Analysis of Ensemble Learning Models for Identifying Spam over Social Networks using Recursive Feature Elimination

被引:3
作者
Garg, Puneet [1 ]
Singh, Shailendra Narayan [1 ]
机构
[1] Amity Univ, Dept Comp Sci & Engn, Noida, Uttar Pradesh, India
来源
2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021) | 2021年
关键词
Social Network; XGBoost; ADABoost; Recursive Feature Elimination;
D O I
10.1109/Confluence51648.2021.9377161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social Networking platforms are regarded as being the reliable and valued communication medium for transferring information and communicating, used by the millions throughout the world Users' reliance on these social networking sites is growing to seek perspectives, updates, alerts, news etc. While it is evident that the online social networks have become a way for information sharing, at the same instant they have rapidly become a medium fir spreading misinformation rumors, unsolicited messages. propaganda, fake news, and so on. It can indeed be said that a social networking platform consists of two types of users, namely Spammers and Non-Spammers. Spammers typically spread misinformation or share undesirable content on social networking websites, out of malicious intents. In this work, a model is proposed to identify Spammers in Twitter network. This work is based on the user behavior-based and content-based features like IIashtags, URLs, Mentions, Replies, and Retweets. In this work, the Recursive Feature Elimination is used along with Support Vector Machine, Random Forest, Logistic Regression, Adaptive Boosting, and XGBoost. For data pre-processing, Weka is used, and implemented the five classifiers mentioned with Recursive Feature Elimination using sklearn in Python. Performance measures such as TP Rate, FP Rate, Precision, F-Measure and Accuracy are used for evaluating the performance of the proposed model.
引用
收藏
页码:713 / 718
页数:6
相关论文
共 9 条
[1]   Social Media and Fake News in the 2016 Election [J].
Allcott, Hunt ;
Gentzkow, Matthew .
JOURNAL OF ECONOMIC PERSPECTIVES, 2017, 31 (02) :211-235
[2]  
[Anonymous], TRANSIENTOBJECT PRIY
[3]  
[Anonymous], TWITTER
[4]  
[Anonymous], 2011, Facebook
[5]  
Goolsby R., 2013, On Cybersecurity, Crowdsourcing, and Social Cyber-Attack
[6]   Feature engineering for detecting spammers on Twitter: Modelling and analysis [J].
Herzallah, Wafa ;
Faris, Hossam ;
Adwan, Omar .
JOURNAL OF INFORMATION SCIENCE, 2018, 44 (02) :230-247
[7]   Social network security: Issues, challenges, threats, and solutions [J].
Rathore, Shailendra ;
Sharma, Pradip Kumar ;
Loia, Vincenzo ;
Jeong, Young-Sik ;
Park, Jong Hyuk .
INFORMATION SCIENCES, 2017, 421 :43-69
[8]  
Stringhini G, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P1
[9]  
Wood P., 2015, INTERNET SECURITY TH