Skip to main content

Behavioral Analysis to Detect Social Spammer in Online Social Networks (OSNs)

  • Conference paper
  • First Online:
Computational Data and Social Networks (CSoNet 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12575))

Included in the following conference series:

Abstract

The faster and regular usage of Web 2.0 technologies like Online Social Networks (OSNs) addicted to millions of users worldwide. This popularity made target for spammers and fake users to spread phishing attack, viruses, false news, pornography and unwanted advertisements like URLs, images and videos etc. The present paper proposes a behavioral analysis-based framework for classifying spam contents in real time by aggregating machine learning techniques and genetic algorithm. The main procedure of the work is, firstly based on social networks spam policy, novel profile based and content-based features are proposed to facilitate spam detection. Secondly, accumulate a dataset from various social networks like Facebook, Twitter, and Instagram including spam and non-spam profiles. For suitable feature selections, we have used a genetic algorithm and various classifiers for decision making. In order to attest the effectiveness of our proposed framework, we have compared with existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhang, Z., Gupta, B.B.: Social media security and trustworthiness: overview and new direction. Fut. Generation Comput. Syst. 86, 914–925 (2018)

    Article  Google Scholar 

  2. Gupta, B.B., Gupta, S., Gangwar, S., Kumar, M., Meena, P.K.: Cross-site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defense. J. Inf. Priv. Secur. 11(2), 118–136 (2015)

    Google Scholar 

  3. Zhang, Z., Sun, R., Zhao, C., Wang, J., Chang, C.K., et al.: CyVOD: a novel trinity multimedia social network scheme. Multimedia Tools Appl. 76(18), 18513–18529 (2017)

    Google Scholar 

  4. Brezinski, K., Guevarra, M., Ferens, K.: Population Based Equilibrium in Hybrid SA/PSO for Combinatorial Optimization: Hybrid SA/PSO for Combinatorial Optimization. Int. J. Softw. Sci. Comput. Intell. (IJSSCI) 12(2), 74–86 (2020)

    Article  Google Scholar 

  5. Harrath, Y., Bahlool, R.: Multi-objective genetic algorithm for tasks allocation in cloud computing. Int. J. Cloud Appl. Comput. (IJCAC) 9(3), 37–57 (2019)

    Google Scholar 

  6. Sahoo, S.R., Gupta, B.B.: Classification of various attacks and their defence mechanism in online social networks : a survey. Enterp. Inf. Syst. pp. 1–33 (2019). http://doi.org/10.1080/17517575.2019.1605542

  7. Sahoo, S.R., Gupta, B.B.: Classification of spammer and non-spammer content in online social network using genetic algorithm-based feature selection. Enterprise Inf. Syst. 710–736 (2020). http://doi.org/10.1080/17517575.2020.1712742

  8. Singh, M., Bansal, D., Sofat, S.: Who is who on twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time. Cybern. Syst. 49(1), 1–25 (2018)

    Article  Google Scholar 

  9. Sahoo, S.R., Gupta, B.B.: Fake profile detection in multimedia big data on online social networks. Int. J. Inf. Comput. Secur. 303–331 (2020). http://doi.org/10.1504/IJICS.2020.105181

  10. Yu, D., Chen, N., Jiang, F., Fu, B., Qin, A.: Constrained NMF-based semi-supervised learning for social media spammer detection. Knowl.-Based Syst. 125, 64–73 (2017)

    Article  Google Scholar 

  11. Sahoo, S.R., Gupta, B.B.: Popularity-based detection of malicious content in facebook using machine learning approach. In: First International Conference on Sustainable Technologies for Computational Intelligence, pp. 163–176. Springer, Singapore (2020)

    Google Scholar 

  12. Gyongyi, Z., Garcia-Molina, H., Pedersen, J.: Combating Web spam with trust rank. In: Proceedings of the Thirteeth International Conference on Very Large Data Bases, vol. 30, VLDB 2004, pp. 576–587 (2004)

    Google Scholar 

  13. Xue, J., Yang, Z., Yang, X., Wang, X., Chen, L., Dai, Y.: Votetrust: leveraging friend invitation graph to defend against social network sybils. In: Proceeding of the 32nd IEEE International Conference on Computer Communications, INFOCOM 2013 (2013)

    Google Scholar 

  14. Alweshah, M., Al Khalaileh, S., Gupta, B.B., Almomani, A., Hammouri, A.I., Al-Betar, M.A.: The monarch butterfly optimization algorithm for solving feature selection problems. Neural Comput. Appl. 1–15 (2020)

    Google Scholar 

  15. Sahoo, S.R., Gupta, B.B.: Hybrid approach for detection of malicious profiles in twitter. Comput. Electric. Eng. 65–81, 2019 (2019). https://doi.org/10.1016/j.compeleceng.2019.03.003

    Article  Google Scholar 

  16. Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Network Comput. Appl. 60, 19–31 (2016)

    Article  Google Scholar 

  17. Jain, A.K., Gupta, B.B.: Towards detection of phishing websites on client-side using machine learning based approach. Telecommun. Syst. 68(4), 687–700 (2018)

    Google Scholar 

  18. Kaur, R., Kaur, M., Singh, S.: A novel graph centrality based approach to analyze anomalous nodes with negative behavior. Procedia Comput. Sci. 78, 556–562 (2016)

    Article  Google Scholar 

  19. Ameen, A.K., Kaya, B.: Detecting spammers in twitter network. Int. J. Appl. Math. Electron. Comput. 5(4), 71–75 (2017)

    Article  Google Scholar 

  20. Ala’M, A.-Z., Faris, H. et al.: Spam profile detection in social networks based on public features. In: 2017 8th International Conference on Information and Communication Systems (ICICS), pp. 130–135. IEEE (2017)

    Google Scholar 

  21. Herzallah, W., Faris, H., Adwan, O.: Feature engineering for detecting spammers on twitter: Modelling and analysis. J. Inf. Sci. 0165551516684296 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. B. Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sahoo, S.R., Gupta, B.B., Choi, C., Hsu, CH., Chui, K.T. (2020). Behavioral Analysis to Detect Social Spammer in Online Social Networks (OSNs). In: Chellappan, S., Choo, KK.R., Phan, N. (eds) Computational Data and Social Networks. CSoNet 2020. Lecture Notes in Computer Science(), vol 12575. Springer, Cham. https://doi.org/10.1007/978-3-030-66046-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66046-8_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66045-1

  • Online ISBN: 978-3-030-66046-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics