Detecting malicious tweets in trending topics using clustering and classification

Detection of spam Twitter social networks is one of the significant research areas to discover unauthorized user accounts. A number of research works have been carried out to solve these issues but most of the existing techniques had not focused on various features and doesn't group similar use...

Full description

Saved in:
Bibliographic Details
Published in:2014 International Conference on Recent Trends in Information Technology pp. 1 - 6
Main Authors: Soman, Saini Jacob, Murugappan, S.
Format: Conference Proceeding
Language:English
Published: IEEE 01.04.2014
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Detection of spam Twitter social networks is one of the significant research areas to discover unauthorized user accounts. A number of research works have been carried out to solve these issues but most of the existing techniques had not focused on various features and doesn't group similar user trending topics which become their major limitation. Trending topics collects the current Internet trends and topics of argument of each and every user. In order to overcome the problem of feature extraction,this work initially extracts many features such as user profile features, user activity features, location based features and text and content features. Then the extracted text features use Jenson-Shannon Divergence (JSD) measure to characterize each labeled tweet using natural language models. Different features are extracted from collected trending topics data in twitter. After features are extracted, clusters are formed to group similar trending topics of tweet user profile. Fuzzy K-means (FKM) algorithm primarily cluster the similar user profiles with same trending topics of tweet and centers are determined to similar user profiles with same trending topics of tweet from fuzzy membership function. Moreover, Extreme learning machine (ELM) algorithm is applied to analyze the growing characteristics of spam with similar topics in twitter from clustering result and acquire necessary knowledge in the detection of spam. The results are evaluated with F-measure, True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy with improved detection results.
AbstractList Detection of spam Twitter social networks is one of the significant research areas to discover unauthorized user accounts. A number of research works have been carried out to solve these issues but most of the existing techniques had not focused on various features and doesn't group similar user trending topics which become their major limitation. Trending topics collects the current Internet trends and topics of argument of each and every user. In order to overcome the problem of feature extraction,this work initially extracts many features such as user profile features, user activity features, location based features and text and content features. Then the extracted text features use Jenson-Shannon Divergence (JSD) measure to characterize each labeled tweet using natural language models. Different features are extracted from collected trending topics data in twitter. After features are extracted, clusters are formed to group similar trending topics of tweet user profile. Fuzzy K-means (FKM) algorithm primarily cluster the similar user profiles with same trending topics of tweet and centers are determined to similar user profiles with same trending topics of tweet from fuzzy membership function. Moreover, Extreme learning machine (ELM) algorithm is applied to analyze the growing characteristics of spam with similar topics in twitter from clustering result and acquire necessary knowledge in the detection of spam. The results are evaluated with F-measure, True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy with improved detection results.
Author Murugappan, S.
Soman, Saini Jacob
Author_xml – sequence: 1
  givenname: Saini Jacob
  surname: Soman
  fullname: Soman, Saini Jacob
  email: sainijs@rediffmail.com
  organization: Fac. of CSE, Sathyabama Univ., Chennai, India
– sequence: 2
  givenname: S.
  surname: Murugappan
  fullname: Murugappan, S.
  email: drmryes@gmail.com
  organization: Dept. of Comput. Sci. & Eng., Annamalai Univ., Chennai, India
BookMark eNotj8tqwzAURFVoFm2aL8jGP2BXslRZd1nclyEQGrwPt9JVEThysGRK_74xzWrmMDBw7tltHCMxthW8EoLDY9ce-q6vai5UpQG0MOaGbaAxQjUACgzUd-zzhTLZHOJ3ccIh2DDOqcg_RDkVIRZ5ouiWMY_nYFMxpwXsMKdM01IxugtiSsEHizmM8YGtPA6JNtdcs_7ttW8_yt3-vWufd2UAnktNqLXz9RN6qchYra0npUlJzYU1tq6RS5ToGq44gnTOXgTQgXNkPXzJNdv-3wYiOp6ncMLp93j1lH8i2k-o
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICRTIT.2014.6996188
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781479949892
1479949892
EndPage 6
ExternalDocumentID 6996188
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-6ea66df25af34e8c66cfe46e43601c8c22a03a3ad7040a93ddc618ad9ddecf9b3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:40 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-6ea66df25af34e8c66cfe46e43601c8c22a03a3ad7040a93ddc618ad9ddecf9b3
PageCount 6
ParticipantIDs ieee_primary_6996188
PublicationCentury 2000
PublicationDate 2014-April
PublicationDateYYYYMMDD 2014-04-01
PublicationDate_xml – month: 04
  year: 2014
  text: 2014-April
PublicationDecade 2010
PublicationTitle 2014 International Conference on Recent Trends in Information Technology
PublicationTitleAbbrev ICRTIT
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6257408
Snippet Detection of spam Twitter social networks is one of the significant research areas to discover unauthorized user accounts. A number of research works have been...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Accuracy
Clustering algorithms
Extreme learning machine algorithm
Feature extraction
Fuzzy KMeans Clustering algorithm
Social network
Spam detection
Support vector machines
Twitter
Title Detecting malicious tweets in trending topics using clustering and classification
URI https://ieeexplore.ieee.org/document/6996188
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA5t8eBJpRXf5ODRbddNNo9ztViQUmWR3ko2mciCbkt36-83s10qghdvk0kgYYZkJsk3M4TcKs2Dn6sgcs6ziEshIsM4BMryFFyayCYdw9uznM3UYqHnHXK3j4UBgAZ8BkMkm798t7JbfCobCY31SVSXdKWUu1itNpHQfaxH0_FrNs0QrcWH7chfJVMaizE5-t9cx2TwE3pH53ujckI6UPbJywPgW39g0M_gN1vErVLEV9UVLUpaI64VO-vVurAVRSz7O7UfW0yCgKQpXWgGNxlxQY0qBiSbPGbjp6ithRAVOq4jAUYI55PU-CBJZYWwHrgAzsKFyiqbJCZmhhknw6Y0mjlnw-qN0-H0sl7n7JT0ylUJZ4RylqeJMtoIx7kXIk-ZjY0IjpnLvXRwTvoojeV6l-1i2Qri4m_2JTlEge-wLFekV2-2cE0O7FddVJubRkXfr_eXeA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED_mFPRJZRO_zYOPduuaNG2ep7LhHFOK7G2kyVUK2o2t8-8315WJ4Itvl0sg4Y7kLsnv7gBuYyWcnxujZ23GPRFJ6Wku0FFGhGjDIKrSMbyNovE4nk7VpAF321gYRKzAZ9ghsvrLt3OzpqeyrlRUnyTegd1QiKC3idaqUwn1fNUd9l-TYUJ4LdGpx_4qmlLZjMfD_812BO2f4Ds22ZqVY2hg0YKXe6TXfsdgn85zNoRcZYSwKlcsL1hJyFbqLOeL3KwYodnfmflYUxoEInVhXdM5yoQMqpTRhuTxIekPvLoagpcrv_QkailtFoQ6c7KMjZQmQyFRcHelMrEJAu1zzbWN3LbUiltr3Oq1Ve78MplK-Qk0i3mBp8AET8Mg1kpLK0QmZRpy42vpXDObZpHFM2iRNGaLTb6LWS2I87_ZN7A_SJ5Hs9Fw_HQBByT8DbLlEprlco1XsGe-yny1vK7U9Q27ypq_
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+International+Conference+on+Recent+Trends+in+Information+Technology&rft.atitle=Detecting+malicious+tweets+in+trending+topics+using+clustering+and+classification&rft.au=Soman%2C+Saini+Jacob&rft.au=Murugappan%2C+S.&rft.date=2014-04-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICRTIT.2014.6996188&rft.externalDocID=6996188