Anomaly detection method of social media user information based on data mining

被引:1
|
作者
Wan X. [1 ]
机构
[1] Qingdao Vocation and Technical College of Hotel Management, Qingdao
关键词
data mining; K-means; social media; user information; Weibo;
D O I
10.1504/IJWBC.2024.136674
中图分类号
学科分类号
摘要
Aiming at the problems of low detection accuracy, recall and F1 value of traditional social media user information anomaly detection methods, a social media user information anomaly detection method based on data mining is proposed. Firstly, we clean the social media data and eliminate the invalid and missing values in the data. Then, we filter the abnormal user information in the social media data through the unsupervised k-means algorithm in data mining. Finally, according to the screening results, we calculate the text word segmentation of user information, obtain the similarity of word frequency, and complete the detection of abnormal user information. The method provided by social media has the highest accuracy of 97.5%, which is the highest exception detection rate of 97.5% and the highest exception detection rate of social media. Copyright © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:38 / 50
页数:12
相关论文
共 50 条
  • [1] Social User Mining: Survey on Mining Different Types of Social Media Data
    Eltaher, Mohammed
    Lee, Jeongkyu
    INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT, 2013, 4 (04): : 58 - 70
  • [2] On fairness: User perspectives on social media data mining
    Kennedy, Helen
    Elgesem, Dag
    Miguel, Cristina
    CONVERGENCE-THE INTERNATIONAL JOURNAL OF RESEARCH INTO NEW MEDIA TECHNOLOGIES, 2017, 23 (03): : 270 - 288
  • [3] A User Behavior Anomaly Detection Approach based on Sequence Mining over Data Streams
    Zhou, Yong
    Wang, Yijie
    Ma, Xingkong
    2016 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2016, : 376 - 381
  • [4] A survey of data mining and social network analysis based anomaly detection techniques
    Kaur, Ravneet
    Singh, Sarbjeet
    EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (02) : 199 - 216
  • [5] Method of Anomaly Detection of Temperature Data in Vacuum Thermal Test based on Data Mining
    Xie, Jihui
    Wu, Dongliang
    Liao, Tao
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1040 - 1045
  • [6] A novel data mining method for network anomaly detection based on transductive scheme
    Li, Yang
    Fang, Binxing
    Guo, Li
    ADVANCES IN NEURAL NETWORKS - ISNN 2007, PT 1, PROCEEDINGS, 2007, 4491 : 1286 - +
  • [7] Data Mining the City: User Demands through Social Media
    Cakir, Hulya Soydas
    Levent, Vecdi Emre
    ICONARP INTERNATIONAL JOURNAL OF ARCHITECTURE AND PLANNING, 2021, 9 (02): : 799 - 818
  • [8] Data Mining Approach for Anomaly Detection in Social Network Analysis
    Sudha, M. Swarna
    Priya, K. Arun
    Lakshmi, A. Kanaka
    Kruthika, A.
    Priya, D. Lakshmi
    Valarmathi, K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1862 - 1866
  • [9] Social media user information security encryption method based on chaotic algorithm
    Yi, Xiao
    International Journal of Web Based Communities, 2024, 20 (1-2) : 128 - 138
  • [10] Algorithm Optimization of Anomaly Detection Based on Data Mining
    Zhang, Lei
    Chen, Yong
    Liao, Shaowen
    2018 10TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2018, : 402 - 404