Detecting Spammers on Social Networks Based on a Hybrid Model

被引:0
作者
Xu, Guangxia [1 ,2 ]
Qi, Jin [1 ]
Huang, Deling [1 ]
Daneshmand, Mahmoud [3 ]
机构
[1] CQUPT, Sch Software Engn, Chongqing 400065, Peoples R China
[2] Chongqing Univ, Informat & Commun Engn Postdoctoral Res Stn, Chongqing 400044, Peoples R China
[3] Stevens Inst Technol, Sch Business, Hoboken, NJ 07030 USA
来源
2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2016年
基金
中国博士后科学基金;
关键词
social network; spammer; hybrid model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
T he prosperity of social networks provides users with convenient communication but also attracts a large number of spammers. To solve this problem, this paper combines supervised learning and unsupervised learning algorithms, and proposes a novel hybrid model based on OPTICS and SVM. First, we collected a dataset from Sina Weibo including 10,000 users and 134,188 messages; then extracted the content based features and user behavior based features from the dataset; afterwards, we applied the features into the hybrid model to establish the classification model. The experiment shows that the proposed approach is capable of detecting spammers effectively with 87.6% spammers and 94.7% legitimate users correctly classified.
引用
收藏
页码:3062 / 3068
页数:7
相关论文
共 13 条
  • [1] A generic statistical approach for spam detection in Online Social Networks
    Ahmed, Faraz
    Abulaish, Muhammad
    [J]. COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1120 - 1129
  • [2] Ankerst M, 1999, SIGMOD RECORD, VOL 28, NO 2 - JUNE 1999, P49
  • [3] Benevenuto Fabricio., 2010, CEAS
  • [4] Bhat SajidYousuf., 2013, ADV SOCIAL NETWORKS, P100
  • [5] Social Network Sites: Definition, History, and Scholarship
    Boyd, Danah M.
    Ellison, Nicole B.
    [J]. JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2007, 13 (01): : 210 - 230
  • [6] Uncovering Large Groups of Active Malicious Accounts in Online Social Networks
    Cao, Qiang
    Yang, Xiaowei
    Yu, Jieqi
    Palow, Christopher
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 477 - 488
  • [7] CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
  • [8] Uncovering Social Spammers: Social Honeypots plus Machine Learning
    Lee, Kyumin
    Caverlee, James
    Webb, Steve
    [J]. SIGIR 2010: PROCEEDINGS OF THE 33RD ANNUAL INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH DEVELOPMENT IN INFORMATION RETRIEVAL, 2010, : 435 - 442
  • [9] Miller Z., 2014, INFORM SCI, V260, P6473
  • [10] Pang-Ning T., 2011, INTRO DATA MINING