Automated Twitter Author Clustering with Unsupervised Learning for Social Media Forensics

被引:0
作者
Shao, Sicong [1 ]
Tunc, Cihan [1 ]
Al-Shawi, Amany [2 ]
Hariri, Salim [1 ]
机构
[1] Univ Arizona, NSF Ctr Cloud & Auton Comp, Tucson, AZ 85721 USA
[2] King Abdulaziz City Sci & Technol, Natl Ctr Cybersecur Technol, Riyadh, Saudi Arabia
来源
2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019) | 2019年
基金
美国国家科学基金会;
关键词
unsupervised learning; cybersecurity; author identification; author clustering; Twitter; social media;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Twitter is one of the key social media platforms, which is also used for cyber-crimes. Hence, monitoring and detecting the malicious activities of Twitter users is critically important for cybersecurity concerns around the globe since cybercriminals are heavily using Twitter for illegal purpose. It is increasingly common for cybercriminals signing up many accounts while masquerading different users for malicious behaviors. This fact has brought forward the issue of identifying the authors of Twitter accounts. In this paper, we propose a novel approach through a combination of feature extraction methods and then convert high dimensional data to kernel matrix for Twitter author clustering. The experimental results show that our approach can be used to effectively identify the groups among more than one hundred Twitter aliases even without knowing the number of authors.
引用
收藏
页数:8
相关论文
共 25 条
[1]   Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace [J].
Abbasi, Ahmed ;
Chen, Hsinchun .
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2008, 26 (02)
[2]  
[Anonymous], 2015, P 2015 IEEE 22 INT C
[3]  
[Anonymous], 2006, P 5 INT C LANG RES E
[4]  
Bernard J., 2018, International Conference on Complex Networks and their Applications, P578
[5]  
Bilmes JeffA., 1998, International Computer Science Institute, V4
[6]  
Blasch E, 2018, WINT SIMUL C PROC, P1418, DOI 10.1109/WSC.2018.8632336
[7]   Static versus Dynamic Data Information Fusion analysis using DDDAS for Cyber Security Trust [J].
Blasch, Erik ;
Al-Nashif, Youssif ;
Hariri, Salim .
2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, 2014, 29 :1299-1313
[8]  
Boatwright B. C., 2018, TROLL FACTORIES INTE
[9]  
Brown Peter F., 1992, COMPUT LINGUIST, V18, P4
[10]  
Cao YQ, 2016, INT CONF COMP INFO, P151