Skip to main content

2019 | OriginalPaper | Buchkapitel

An Investigation on Multi View Based User Behavior Towards Spam Detection in Social Networks

verfasst von : Darshika Koggalahewa, Yue Xu

Erschienen in: Trends and Applications in Knowledge Discovery and Data Mining

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online Social Networks have become immensely vulnerable for spammers where they spread malicious contents and links. Understanding the behaviors across multiple features are essential for successful spam detection. Majority of the existing methods rely on single view of information for spam detection where diversified spam behaviors may not allow these techniques to be survived. As a result, Multiview solutions are getting emerged. Based on homophily theory, a hypothesis of spammer’s behaviors should be inconsistent across multiple views compare to legitimate user behaviors is defined. We investigated the consistency of the user’s content interest and popularity over multiple topics across multiple views. The results confirm the existence of notable difference of average similarity between legitimate and spam users. It proved that the legitimate user behaviors are consistent across multiple views while spammers are inconsistent. This indicates that consistency of user behavior across multiple views can be used for spam detection.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Workman, M.: Gaining access with social engineering: an empirical study of the threat. Inf. Syst. Secur. 16, 315–331 (2007)CrossRef Workman, M.: Gaining access with social engineering: an empirical study of the threat. Inf. Syst. Secur. 16, 315–331 (2007)CrossRef
2.
Zurück zum Zitat Lee, K., Caverlee, J., Webb, S.: The social honeypot project. In: Proceedings of the 19th International Conference on World Wide Web - WWW 2010 (2010) Lee, K., Caverlee, J., Webb, S.: The social honeypot project. In: Proceedings of the 19th International Conference on World Wide Web - WWW 2010 (2010)
3.
Zurück zum Zitat Shen, H., Ma, F., Zhang, X., Zong, L., Liu, X., Liang, W.: Discovering social spammers from multiple views. Neurocomputing 225, 49–57 (2017)CrossRef Shen, H., Ma, F., Zhang, X., Zong, L., Liu, X., Liang, W.: Discovering social spammers from multiple views. Neurocomputing 225, 49–57 (2017)CrossRef
4.
Zurück zum Zitat Adewole, K., Anuar, N., Kamsin, A., Varathan, K., Razak, S.: Malicious accounts: dark of the social networks. J. Netw. Comput. Appl. 79, 41–67 (2017)CrossRef Adewole, K., Anuar, N., Kamsin, A., Varathan, K., Razak, S.: Malicious accounts: dark of the social networks. J. Netw. Comput. Appl. 79, 41–67 (2017)CrossRef
5.
Zurück zum Zitat Hua, W., Zhang, Y.: Threshold and associative based classification for social spam profile detection on Twitter. In: Ninth International Conference on Semantics, Knowledge and Grids (2013) Hua, W., Zhang, Y.: Threshold and associative based classification for social spam profile detection on Twitter. In: Ninth International Conference on Semantics, Knowledge and Grids (2013)
6.
Zurück zum Zitat Cardoso, F.M.: Topical homophily in online social systems (2017) Cardoso, F.M.: Topical homophily in online social systems (2017)
7.
Zurück zum Zitat McPherson, M., Smith-Lovin, L., Cook, J.: Birds of a feather: homophily in social networks. Ann. Rev. Sociol. 27(1), 415–444 (2001)CrossRef McPherson, M., Smith-Lovin, L., Cook, J.: Birds of a feather: homophily in social networks. Ann. Rev. Sociol. 27(1), 415–444 (2001)CrossRef
8.
Zurück zum Zitat Sherman, R., Nave, C., Funder, D.: Situational similarity and personality predict behavioral consistency. J. Pers. Soc. Psychol. 99, 330–343 (2010)CrossRef Sherman, R., Nave, C., Funder, D.: Situational similarity and personality predict behavioral consistency. J. Pers. Soc. Psychol. 99, 330–343 (2010)CrossRef
9.
Zurück zum Zitat Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers. In: Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR 2010 (2010) Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers. In: Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR 2010 (2010)
10.
Zurück zum Zitat Sedhai, S., Sun, A.: HSpam14. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR 2015 (2015) Sedhai, S., Sun, A.: HSpam14. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR 2015 (2015)
11.
Zurück zum Zitat Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots. In: Proceedings of the 26th International Conference on World Wide Web Companion - WWW 2017 Companion (2017) Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots. In: Proceedings of the 26th International Conference on World Wide Web Companion - WWW 2017 Companion (2017)
12.
Zurück zum Zitat Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11, 36–45 (2007)CrossRef Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11, 36–45 (2007)CrossRef
13.
Zurück zum Zitat Chen, C., et al.: Investigating the deceptive information in Twitter spam. Future Gener. Comput. Syst. 72, 319–326 (2017)CrossRef Chen, C., et al.: Investigating the deceptive information in Twitter spam. Future Gener. Comput. Syst. 72, 319–326 (2017)CrossRef
14.
Zurück zum Zitat Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992–3000 (2013)CrossRef Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992–3000 (2013)CrossRef
15.
Zurück zum Zitat Ghosh, S., et al.: Understanding and combating link farming in the Twitter social network. In: Proceedings of the 21st International Conference on World Wide Web - WWW 2012 (2012) Ghosh, S., et al.: Understanding and combating link farming in the Twitter social network. In: Proceedings of the 21st International Conference on World Wide Web - WWW 2012 (2012)
16.
Zurück zum Zitat Cao, C., Caverlee, J.: Behavioral detection of spam URL sharing: posting patterns versus click patterns. In: International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 138–141 (2014) Cao, C., Caverlee, J.: Behavioral detection of spam URL sharing: posting patterns versus click patterns. In: International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 138–141 (2014)
17.
Zurück zum Zitat Cui, P., Wang, F., Liu, S., Ou, M., Yang, S., Sun, L.: Who should share what? Item-level social influence prediction for users and posts ranking. In: Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 185–194. ACM (2011) Cui, P., Wang, F., Liu, S., Ou, M., Yang, S., Sun, L.: Who should share what? Item-level social influence prediction for users and posts ranking. In: Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 185–194. ACM (2011)
18.
Zurück zum Zitat Wu, T., Wen, S., Xiang, Y., Zhou, W.: Twitter spam detection: Survey of new approaches and comparative study. Comput. Secur. 76, 265–284 (2018)CrossRef Wu, T., Wen, S., Xiang, Y., Zhou, W.: Twitter spam detection: Survey of new approaches and comparative study. Comput. Secur. 76, 265–284 (2018)CrossRef
19.
Zurück zum Zitat Funder, D.: Global traits: a neo-allportian approach to personality. Psychol. Sci. 2(1), 31–39 (1991)CrossRef Funder, D.: Global traits: a neo-allportian approach to personality. Psychol. Sci. 2(1), 31–39 (1991)CrossRef
20.
Zurück zum Zitat Furr, R., Funder, D.: Situational similarity and behavioral consistency: subjective, objective, variable-centered, and person-centered approaches. J. Res. Pers. 38(5), 421–447 (2004)CrossRef Furr, R., Funder, D.: Situational similarity and behavioral consistency: subjective, objective, variable-centered, and person-centered approaches. J. Res. Pers. 38(5), 421–447 (2004)CrossRef
21.
Zurück zum Zitat Tapper, S.: Testing the assumption of behavioural consistency in a New Zealand sample of serial rapists. Ph.D. dissertation, Victoria University of Wellington (2008) Tapper, S.: Testing the assumption of behavioural consistency in a New Zealand sample of serial rapists. Ph.D. dissertation, Victoria University of Wellington (2008)
Metadaten
Titel
An Investigation on Multi View Based User Behavior Towards Spam Detection in Social Networks
verfasst von
Darshika Koggalahewa
Yue Xu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-26142-9_2