Abstract
The faster and regular usage of Web 2.0 technologies like Online Social Networks (OSNs) addicted to millions of users worldwide. This popularity made target for spammers and fake users to spread phishing attack, viruses, false news, pornography and unwanted advertisements like URLs, images and videos etc. The present paper proposes a behavioral analysis-based framework for classifying spam contents in real time by aggregating machine learning techniques and genetic algorithm. The main procedure of the work is, firstly based on social networks spam policy, novel profile based and content-based features are proposed to facilitate spam detection. Secondly, accumulate a dataset from various social networks like Facebook, Twitter, and Instagram including spam and non-spam profiles. For suitable feature selections, we have used a genetic algorithm and various classifiers for decision making. In order to attest the effectiveness of our proposed framework, we have compared with existing techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, Z., Gupta, B.B.: Social media security and trustworthiness: overview and new direction. Fut. Generation Comput. Syst. 86, 914–925 (2018)
Gupta, B.B., Gupta, S., Gangwar, S., Kumar, M., Meena, P.K.: Cross-site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defense. J. Inf. Priv. Secur. 11(2), 118–136 (2015)
Zhang, Z., Sun, R., Zhao, C., Wang, J., Chang, C.K., et al.: CyVOD: a novel trinity multimedia social network scheme. Multimedia Tools Appl. 76(18), 18513–18529 (2017)
Brezinski, K., Guevarra, M., Ferens, K.: Population Based Equilibrium in Hybrid SA/PSO for Combinatorial Optimization: Hybrid SA/PSO for Combinatorial Optimization. Int. J. Softw. Sci. Comput. Intell. (IJSSCI) 12(2), 74–86 (2020)
Harrath, Y., Bahlool, R.: Multi-objective genetic algorithm for tasks allocation in cloud computing. Int. J. Cloud Appl. Comput. (IJCAC) 9(3), 37–57 (2019)
Sahoo, S.R., Gupta, B.B.: Classification of various attacks and their defence mechanism in online social networks : a survey. Enterp. Inf. Syst. pp. 1–33 (2019). http://doi.org/10.1080/17517575.2019.1605542
Sahoo, S.R., Gupta, B.B.: Classification of spammer and non-spammer content in online social network using genetic algorithm-based feature selection. Enterprise Inf. Syst. 710–736 (2020). http://doi.org/10.1080/17517575.2020.1712742
Singh, M., Bansal, D., Sofat, S.: Who is who on twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time. Cybern. Syst. 49(1), 1–25 (2018)
Sahoo, S.R., Gupta, B.B.: Fake profile detection in multimedia big data on online social networks. Int. J. Inf. Comput. Secur. 303–331 (2020). http://doi.org/10.1504/IJICS.2020.105181
Yu, D., Chen, N., Jiang, F., Fu, B., Qin, A.: Constrained NMF-based semi-supervised learning for social media spammer detection. Knowl.-Based Syst. 125, 64–73 (2017)
Sahoo, S.R., Gupta, B.B.: Popularity-based detection of malicious content in facebook using machine learning approach. In: First International Conference on Sustainable Technologies for Computational Intelligence, pp. 163–176. Springer, Singapore (2020)
Gyongyi, Z., Garcia-Molina, H., Pedersen, J.: Combating Web spam with trust rank. In: Proceedings of the Thirteeth International Conference on Very Large Data Bases, vol. 30, VLDB 2004, pp. 576–587 (2004)
Xue, J., Yang, Z., Yang, X., Wang, X., Chen, L., Dai, Y.: Votetrust: leveraging friend invitation graph to defend against social network sybils. In: Proceeding of the 32nd IEEE International Conference on Computer Communications, INFOCOM 2013 (2013)
Alweshah, M., Al Khalaileh, S., Gupta, B.B., Almomani, A., Hammouri, A.I., Al-Betar, M.A.: The monarch butterfly optimization algorithm for solving feature selection problems. Neural Comput. Appl. 1–15 (2020)
Sahoo, S.R., Gupta, B.B.: Hybrid approach for detection of malicious profiles in twitter. Comput. Electric. Eng. 65–81, 2019 (2019). https://doi.org/10.1016/j.compeleceng.2019.03.003
Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Network Comput. Appl. 60, 19–31 (2016)
Jain, A.K., Gupta, B.B.: Towards detection of phishing websites on client-side using machine learning based approach. Telecommun. Syst. 68(4), 687–700 (2018)
Kaur, R., Kaur, M., Singh, S.: A novel graph centrality based approach to analyze anomalous nodes with negative behavior. Procedia Comput. Sci. 78, 556–562 (2016)
Ameen, A.K., Kaya, B.: Detecting spammers in twitter network. Int. J. Appl. Math. Electron. Comput. 5(4), 71–75 (2017)
Ala’M, A.-Z., Faris, H. et al.: Spam profile detection in social networks based on public features. In: 2017 8th International Conference on Information and Communication Systems (ICICS), pp. 130–135. IEEE (2017)
Herzallah, W., Faris, H., Adwan, O.: Feature engineering for detecting spammers on twitter: Modelling and analysis. J. Inf. Sci. 0165551516684296 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sahoo, S.R., Gupta, B.B., Choi, C., Hsu, CH., Chui, K.T. (2020). Behavioral Analysis to Detect Social Spammer in Online Social Networks (OSNs). In: Chellappan, S., Choo, KK.R., Phan, N. (eds) Computational Data and Social Networks. CSoNet 2020. Lecture Notes in Computer Science(), vol 12575. Springer, Cham. https://doi.org/10.1007/978-3-030-66046-8_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-66046-8_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66045-1
Online ISBN: 978-3-030-66046-8
eBook Packages: Computer ScienceComputer Science (R0)