Machine Learning based Optimization Scheme for Detection of Spam and Malware Propagation in Twitter

被引:0
作者
Sheoran, Savita Kumari [1 ]
Yadav, Partibha [1 ]
机构
[1] Indira Gandhi Univ Meerpur, Comp Sci & Engn Dept, Rewari, India
关键词
Social networking sites; Twitter; spam; malware; Cosine similarity; Jaccard similarity; genetic algorithm; artificial neural network; PERFORMANCE;
D O I
10.14569/IJACSA.2021.0120262
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Social networking sites are new generation of web-services providing global community of users in an online environment. Twitter is one of such popular social networks having more than 152 million daily active users making a half billions of tweets per day. Owing to its immense popularity, the accounts of legitimate Twitter users are always at a risk from spammers and hackers. Spam and Malware are the most affecting threats reported on the Twitter platform. To preserve the privacy and ensure data safety for online Twitter community, it is necessary develop a framework to safeguard their accounts from such malicious attackers. Machine Learning is recently matured and widely used technique useful to prevent the propagation of such malicious activities in social media. However, the Machine Learning based techniques have yielded a promising result in filtering the undesired contents from the user tweets but its efficiency always remains restricted within the technological limits of the technique used. To devise a more efficient model to detect propagation of spam and malware in the Twitter, this research has proposed a Machine Learning based optimization scheme based on hybrid similarity (Cosine and Jaccard) measured in conjunction with Genetic Algorithm (GA) and Artificial Neural Network (ANN). The Cosine with Jaccard in hybridization has been applied on the Twitter dataset to identify the tweets containing spam and malware. In conjunction to it the GA has been used to enhance the training rate and reduce training error by automatically selecting the designed fitness function while the ANN was applied to classify malicious tweets from through voting rule. The simulation experiments were conducted to compute the precision rate, recall, F-measures. The results of Machine Learning based optimization scheme proposed in this research were compared with the existing state-of-arts techniques already available in this regime. The comparative study reveals that the model proposed in this research is faster and more precise then the existing models.
引用
收藏
页码:495 / 503
页数:9
相关论文
共 25 条
[1]  
Ahmed F, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), P265, DOI 10.1109/ICCE.2012.6161859
[2]  
Alqatawna J., 2017, Social Media Shaping E-Publishing and Academia, P121, DOI DOI 10.1007/978-3-319-55354-2_10
[3]  
[Anonymous], 2018, RSRI C RECENT TRENDS
[4]  
[Anonymous], 2014, IJCSIT INT J COMPUTE
[5]  
Beutel A., 2013, P 33 INT C WORLD WID, P119
[6]   A survey of learning-based techniques of email spam filtering [J].
Blanzieri, Enrico ;
Bryl, Anton .
ARTIFICIAL INTELLIGENCE REVIEW, 2008, 29 (01) :63-92
[7]   Malware Propagation in Online Social Networks [J].
Faghani, Mohammad Reza ;
Saidi, Hossein .
2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, :8-+
[8]  
Fei G, 2017, SENTIMENT ANALYSIS IN SOCIAL NETWORKS, P141, DOI 10.1016/B978-0-12-804412-4.00009-7
[9]   @spam: The Underground on 140 Characters or Less [J].
Grier, Chris ;
Thomas, Kurt ;
Paxson, Vern ;
Zhang, Michael .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :27-37
[10]  
Gupta H, 2018, INT CONF COMMUN SYST, P380, DOI 10.1109/COMSNETS.2018.8328222