Skip to main content
Log in

Detection of unreliable and reliable pages on Facebook

  • Original Article
  • Published:
Artificial Life and Robotics Aims and scope Submit manuscript

Abstract

Currently, the number of Facebook pages is dramatically increased on Facebook because the users can easily create their own pages for free to promote their products and services for marketing purposes. Unfortunately, some of pages are created for malicious intention. Therefore, detecting and identifying malicious Facebook pages is a challenging task. To achieve the task, features extracted from four parts of pages, i.e., page details, product/service details, user responses and post behavior of administrator are examined for the detection. The extracted features are investigated to detect reliable and unreliable pages based on supervised machine learning. First, Facebook pages are randomly collected and then they are labeled by five users. Facebook pages with agreement of five users are selected and their information are retrieved using the Facebook Graph API. Next, features are extracted from the information and investigated in the experiments. The experimental results indicate that the classification prediction is improved to 91.37% of accuracy. Finally, the significant features are analyzed to distinguish between unreliable and reliable pages.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Statista (2017) Facebook—statistics and facts. https://www.statista.com/topics/751/facebook/. Accessed 22 Dec 2017

  2. Zhu DS, Kuo MJ, Lee TR (2012) Cohesiveness and sense of community of fan club members at facebook pages. In: 2012 13th ACIS international conference on software engineering, artificial intelligence, networking and parallel and distributed computing (SNPD), 8–10 Aug. 2012 2012. pp 362–367. https://doi.org/10.1109/snpd.2012.74

  3. Lin YTJ, Lin MYT, Li KC L (2015) Consumer involvement model of fan page: mining from facebook data of a real celebrity fashion brand. In: 2015 12th international conference on service systems and service management (ICSSSM), 22–24 June 2015 2015. pp 1–6. https://doi.org/10.1109/icsssm.2015.7170187

  4. Peeroo S, Samy M, Jones B (2015) Customer engagement manifestations on Facebook pages of Tesco and Walmart. In: 2015 International conference on computing, communication and security (ICCCS), 4–5 Dec. 2015 2015. pp 1–8. https://doi.org/10.1109/cccs.2015.7374166

  5. Mauda L, Kalman YM (2016) Characterizing quantitative measures of user engagement on organizational facebook pages. In: 2016 49th Hawaii international conference on system sciences (HICSS), 5–8 Jan. 2016 2016. pp 3526–3535. https://doi.org/10.1109/hicss.2016.442

  6. Jeon H, Ahn HJ (2015) Identification of the factors that affect the user reaction to posts on Facebook brand pages. In: 2015 International conference on computer and computational sciences (ICCCS), 27–29 Jan. 2015 2015. pp 203–206. https://doi.org/10.1109/iccacs.2015.7361350

  7. Li-Chun H (2017) Investigating community members purchase intention on Facebook fan page: from a dualistic perspective of trust relationships. Ind Manag Data Syst 117:766–800. https://doi.org/10.1108/IMDS-05-2016-0180

    Article  Google Scholar 

  8. Huang SL, Chen CT (2018) How consumers become loyal fans on Facebook. Comput Hum Behav 82:124–135. https://doi.org/10.1016/j.chb.2018.01.006

    Article  Google Scholar 

  9. Lin KC, Wu SH, Chen LP, Yang PC (2015) Finding the key users in facebook fan pages via a clustering approach. In: 2015 IEEE international conference on information reuse and integration (IRI), 13-15 Aug. 2015 2015. pp 556–561. https://doi.org/10.1109/iri.2015.89

  10. Zhou L, Sung Y-w (2008) Cues to deception in online chinese groups. In: Proceedings of the 41st annual Hawaii international conference on system sciences, 2008. IEEE Computer Society, 1334955, p 146. https://doi.org/10.1109/hicss.2008.109

  11. Zhou L (2005) An empirical investigation of deception behavior in instant messaging. IEEE Trans Prof Commun 48:147–160. https://doi.org/10.1109/tpc.2005.849652

    Article  Google Scholar 

  12. Briscoe EJ, Appling DS, Hayes H (2014) Cues to deception in social media communications. In: 2014 47th Hawaii international conference on system sciences, 6–9 Jan. 2014 2014. pp 1435–1443. https://doi.org/10.1109/hicss.2014.186

  13. Appling DS, Briscoe EJ, Hutto CJ (2015) Discriminative models for predicting deception strategies. In: Proceedings of the 24th international conference on world wide web, Florence, Italy, 2015. ACM, 2742575, pp 947–952. https://doi.org/10.1145/2740908.2742575

  14. Ott M, Choi Y, Cardie C, Hancock JT (2011) Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th annual meeting of the association for computational linguistics: human language technologies—volume 1, Portland, Oregon, 2011. Association for Computational Linguistics, 2002512, pp 309–319

  15. Rayana S, Akoglu L (2015) Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, Sydney, NSW, Australia, 2015. ACM, 2783370, pp 985–994. https://doi.org/10.1145/2783258.2783370

  16. Ren YF, Ji DH, Yin L, Zhang HB (2015) Finding deceptive opinion spam by correcting the mislabeled instances. Chin J Electron 24:52–57

    Article  Google Scholar 

  17. More S, Kalkundri R (2015) Evaluation of deceptive mails using filtering& WEKA. In: 2015 International conference on innovations in information, embedded and communication systems (ICIIECS), 19–20 March 2015 2015. pp 1–4. https://doi.org/10.1109/iciiecs.2015.7193262

  18. More S, Kulkarni SA (2013) Data mining with machine learning applied for email deception. In: 2013 International conference on optical imaging sensor and security (ICOSS), 2–3 July 2013 2013. pp 1–4. https://doi.org/10.1109/icoiss.2013.6678403

  19. Bhat SY, Abulaish M, Mirza AA (2014) Spammer classification using ensemble methods over structural social network features. In: 2014 IEEE/WIC/ACM International joint conferences on web intelligence (WI) and intelligent agent technologies (IAT), 11–14 Aug. 2014 2014. pp 454–458. https://doi.org/10.1109/wi-iat.2014.133

  20. Zheng X, Zeng Z, Chen Z, Yu Y, Rong C (2015) Detecting spammers on social networks. Neurocomputing 159:27–34. https://doi.org/10.1016/j.neucom.2015.02.047

    Article  Google Scholar 

  21. Gupta A, Kaushal R (2015) Improving spam detection in Online Social Networks. In: 2015 International conference on cognitive computing and information processing (CCIP), 3–4 March 2015 2015. pp 1–6. https://doi.org/10.1109/ccip.2015.7100738

  22. Fire M, Katz G, Elovici Y (2012) Strangers intrusion detection—detecting spammers and fake profiles in social networks based on topology anomalies. doi:citeulike-article-id:13598433

  23. Alowibdi JS, Buy UA, Yu PS, Stenneth L (2014) Detecting deception in online social networks. In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), 17–20 Aug. 2014 2014. pp 383–390. https://doi.org/10.1109/asonam.2014.6921614

  24. Songram P, Choompol A, Thipsanthia P, Boonjing V (2016) Detecting Thai messages leading to deception on facebook. In: Huynh V-N, Inuiguchi M, Le B, Le BN, Denoeux T (eds) Integrated uncertainty in knowledge modelling and decision making. Springer International Publishing, Cham, 2016// 2016, pp 293–304

  25. The Graph API. (2017). https://developers.facebook.com/docs/graph-api. Accessed 5 Nov 2017

  26. Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20:273–297. https://doi.org/10.1023/a:1022627411411

    MATH  Google Scholar 

  27. Guo G, Wang H, Bell D, Bi Y, Greer K (2003) KNN model-based approach in classification. In: Meersman R, Tari Z, Schmidt D (eds) On the move to meaningful internet systems 2003: CoopIS, DOA, and ODBASE, vol 2888. Lecture notes in computer science. Springer, Berlin, pp 986–996. https://doi.org/10.1007/978-3-540-39964-3_62

  28. Liao Y, Vemuri VR (2002) Using text categorization techniques for intrusion detection. In: Proceeding of the 11th USENIX security symposium, CA, USA, 2002. pp. 5–9

  29. Ceriani L, Verme P (2012) The origins of the Gini index: extracts from Variabilit e Mutabilit (1912) by Corrado Gini. J Econ Inequal 10:421–443. https://doi.org/10.1007/s10888-011-9188-x

    Article  Google Scholar 

  30. Liu H, Setiono R (1995) Chi2: feature selection and discretization of numeric attributes. In: Proceedings of the seventh international conference on tools with artificial intelligence, 1995. IEEE Computer Society, 832359, p 88

  31. Duda RO, Hart PE, Stork DG (2000) Pattern classification, 2nd edn. Wiley, Hoboken

    MATH  Google Scholar 

  32. Fonti V, Belitser E (2017) Feature selection using LASSO. https://beta.vu.nl/nl/Images/werkstuk-fonti_tcm235-836234.pdf. Accessed 30 Mar 2017

  33. Tibshirani R (1996) Regression shrinkage and selection via the Lasso. J R Stat Soc Ser B (Methodological) 58:267–288

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This research was financially supported by Mahasarakham university research support and development found.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Panida Songram.

Additional information

This work was presented in part at the 23rd International Symposium on Artificial Life and Robotics, Beppu, Oita, January 18–20, 2018.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Songram, P. Detection of unreliable and reliable pages on Facebook. Artif Life Robotics 24, 278–284 (2019). https://doi.org/10.1007/s10015-018-0509-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10015-018-0509-z

Keywords

Navigation