMANC METRIC OF CLASSIFIER USING BOOSTING BENCH MARK STRUCTURAL METHOD Classifier (Stacking) TP Rate FP Rate Precision Recall F- Measure J48 (Meta) 0.961 0.085 0.962 0.961 0.961 TABLE VI: PERFORMANCE METRIC OF THE STACKING BENCH MARK STRUCTURE METHOD INVOLVING ALL THREE CLASSIFIER AND J48 AS THE META CLASSIFIER TableVI presents the performance metrics of the stacking bench mark structural method learning approach which incorporates all three classifiers (J48, IBk, Naive Bayes) as its base classifiers and J48 as its meta classifier. It can be observed that its performance is lower than the best case of the other two bench mark structural approaches and closer to the individua; performance metrics of the J48 classifier. From these results, it can be observed that the bagging bench mark structural learning approach using J48 classifier performs important better than the individual performance of
  • 9. IBk and naive bayes classifiers and also better than the other two bench mark approaches, i.e, boosting and stacking for the task of spammer detection in online social networks. V. CONCLUSION Spam detection in online social networks is challenging, but a highly desirable accomplish task. Numerous machine learning approaches using content-based features have been used in previous research to detect email spam. Bench Mark learning approaches like bagging and boosting that aim to improve the efficiency of the individual classifiers exist in literature, but they have not been extensively evaluated for the spammer detection task. Moreover, new structural features based on community structures of online social network users have also been proposed recently for spammer detection. This paper evaluates the performance metrics of some bench mark learning approaches for the task of spammer detection in online social networks. The observation of the experimental results reveal that the bagging bench mark learning approach using J48 (decision tree) base classifier performs better than its individual model and also better than some other ensemble or bench mark learning approaches for spammer detection using structural social network attributes. REFERENCES [1] Saini Jacob.S, S.Murugappan. " A study of Spam Detection Algorithm on Social Media Networks" Journal of Computer Science 10 (10) : 2135-2140, 2014. JCS. [2] Symantec Intellignce Report SIR2017)https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf [3] Son Dinh, Taher Azeb, Francis Fortin, Djedjiga Mouheb and Mourad Debbabi; "Spam Campaign Detection, Analysis, and Investigation" From the proceedings ofThe Digital Forensic Research ConferenceDFRWS 2015 EUDublin, Ireland (Mar 23rd- 26th) 2015. [4] Girisha Khurana, Marish Kumar; "Review : Efficient Spam Detection on Social network" International Journal for Research in Applied Science & Engineering Technology (IJRASET) Vol 3 Issue VI,June 2015. [5] https://www.statista.com/
  • 10. [6] nextgate report (https://www.proofpoint.com/us/solutions/social-media-protection-and- compliance) [7] Trust evaluation based content filtering in social interactive data, in: proceedings of the 2013 International Conference on Cloud Computing and big Data (CloudCom-Asia), IEEE,2013,pp.538-542. [8] De Wang, danesh Irani, Pu Calton; " A Social-Spam Detection Framework" CEAS- 2011,8th Annual Collaboration, Electronic messaging Anti-Abuse and Spam Conference Sept.1-2, 2011. Perth Australia. [9] Nasim Eshraqi, Mehrdad Jalali, Hossein Moattar, " Spam Detection In Social Networks: A Review".2nd International Congress on technology Communication and Knowledge (ICTCK,2015) November,11-12,2015. Islamic Azad University, Iran. [10] Shrivastava, N., Majumder, A. and Rastogi, R.; Mining (Social) Network graphs to detect random link attacks, In Proceedings of the IEEE-24th International Conference on Data Engineering (ICDE'08), Washington Dc,USA. IEEE Computer Society. pp 486- 495,2008. [11] Bhat. S.Y., and Abulaish, M." Community-based features for identifying spammers in online social networks. In Proceedings of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.100-107,ACM, 2013. [12] Freund Y. and Schapire R. E., Experiments with a new boosting algorithm. In Proceedings of the 13th International Conference on Machine Learning, pp.325-332,1996. [13] Gao.H, Hu.J, Wilson.C, Li.Z, Chen.Y, Zhao.B.Y. Detecting and characterizing social spam campaigns Proceedings of the 10th ACM SIGCOMM conference on internet measurement, ACM (2010), pp. 35–47. [14] Lam,H. A Learning Approach to spam detection Based on Social Networks. Hong Kong University of Science and Technology.2007. [15] Stringhini, G., Kruegel, C, and Vigna, G. Detecting Spammers on Social networks. In Proceedings of the 26th Annual Computer Security Applicationd Conference (ACSAC'10),NY, USA,ACM,pp,1-9,2010. [16] Gan,Q. and Suel, T. Improving web spam classifiers using link structure, In Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web (AIR WEB'07) NY,USA,ACM,pp. 17-20.2007. [17] Ramachandran, A., Feamster, N. and Vempala,S. Filtering Spam with behavioral blacklisting, In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07),NY,USA,ACM,pp 342-351.2007.
  • 11. [18] Caruana, R., et al. Ensemble Selection from Libraries of models. In Proceedings of the 21st International Conferenceon Machine Learning, pp.137-144,2004. [19] Dietterich, T. G. Ensemble methods in Machine Learning Lecture Notes in Computer Science, pp,1-5.2000. [20] Quilan, J. Bagging, Boosting and C4.5. In 13th National Conference on Artificial Intelligence. AAAI/MIT Press, 1996. [21] Frank, E., Hall. M., Holmes,G., Kirkby,R., Pfahringer ,B., Witten, I, and Trigg, I. Weka, In Data Mining and Knowledge Discovery Handbook, O. Maimon and L. Rokach (Eds), Springer,pp.1305-1314,2005. [22] Viswanath, B., et al., On The Evolution of User interactionin Facebook. In Proceeding of the workshop on Online Social Networks, pp.37-42,2009. [23] Bouguessa, M. An Unsupervised approach for identifying Spammers in Social Networks. In Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence (ICTAI'11) Washington,DC, USA, IEEE Computer Society, pp,832-840,2011. [24] Lancichinetti, A. and Fortunato, S." Benchmarks for testing Community detection algorithm on directed and weighted graphs with overlapping communities. physical review E.Vol.80,2009. [25] Quilan, J.R.. C4.5: Programs for machine learning, SanFrancisco CA, USA, Morgan Kaufimann Publishers Inc. 1993. [26] Aha. D. W., et al. Instance-based learning algorithms.Machine Learning, Vol.6,no.1,pp, 37-66. 1991. [27] John, G. H. and Langley, P. estimating Continous distributions in Bayesians Classifiers. In Proceedings of the11th Conference on Uncertainty in Artificial Intelligence (UAI'95), San Francisco, CA, USA, Morgan Kaufimann Publishers Inc,. pp.338-345,1995.