Detecting malicious tweets in trending topics using clustering and classification
Detection of spam Twitter social networks is one of the significant research areas to discover unauthorized user accounts. A number of research works have been carried out to solve these issues but most of the existing techniques had not focused on various features and doesn't group similar use...
Saved in:
| Published in: | 2014 International Conference on Recent Trends in Information Technology pp. 1 - 6 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.04.2014
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Detection of spam Twitter social networks is one of the significant research areas to discover unauthorized user accounts. A number of research works have been carried out to solve these issues but most of the existing techniques had not focused on various features and doesn't group similar user trending topics which become their major limitation. Trending topics collects the current Internet trends and topics of argument of each and every user. In order to overcome the problem of feature extraction,this work initially extracts many features such as user profile features, user activity features, location based features and text and content features. Then the extracted text features use Jenson-Shannon Divergence (JSD) measure to characterize each labeled tweet using natural language models. Different features are extracted from collected trending topics data in twitter. After features are extracted, clusters are formed to group similar trending topics of tweet user profile. Fuzzy K-means (FKM) algorithm primarily cluster the similar user profiles with same trending topics of tweet and centers are determined to similar user profiles with same trending topics of tweet from fuzzy membership function. Moreover, Extreme learning machine (ELM) algorithm is applied to analyze the growing characteristics of spam with similar topics in twitter from clustering result and acquire necessary knowledge in the detection of spam. The results are evaluated with F-measure, True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy with improved detection results. |
|---|---|
| AbstractList | Detection of spam Twitter social networks is one of the significant research areas to discover unauthorized user accounts. A number of research works have been carried out to solve these issues but most of the existing techniques had not focused on various features and doesn't group similar user trending topics which become their major limitation. Trending topics collects the current Internet trends and topics of argument of each and every user. In order to overcome the problem of feature extraction,this work initially extracts many features such as user profile features, user activity features, location based features and text and content features. Then the extracted text features use Jenson-Shannon Divergence (JSD) measure to characterize each labeled tweet using natural language models. Different features are extracted from collected trending topics data in twitter. After features are extracted, clusters are formed to group similar trending topics of tweet user profile. Fuzzy K-means (FKM) algorithm primarily cluster the similar user profiles with same trending topics of tweet and centers are determined to similar user profiles with same trending topics of tweet from fuzzy membership function. Moreover, Extreme learning machine (ELM) algorithm is applied to analyze the growing characteristics of spam with similar topics in twitter from clustering result and acquire necessary knowledge in the detection of spam. The results are evaluated with F-measure, True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy with improved detection results. |
| Author | Murugappan, S. Soman, Saini Jacob |
| Author_xml | – sequence: 1 givenname: Saini Jacob surname: Soman fullname: Soman, Saini Jacob email: sainijs@rediffmail.com organization: Fac. of CSE, Sathyabama Univ., Chennai, India – sequence: 2 givenname: S. surname: Murugappan fullname: Murugappan, S. email: drmryes@gmail.com organization: Dept. of Comput. Sci. & Eng., Annamalai Univ., Chennai, India |
| BookMark | eNotj8tqwzAURFVoFm2aL8jGP2BXslRZd1nclyEQGrwPt9JVEThysGRK_74xzWrmMDBw7tltHCMxthW8EoLDY9ce-q6vai5UpQG0MOaGbaAxQjUACgzUd-zzhTLZHOJ3ccIh2DDOqcg_RDkVIRZ5ouiWMY_nYFMxpwXsMKdM01IxugtiSsEHizmM8YGtPA6JNtdcs_7ttW8_yt3-vWufd2UAnktNqLXz9RN6qchYra0npUlJzYU1tq6RS5ToGq44gnTOXgTQgXNkPXzJNdv-3wYiOp6ncMLp93j1lH8i2k-o |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICRTIT.2014.6996188 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781479949892 1479949892 |
| EndPage | 6 |
| ExternalDocumentID | 6996188 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i90t-6ea66df25af34e8c66cfe46e43601c8c22a03a3ad7040a93ddc618ad9ddecf9b3 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jun 29 18:37:40 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-6ea66df25af34e8c66cfe46e43601c8c22a03a3ad7040a93ddc618ad9ddecf9b3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_6996188 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-April |
| PublicationDateYYYYMMDD | 2014-04-01 |
| PublicationDate_xml | – month: 04 year: 2014 text: 2014-April |
| PublicationDecade | 2010 |
| PublicationTitle | 2014 International Conference on Recent Trends in Information Technology |
| PublicationTitleAbbrev | ICRTIT |
| PublicationYear | 2014 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.6257408 |
| Snippet | Detection of spam Twitter social networks is one of the significant research areas to discover unauthorized user accounts. A number of research works have been... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Accuracy Clustering algorithms Extreme learning machine algorithm Feature extraction Fuzzy KMeans Clustering algorithm Social network Spam detection Support vector machines |
| Title | Detecting malicious tweets in trending topics using clustering and classification |
| URI | https://ieeexplore.ieee.org/document/6996188 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA5t8eBJpRXf5ODRbddNNo9ztViQUmWR3ko2mciCbkt36-83s10qghdvk0kgYYZkJsk3M4TcKs2Dn6sgcs6ziEshIsM4BMryFFyayCYdw9uznM3UYqHnHXK3j4UBgAZ8BkMkm798t7JbfCobCY31SVSXdKWUu1itNpHQfaxH0_FrNs0QrcWH7chfJVMaizE5-t9cx2TwE3pH53ujckI6UPbJywPgW39g0M_gN1vErVLEV9UVLUpaI64VO-vVurAVRSz7O7UfW0yCgKQpXWgGNxlxQY0qBiSbPGbjp6ithRAVOq4jAUYI55PU-CBJZYWwHrgAzsKFyiqbJCZmhhknw6Y0mjlnw-qN0-H0sl7n7JT0ylUJZ4RylqeJMtoIx7kXIk-ZjY0IjpnLvXRwTvoojeV6l-1i2Qri4m_2JTlEge-wLFekV2-2cE0O7FddVJubRkXfr_eXeA |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED_mFPRJZRO_zYOPduuaNG2ep7LhHFOK7G2kyVUK2o2t8-8315WJ4Itvl0sg4Y7kLsnv7gBuYyWcnxujZ23GPRFJ6Wku0FFGhGjDIKrSMbyNovE4nk7VpAF321gYRKzAZ9ghsvrLt3OzpqeyrlRUnyTegd1QiKC3idaqUwn1fNUd9l-TYUJ4LdGpx_4qmlLZjMfD_812BO2f4Ds22ZqVY2hg0YKXe6TXfsdgn85zNoRcZYSwKlcsL1hJyFbqLOeL3KwYodnfmflYUxoEInVhXdM5yoQMqpTRhuTxIekPvLoagpcrv_QkailtFoQ6c7KMjZQmQyFRcHelMrEJAu1zzbWN3LbUiltr3Oq1Ve78MplK-Qk0i3mBp8AET8Mg1kpLK0QmZRpy42vpXDObZpHFM2iRNGaLTb6LWS2I87_ZN7A_SJ5Hs9Fw_HQBByT8DbLlEprlco1XsGe-yny1vK7U9Q27ypq_ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+International+Conference+on+Recent+Trends+in+Information+Technology&rft.atitle=Detecting+malicious+tweets+in+trending+topics+using+clustering+and+classification&rft.au=Soman%2C+Saini+Jacob&rft.au=Murugappan%2C+S.&rft.date=2014-04-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICRTIT.2014.6996188&rft.externalDocID=6996188 |