A survey on detecting spam accounts on Twitter network

被引:20
作者
Citlak, Oguzhan [1 ]
Dorterler, Murat [1 ]
Dogru, Ibrahim Alper [1 ]
机构
[1] Gazi Univ, Fac Technol, Dept Comp Engn, Ankara, Turkey
关键词
Social network; Spam accounts; Spam detection on Twitter; Spam analysis on Twitter; MESSAGES; MEDIA;
D O I
10.1007/s13278-019-0582-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks have become an inseparable part of our lives today. Services such as Facebook, Twitter, Instagram, Google + and LinkedIn in particular have had a significant place in Internet use in recent years. People establish instant interactions between each other over the Internet using these social services. They get many advantages such as creating their own groups, being informed about different interest areas and being able to make many contacts. Twitter is one of the mostly used platforms among the social networks. A social network that is being used so commonly has become a target for the vicious people (spammers). There is an increase in the number of spammers on Twitter too. Malicious content and messages (spams) prepared by the spammers do threat the security as well as performance. The first and most important condition to protect against this threat is to know the harmful methods of spam. Thus, this will make it easier to detect and protect. In this study, prominent detection methods of spams are analyzed. How the real users and fake users are distinguished as well as weak and strong aspects of the methods for these processes are compared and evaluated.
引用
收藏
页数:13
相关论文
共 53 条
[1]  
Akar E., 2010, Sosyal medya pazarlamasi: sosyal webde pazarlama stratejileri
[2]   Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots [J].
Akiyama, Mitsuaki ;
Yagi, Takeshi ;
Yada, Takeshi ;
Mori, Tatsuya ;
Kadobayashi, Youki .
COMPUTERS & SECURITY, 2017, 69 :155-173
[3]  
[Anonymous], 2019, TOP 15 MOST POPULAR
[4]  
[Anonymous], 2019, TURKIYE STAT KURUMU
[5]  
[Anonymous], 2010, ANAL SOCIAL MEDIA NE
[6]  
Benevenuto Fabricio., 2010, CEAS
[7]  
Bhuyan MH, 2012, PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), P533
[8]   Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs [J].
Boshmaf, Yazan ;
Logothetis, Dionysios ;
Siganos, Georgos ;
Leria, Jorge ;
Lorenzo, Jose ;
Ripeanu, Matei ;
Beznosov, Konstantin .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[9]   Social Network Sites: Definition, History, and Scholarship [J].
Boyd, Danah M. ;
Ellison, Nicole B. .
JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2007, 13 (01) :210-230
[10]   Spam filtering for short messages in adversarial environment [J].
Chan, Patrick P. K. ;
Yang, Cheng ;
Yeung, Daniel S. ;
Ng, Wing W. Y. .
NEUROCOMPUTING, 2015, 155 :167-176