Hybrid approach for detection of malicious profiles in twitter

被引:49
作者
Sahoo, Somya Ranjan [1 ]
Gupta, B. B. [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Kurukshetra, Haryana, India
关键词
Online social network; Fake profile; Feature selection; Machine learning; Petri net; Hybrid approach; ONLINE SOCIAL NETWORKS;
D O I
10.1016/j.compeleceng.2019.03.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Emergence of social media invokes social actors to share their information digitally. Moreover, it enables them to maintain their links with other people worldwide. Due to its massive popularity, it has become a fascinating test bed to initiate various attacks. Attackers form Sybil nodes to disseminate malicious content in order to infect legitimate users aiming to steal sensitive information, such as user's credentials. Therefore, the focus of this paper is to detect malicious profiles, specifically on the Twitter microblogging platform. We propose a hybrid approach which leverages the capabilities of machine learning techniques to identify malicious profiles. Initially, Petri net structure analyzes the user's profile and various features, and these features are then used to train classifier. This is achieved to identify malicious profiles from legitimate users. Finally, to prove the efficiency, a comparative analysis of our approach is conducted with existing state-of-the-art techniques. The experimental results reveal that our approach achieves a high detection rate of 99.16% which is better than other techniques. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:65 / 81
页数:17
相关论文
共 27 条
[1]  
[Anonymous], INT J ENG SCI
[2]  
Bin Ahmadon MA, 2016, P IEEE ICCE 2016, V2016, P449
[3]   Fame for sale: Efficient detection of fake Twitter followers [J].
Cresci, Stefano ;
Di Pietro, Roberto ;
Petrocchi, Marinella ;
Spognardi, Angelo ;
Tesconi, Maurizio .
DECISION SUPPORT SYSTEMS, 2015, 80 :56-71
[4]   If walls could talk: Patterns and anomalies in Facebook wallposts [J].
Devineni, Pravallika ;
Koutra, Danai ;
Faloutsos, Michalis ;
Faloutsos, Christos .
PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, :367-374
[5]   Leveraging Financial Social Media Data for Corporate Fraud Detection [J].
Dong, Wei ;
Liao, Shaoyi ;
Zhang, Zhongju .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2018, 35 (02) :461-487
[6]  
Efthimion PG, 2018, SMU DATA SCI REV, V1, P5
[7]  
Ersahin B, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), P388, DOI 10.1109/UBMK.2017.8093420
[8]  
Gupta B.B., 2018, COMPUTER CYBER SECUR, P666
[9]  
Gupta BB, 2016, HDB RES MODERN CRYPT, P589
[10]   Profile characteristics of fake Twitter accounts [J].
Gurajala, Supraja ;
White, Joshua S. ;
Hudson, Brian ;
Voter, Brian R. ;
Matthews, Jeanna N. .
BIG DATA & SOCIETY, 2016, 3 (02) :1-13