Detecting Users with Multiple Aliases on Twitter

被引:0
作者
Mishra, Irita [1 ]
Dongre, Swati [1 ]
Kanwar, Yogita [1 ]
Prakash, Jay [2 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior 474010, Madhya Pradesh, India
[2] Amity Univ, Noida 201313, UP, India
来源
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING | 2018年
关键词
Social network; Alias detection; Machine learning; Data mining; Time profiles; Stylometric-based features;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In day to day life, many people create their multiple identities on social networking sites in order to abstract their true identity. No wonder, monitoring and analysis of the social networks are becoming important for analysts since terrorists and extremists are using the information provided by the user, to spread advocacy and communicating with each other. As Twitter is a widely used social network to share opinions and views, in this work, we have applied Supervised Machine Learning (i.e. alias detection) on the Twitter dataset. Here, we propose a technique for detecting users who make use of aliases in which time profiles are incorporated with the stylometric-based features. By combining time profiles and stylometric features, the detection rate of a user having multiple aliases increases significantly. Further, we make use of data mining techniques to improve accuracy. The obtained results show that time profiles can pose to be very useful tools for alias detection when combined with stylometry.
引用
收藏
页码:560 / 563
页数:4
相关论文
共 9 条
  • [1] Abbasi Ahmed, 2007, 2007 IEEE Intelligence and Security Informatics, P282, DOI 10.1109/ISI.2007.379486
  • [2] Circadian Typology: A Comprehensive Review
    Adan, Ana
    Archer, Simon N.
    Paz Hidalgo, Maria
    Di Milia, Lee
    Natale, Vincenzo
    Randler, Christoph
    [J]. CHRONOBIOLOGY INTERNATIONAL, 2012, 29 (09) : 1153 - 1175
  • [3] [Anonymous], 2009, TWITTER SENTIMENT CL
  • [4] Brynielsson J., 2013, Security Informatics, V2, P11, DOI DOI 10.1186/2190-8532-2-11
  • [5] Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards
    Dahlin, Johan
    Johansson, Fredrik
    Kaati, Lisa
    Martenson, Christian
    Svenson, Pontus
    [J]. 2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 850 - 857
  • [6] Johansson F., 2015, SECURITY INFORM, V4, P1, DOI DOI 10.1186/S13388-015-0022-Z
  • [7] Kourtis I., 2011, CLEF 2011 P C MULT M
  • [8] Layton R., 2010, Proceedings Second Cybercrime and Trustworthy Computing Workshop (CTC 2010), P1, DOI 10.1109/CTC.2010.17
  • [9] On the Feasibility of Internet-Scale Author Identification
    Narayanan, Arvind
    Paskov, Hristo
    Gong, Neil Zhenqiang
    Bethencourt, John
    Stefanov, Emil
    Shin, Eui Chul Richard
    Song, Dawn
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 300 - 314