Classifying Twitter Spammer based on User's Behavior using Decision Tree

被引:0
作者
Fitriani, Yuli [1 ]
Sumpeno, Surya [1 ]
Purnomo, Mauridhi Hery [1 ]
机构
[1] Inst Teknol Sepuluh Nopember, Dept Elect Engn, Surabaya, Indonesia
来源
2019 ASIA PACIFIC CONFERENCE ON RESEARCH IN INDUSTRIAL AND SYSTEMS ENGINEERING (APCORISE) | 2019年
关键词
decision tree; classification; machine learning; microblogging; spammers; twitter;
D O I
10.1109/APCORISE46197.2019.9318872
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Twitter is one of microblogging service that widely used by people. Its popularity invites spammers to disturb other users with a large number of spam tweets. Spammers send untrusted news, unwanted tweets to another twitter accounts to introduce a product and service, a job with high salary, promote a new website, spread advertise to generate sales that could harm other users. This paper collects a hundred accounts from non-spammer and spammer. After that, manually classified as a non-spammer and spammer. User's behavior characteristics, which could give many clues to classify spammer. This paper applies profile users as features for the machine learning to classify users as a non-spammer or spammer. This paper applies seven attributes such as the statuses count, followers count, friends count, the age of account, average tweets per day, average limits between tweets, verified user or not. Using a Decision Tree method, we could classify non-spammer and spammer. The accuracy of the classification of non-spammer and spammer is 88,235%
引用
收藏
页码:303 / 308
页数:6
相关论文
共 10 条
[1]   A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection [J].
Chen, Chao ;
Zhang, Jun ;
Xie, Yi ;
Xiang, Yang ;
Zhou, Wanlei ;
Hassan, Mohammad Mehedi ;
AlElaiwi, Abdulhameed ;
Alrubaian, Majed .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2015, 2 (03) :65-76
[2]   Threshold and Associative Based Classification for Social Spam Profile Detection on Twitter [J].
Hua, Willian ;
Zhang, Yanqing .
2013 NINTH INTERNATIONAL CONFERENCE ON SEMANTICS, KNOWLEDGE AND GRIDS (SKG), 2013, :113-120
[3]  
Lin PC, 2013, INT CONF ADV COMMUN, P841
[4]  
Magno G., DETECTING SPAMMERS T
[5]   Credal-C4.5: Decision tree based on imprecise probabilities to classify noisy data [J].
Mantas, Carlos J. ;
Abellan, Joaquin .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (10) :4625-4637
[6]  
Mateen M, 2017, INT BHURBAN C APPL S, P466, DOI 10.1109/IBCAST.2017.7868095
[7]  
McCord M., 2011, Autonomic and Trusted Computing. Proceedings 8th International Conference (ATC 2011), P175, DOI 10.1007/978-3-642-23496-5_13
[8]  
Meda C, 2014, INT CARN CONF SECU, P1
[9]  
Stringhini G, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P1
[10]  
Wang AH, 2010, SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, P142