Semi-Supervised Spam Detection in Twitter Stream

被引:87
作者
Sedhai, Surendra [1 ]
Sun, Aixin [1 ]
机构
[1] Nanyang Technol Univ, Sch Engn & Comp Sci, Singapore 639798, Singapore
关键词
Semi-supervised learning; Twitter; spam;
D O I
10.1109/TCSS.2017.2773581
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most existing techniques for spam detection on Twitter aim to identify and block users who post spam tweets. In this paper, we propose a semi-supervised spam detection ((SD)-D-3) framework for spam detection at tweet-level. The proposed framework consists of two main modules: spam detection module operating in real-time mode and model update module operating in batch mode. The spam detection module consists of four lightweight detectors: 1) blacklisted domain detector to label tweets containing blacklisted URLs; 2) near-duplicate detector to label tweets that are near-duplicates of confidently prelabeled tweets; 3) reliable ham detector to label tweets that are posted by trusted users and that do not contain spammy words; and 4) multiclassifier-based detector labels the remaining tweets. The information required by the detection module is updated in batch mode based on the tweets that are labeled in the previous time window. Experiments on a large-scale data set show that the framework adaptively learns patterns of new spam activities and maintain good accuracy for spam detection in a tweet stream.
引用
收藏
页码:169 / 175
页数:7
相关论文
共 25 条
[1]  
[Anonymous], 2013, ADV INTELLIGENT SYST
[2]  
[Anonymous], 2010, P 17 ACM C COMP COMM
[3]  
Benevenuto Fabricio., 2010, CEAS
[4]   On the resemblance and containment of documents [J].
Broder, AZ .
COMPRESSION AND COMPLEXITY OF SEQUENCES 1997 - PROCEEDINGS, 1998, :21-29
[5]  
Castillo C., 2011, P 20 INT C WORLD WID, P675, DOI DOI 10.1145/1963405.1963500
[6]   A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection [J].
Chen, Chao ;
Zhang, Jun ;
Xie, Yi ;
Xiang, Yang ;
Zhou, Wanlei ;
Hassan, Mohammad Mehedi ;
AlElaiwi, Abdulhameed ;
Alrubaian, Majed .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2015, 2 (03) :65-76
[7]  
Chhabra Sidharth., 2011, Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, P92
[8]  
Chu Z, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P21
[9]  
Ferrara E, 2014, THE RISE OF SOCIAL B
[10]  
Gao H., 2012, EVID-BASED COMPL ALT, V2012, P1, DOI DOI 10.1007/S10644-012-9137-0