Skip to main content
Top
Published in: Wireless Personal Communications 2/2018

27-02-2018

Detecting Streaming of Twitter Spam Using Hybrid Method

Authors: N. Senthil Murugan, G. Usha Devi

Published in: Wireless Personal Communications | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Twitter, the social network which evolving faster and regular usage by millions of people and who become addicted to it. So spam playing a major role for Twitter users to distract them and grab their attention over them. Spammers actually detailed like who send unwanted and irrelevant messages or websites and promote them to several users. To overcome the problem many researchers proposed some ideas using some machine learning algorithms to detect the spammers. In this research work, a new hybrid approach is proposed to detect the streaming of Twitter spam in a real-time using the combination of a Decision tree, Particle Swarm Optimization and Genetic algorithm. Twitter has given access to the researchers to get tweets from its Twitter-API for real-time streaming of tweet data which they can get direct access to public tweets. Here 600 million tweets are created by using URL based security tool and further some features are extracted for representation of tweets in real-time detection of spam. In addition, our research results are compared with other hybrid algorithms which a better detection rate is given by our proposed work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010) Detecting spammer on twitter. Presented at the 7th annual collaboration electronic messaging anti-abuse spam conference, Redmond, WA, USA, Jul. 2010. Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010) Detecting spammer on twitter. Presented at the 7th annual collaboration electronic messaging anti-abuse spam conference, Redmond, WA, USA, Jul. 2010.
6.
go back to reference Dasu, T., Krishnan, S., Venkatasubramanian, S., Yi, K. (2006) An information-theoretic approach to detecting changes inmulti-dimensional data streams. In Proceedings of symposium on interface statistics and computer science applications. Dasu, T., Krishnan, S., Venkatasubramanian, S., Yi, K. (2006) An information-theoretic approach to detecting changes inmulti-dimensional data streams. In Proceedings of symposium on interface statistics and computer science applications.
10.
go back to reference Balan, E. V., Priyan, M. K., Gokulnath, C., & Devi, G. U. (2015). Fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 50, 109–114.CrossRef Balan, E. V., Priyan, M. K., Gokulnath, C., & Devi, G. U. (2015). Fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 50, 109–114.CrossRef
13.
go back to reference Manogaran, G., Thota, C., Lopez, D., Vijayakumar, V., Abbas, K. M., & Sundarsekar, R. (2017). Big data knowledge system in healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 133–157). Springer. Manogaran, G., Thota, C., Lopez, D., Vijayakumar, V., Abbas, K. M., & Sundarsekar, R. (2017). Big data knowledge system in healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 133–157). Springer.
19.
go back to reference Balan, E. V., Priyan, M. K., & Devi, G. U. (2015, April). Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In 2015 international conference on communications and signal processing (ICCSP) (pp. 0185–0189). IEEE. Balan, E. V., Priyan, M. K., & Devi, G. U. (2015, April). Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In 2015 international conference on communications and signal processing (ICCSP) (pp. 0185–0189). IEEE.
21.
go back to reference Bhat, S. Y., & Abulaish, M. (2013). Community-based features for identifying spammers in online social networks. In Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining—ASONAM 13. https://doi.org/10.1145/2492517.2492567. Bhat, S. Y., & Abulaish, M. (2013). Community-based features for identifying spammers in online social networks. In Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining—ASONAM 13. https://​doi.​org/​10.​1145/​2492517.​2492567.
26.
go back to reference Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for IoT and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141–154). IGI Global. Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for IoT and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141–154). IGI Global.
27.
32.
go back to reference Devi, G. U., Balan, E. V., Priyan, M. K., & Gokulnath, C. (2015). Mutual authentication scheme for IoT application. Indian Journal of Science and Technology, 8(26). Devi, G. U., Balan, E. V., Priyan, M. K., & Gokulnath, C. (2015). Mutual authentication scheme for IoT application. Indian Journal of Science and Technology8(26).
Metadata
Title
Detecting Streaming of Twitter Spam Using Hybrid Method
Authors
N. Senthil Murugan
G. Usha Devi
Publication date
27-02-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5513-z

Other articles of this Issue 2/2018

Wireless Personal Communications 2/2018 Go to the issue