Detection of threatening user accounts on Twitter social media database

被引:9
作者
Kumari, Asha [1 ]
Balkishan [1 ]
机构
[1] Maharshi Dayanand Univ, Dept Comp Sci & Applicat, Rohtak, Haryana, India
关键词
online social media; Twitter; suspicious activity; threatening users; ant colony optimisation; swarm intelligence; Twitter microblogs; HEALTH-CARE; COLONY; OPTIMIZATION;
D O I
10.1504/IJIEI.2019.103626
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The freedom of social media platforms to post and share daily activities is being misused by threatening users as they post the suspicious and fake content on social media for personal or organisational advantage. This demands to generate a system that can detect suspicious content and their respective user accounts. In this paper, an ant colony optimisation based system for threatening account detection (ACOTAD) is proposed. The connections among the different Twitter users are determined by the pheromone substance secreted by ants on the edges of the path travelled. Better the quality of pheromone indicates the strong connection of one user with another. This research work considers the experimentation on Twitter based Social Honeypot Database. The evaluated results in terms of precision, recall, f-measure, true positive rate, and false positive rate indicate the superiority of the proposed concept in comparison with existing techniques.
引用
收藏
页码:457 / 489
页数:33
相关论文
共 48 条
  • [1] Adewole K.S., 2017, MULTIMED TOOLS APPL, V78, P3925
  • [2] Twitter spam account detection based on clustering and classification methods
    Adewole, Kayode Sakariyah
    Hang, Tao
    Wu, Wanqing
    Songs, Houbing
    Sangaiah, Arun Kumar
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (07) : 4802 - 4837
  • [3] Al-Janabi M., 2017, IEEEACM INT C ADV SO, P1104
  • [4] [Anonymous], 2012, NDSS
  • [5] [Anonymous], 2008, P 6 NZ COMPUTER SCI
  • [6] [Anonymous], 2012, P 21 INT C WORLD WID, DOI DOI 10.1145/2187836.2187847
  • [7] Berger J.M., 2015, The evolution of terrorist propaganda: The Paris attack and social media
  • [8] Bilge L., 2009, Proc 18th Int Conf on World Wide Web, P551, DOI [10.1145/1526709.1526784, DOI 10.1145/1526709.1526784]
  • [9] Discovering spammer communities in twitter
    Bindu, P. V.
    Mishra, Rahul
    Thilagam, P. Santhi
    [J]. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2018, 51 (03) : 503 - 527
  • [10] Discovering suspicious behavior in multilayer social networks
    Bindu, P. V.
    Thilagam, P. Santhi
    Ahuja, Deepesh
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2017, 73 : 568 - 582