An Approach to Creating an Intelligent System for Detecting and Countering Inappropriate Information on the Internet

被引:1
作者
Vitkova, Lidiya [1 ]
Saenko, Igor [1 ]
Tushkanova, Olga [1 ,2 ]
机构
[1] SPIIRAS, 39,14 Liniya, St Petersburg 199178, Russia
[2] SPbPU, 29 Politekh Skaya St, St Petersburg 195251, Russia
来源
INTELLIGENT DISTRIBUTED COMPUTING XIII | 2020年 / 868卷
关键词
Inappropriate information; Internet; Machine learning; Big data; Classifier;
D O I
10.1007/978-3-030-32258-8_29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Currently, the Internet is becoming one of the most dangerous threats to personal, public and state information security. Therefore, the task of detecting and counteracting inappropriate information in digital network content becomes of national importance. The paper offers a new approach to creating an intelligent system for detecting and counteracting inappropriate information on the Internet based on the use of machine learning methods and processing of big data and describes the architecture of such a system. Experimental evaluation of one of the most important system components, which is the component of multidimensional evaluation and categorization of information objects in single-threaded and multi-threaded modes showed high efficiency of using various classifiers included in the Python Scikit-learn and Spark MLlib libraries to solve the problem.
引用
收藏
页码:244 / 254
页数:11
相关论文
共 22 条
[1]  
Aggarwal CC, 2014, CH CRC DATA MIN KNOW, P1
[2]  
Al-Khateeb S, 2019, LECT NOTES SOC NETW, P19, DOI 10.1007/978-3-319-78256-0_2
[3]  
[Anonymous], 2018, MACHINE LEARNING TEX
[4]   Identifying Fake News and Fake Users on Twitter [J].
Atodiresei, Costel-Sergiu ;
Tanaselea, Alexandru ;
Iftene, Adrian .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018), 2018, 126 :451-461
[5]  
Benkler Y., 2018, NETWORK PROPAGANDA M, DOI DOI 10.1093/OSO/9780190923624.001.0001
[6]  
Conroy Niall J, 2015, Proc. Assoc. Inf. Sci. Technol, P82, DOI DOI 10.1002/PRA2.2015.145052010082
[7]  
Feldman R., 2007, TEXT MINING HDB ADV
[8]  
Kai Shu, 2017, ACM SIGKDD Explorations Newsletter, V19, P22, DOI 10.1145/3137597.3137600
[9]  
Khonji M., 2012, International Journal for Information Security Research (IJISR), V2, P40
[10]  
Kotenko I., 2017, J WIREL MOB NETW UBI, V8, P60, DOI 10.22667/JOWUA.2018.12.31.071