Skip to main content
Erschienen in: The Journal of Supercomputing 8/2016

01.08.2016

ELM-based spammer detection in social networks

verfasst von: Xianghan Zheng, Xueying Zhang, Yuanlong Yu, Tahar Kechadi, Chunming Rong

Erschienen in: The Journal of Supercomputing | Ausgabe 8/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online social networks, such as Facebook, Twitter, and Weibo have played an important role in people’s common life. Most existing social network platforms, however, face the challenges of dealing with undesirable users and their malicious spam activities that disseminate content, malware, viruses, etc. to the legitimate users of the service. The spreading of spam degrades user experience and also negatively impacts server-side functions such as data mining, user behavior analysis, and resource recommendation. In this paper, an extreme learning machine (ELM)-based supervised machine is proposed for effective spammer detection. The work first constructs the labeled dataset through crawling Sina Weibo data and manually classifying corresponding users into spammer and non-spammer categories. A set of features is then extracted from message content and user behavior and applies them to the ELM-based spammer classification algorithm. The experiment and evaluation show that the proposed solution provides excellent performance with a true positive rate of spammers and non-spammers reaching 99 and 99.95 %, respectively. As the results suggest, the proposed solution could achieve better reliability and feasibility compared with existing SVM-based approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Bhat SY, Abulaish M (2013) Community-based features for identifying spammers in online social networks. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ACM, pp 100–107 Bhat SY, Abulaish M (2013) Community-based features for identifying spammers in online social networks. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ACM, pp 100–107
3.
Zurück zum Zitat Grier C, Thomas K, Paxson V et al (2010) At spam: the underground on 140 characters or less[C]. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, pp 27–37 Grier C, Thomas K, Paxson V et al (2010) At spam: the underground on 140 characters or less[C]. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, pp 27–37
5.
Zurück zum Zitat Liu Y, Wu B, Wang B et al (2014) SDHM: a hybrid model for spammer detection in Weibo. Advances in Social networks analysis and mining (ASONAM), 2014 IEEE/ACM international conference on. IEEE, pp 942–947 Liu Y, Wu B, Wang B et al (2014) SDHM: a hybrid model for spammer detection in Weibo. Advances in Social networks analysis and mining (ASONAM), 2014 IEEE/ACM international conference on. IEEE, pp 942–947
6.
Zurück zum Zitat Rong HJ, Ong YS, Tan AH et al (2008) A fast pruned-extreme learning machine for classification problem. Neurocomputing 72(1):359–366CrossRef Rong HJ, Ong YS, Tan AH et al (2008) A fast pruned-extreme learning machine for classification problem. Neurocomputing 72(1):359–366CrossRef
7.
Zurück zum Zitat Hsu C-W, Lin C-J (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13(2):415–425CrossRef Hsu C-W, Lin C-J (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13(2):415–425CrossRef
8.
Zurück zum Zitat Huang GB, Zhu QY, Siew CK (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. Neural Networks 2004. In: Proceedings 2004 IEEE international joint conference on. IEEE, vol 2, pp 985–990 Huang GB, Zhu QY, Siew CK (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. Neural Networks 2004. In: Proceedings 2004 IEEE international joint conference on. IEEE, vol 2, pp 985–990
9.
Zurück zum Zitat Hirose Y, Yamashita K, Hijiya S (1991) Back-propagation algorithm which varies the number of hidden units. Neural Netw 4(1):61–66CrossRef Hirose Y, Yamashita K, Hijiya S (1991) Back-propagation algorithm which varies the number of hidden units. Neural Netw 4(1):61–66CrossRef
10.
Zurück zum Zitat Shen H, Li Z (2014) Leveraging social networks for effective spam filtering. IEEE Trans Comput 11:2743–2759MathSciNetCrossRef Shen H, Li Z (2014) Leveraging social networks for effective spam filtering. IEEE Trans Comput 11:2743–2759MathSciNetCrossRef
11.
Zurück zum Zitat Uemura M, Tabata T (2008) Design and evaluation of a Bayesian-filter-based image spam filtering method, international conference on information security and assurance (ISA), IEEE, pp 46–51 Uemura M, Tabata T (2008) Design and evaluation of a Bayesian-filter-based image spam filtering method, international conference on information security and assurance (ISA), IEEE, pp 46–51
12.
Zurück zum Zitat Zhou B, Yao Y, Luo J (2013) Cost-sensitive three-way email spam filtering. J Intell Inf Syst 42(1):19–45CrossRef Zhou B, Yao Y, Luo J (2013) Cost-sensitive three-way email spam filtering. J Intell Inf Syst 42(1):19–45CrossRef
13.
Zurück zum Zitat Jung J, Sit E (2004) An empirical study of spam traffic and the use of DNS black Lists. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, ACM, pp 370–375 Jung J, Sit E (2004) An empirical study of spam traffic and the use of DNS black Lists. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, ACM, pp 370–375
14.
Zurück zum Zitat Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for DNS, In: Proceedings of the third USENIX workshop on large-scale exploits and emergent threats (LEET) Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for DNS, In: Proceedings of the third USENIX workshop on large-scale exploits and emergent threats (LEET)
15.
Zurück zum Zitat Xu L, Zheng X, Rong C (2013) Trust evaluation based content filtering in social interactive data. In: Cloud computing and big data (CloudCom-Asia), 2013 international conference on. IEEE, pp 538–542 Xu L, Zheng X, Rong C (2013) Trust evaluation based content filtering in social interactive data. In: Cloud computing and big data (CloudCom-Asia), 2013 international conference on. IEEE, pp 538–542
16.
Zurück zum Zitat Kincaid J (2010) EdgeRank: the secret sauce that makes Facebook’s news feed tick. TechCrunch Kincaid J (2010) EdgeRank: the secret sauce that makes Facebook’s news feed tick. TechCrunch
17.
Zurück zum Zitat Wang AH (2010) Don’t follow me: Spam detection in twitter. Security and cryptography (SECRYPT), Proceedings of the 2010 international conference on. IEEE, pp 1–10 Wang AH (2010) Don’t follow me: Spam detection in twitter. Security and cryptography (SECRYPT), Proceedings of the 2010 international conference on. IEEE, pp 1–10
18.
Zurück zum Zitat Yardi S, Romero D, Schoenebeck G (2009) Detecting spam in a twitter network. First Monday 15(1) Yardi S, Romero D, Schoenebeck G (2009) Detecting spam in a twitter network. First Monday 15(1)
19.
Zurück zum Zitat Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference. ACM, pp 1–9 Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference. ACM, pp 1–9
20.
Zurück zum Zitat Gao H, Chen Y, Lee K et al (2012) Towards online spam filtering in social networks, NDSS Gao H, Chen Y, Lee K et al (2012) Towards online spam filtering in social networks, NDSS
21.
Zurück zum Zitat Benevenuto F, Magno G, Rodrigues T et al (2010) Detecting spammers on twitter. Collab, Elect Messag Anti Abuse Spam Conf (CEAS), 6:12 Benevenuto F, Magno G, Rodrigues T et al (2010) Detecting spammers on twitter. Collab, Elect Messag Anti Abuse Spam Conf (CEAS), 6:12
22.
Zurück zum Zitat Zheng X, Zeng Z, Chen Z et al (2015) Detecting spammers on social networks. Neurocomputing 159:27–34CrossRef Zheng X, Zeng Z, Chen Z et al (2015) Detecting spammers on social networks. Neurocomputing 159:27–34CrossRef
23.
Zurück zum Zitat Lee K, Caverlee J, Webb S (2010) The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on World wide web. ACM, pp 1139–1140 Lee K, Caverlee J, Webb S (2010) The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on World wide web. ACM, pp 1139–1140
24.
Zurück zum Zitat Zhou Y, Chen K, Song L et al (2012) Feature analysis of spammers in social networks with active honeypots: a case study of Chinese microblogging networks. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012). IEEE Computer Society, pp 728–729 Zhou Y, Chen K, Song L et al (2012) Feature analysis of spammers in social networks with active honeypots: a case study of Chinese microblogging networks. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012). IEEE Computer Society, pp 728–729
25.
Zurück zum Zitat Miller Z, Dickinson B, Deitrick W et al (2014) Twitter spammer detection using data stream clustering. Inf Sci 260:64–73CrossRef Miller Z, Dickinson B, Deitrick W et al (2014) Twitter spammer detection using data stream clustering. Inf Sci 260:64–73CrossRef
26.
Zurück zum Zitat Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1):489–501CrossRef Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1):489–501CrossRef
27.
Zurück zum Zitat Rao CR, Mitra SK (1971) Generalized inverse of matrices and its applications. Wiley, New YorkMATH Rao CR, Mitra SK (1971) Generalized inverse of matrices and its applications. Wiley, New YorkMATH
28.
Zurück zum Zitat Ghanty P, Paul S, Pal NR (2009) NEUROSVM: an architecture to reduce the effect of the choice of kernel on the performance of SVM. J Mach Learn Res 10:591–622 Ghanty P, Paul S, Pal NR (2009) NEUROSVM: an architecture to reduce the effect of the choice of kernel on the performance of SVM. J Mach Learn Res 10:591–622
29.
Zurück zum Zitat Huang GB, Ding X, Zhou H (2010) Optimization method based extreme learning machine for classification. Neurocomputing 74(1):155–163CrossRef Huang GB, Ding X, Zhou H (2010) Optimization method based extreme learning machine for classification. Neurocomputing 74(1):155–163CrossRef
30.
Zurück zum Zitat Zheng XH, Chen N, Chen Z et al (2014) Mobile cloud based framework for remote-resident multimedia discovery and access. J Intern Technol 15(6):1043–1050 Zheng XH, Chen N, Chen Z et al (2014) Mobile cloud based framework for remote-resident multimedia discovery and access. J Intern Technol 15(6):1043–1050
31.
Zurück zum Zitat Hinton GE (2007) Learning multiple layers of representation. Trends Cogn Sci 11(10):428–434CrossRef Hinton GE (2007) Learning multiple layers of representation. Trends Cogn Sci 11(10):428–434CrossRef
32.
Zurück zum Zitat Bengio Y (2014) Scaling up deep learning. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, p 1966.1 Bengio Y (2014) Scaling up deep learning. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, p 1966.1
33.
Zurück zum Zitat Zhou S, Chen Q, Wang X (2013) Active deep learning method for semi-supervised sentiment classification. Neurocomputing 120:536–546CrossRef Zhou S, Chen Q, Wang X (2013) Active deep learning method for semi-supervised sentiment classification. Neurocomputing 120:536–546CrossRef
Metadaten
Titel
ELM-based spammer detection in social networks
verfasst von
Xianghan Zheng
Xueying Zhang
Yuanlong Yu
Tahar Kechadi
Chunming Rong
Publikationsdatum
01.08.2016
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 8/2016
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1437-5

Weitere Artikel der Ausgabe 8/2016

The Journal of Supercomputing 8/2016 Zur Ausgabe

Premium Partner