Skip to main content
Top
Published in: The Journal of Supercomputing 8/2016

01-08-2016

ELM-based spammer detection in social networks

Authors: Xianghan Zheng, Xueying Zhang, Yuanlong Yu, Tahar Kechadi, Chunming Rong

Published in: The Journal of Supercomputing | Issue 8/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Online social networks, such as Facebook, Twitter, and Weibo have played an important role in people’s common life. Most existing social network platforms, however, face the challenges of dealing with undesirable users and their malicious spam activities that disseminate content, malware, viruses, etc. to the legitimate users of the service. The spreading of spam degrades user experience and also negatively impacts server-side functions such as data mining, user behavior analysis, and resource recommendation. In this paper, an extreme learning machine (ELM)-based supervised machine is proposed for effective spammer detection. The work first constructs the labeled dataset through crawling Sina Weibo data and manually classifying corresponding users into spammer and non-spammer categories. A set of features is then extracted from message content and user behavior and applies them to the ELM-based spammer classification algorithm. The experiment and evaluation show that the proposed solution provides excellent performance with a true positive rate of spammers and non-spammers reaching 99 and 99.95 %, respectively. As the results suggest, the proposed solution could achieve better reliability and feasibility compared with existing SVM-based approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Bhat SY, Abulaish M (2013) Community-based features for identifying spammers in online social networks. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ACM, pp 100–107 Bhat SY, Abulaish M (2013) Community-based features for identifying spammers in online social networks. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ACM, pp 100–107
3.
go back to reference Grier C, Thomas K, Paxson V et al (2010) At spam: the underground on 140 characters or less[C]. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, pp 27–37 Grier C, Thomas K, Paxson V et al (2010) At spam: the underground on 140 characters or less[C]. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, pp 27–37
5.
go back to reference Liu Y, Wu B, Wang B et al (2014) SDHM: a hybrid model for spammer detection in Weibo. Advances in Social networks analysis and mining (ASONAM), 2014 IEEE/ACM international conference on. IEEE, pp 942–947 Liu Y, Wu B, Wang B et al (2014) SDHM: a hybrid model for spammer detection in Weibo. Advances in Social networks analysis and mining (ASONAM), 2014 IEEE/ACM international conference on. IEEE, pp 942–947
6.
go back to reference Rong HJ, Ong YS, Tan AH et al (2008) A fast pruned-extreme learning machine for classification problem. Neurocomputing 72(1):359–366CrossRef Rong HJ, Ong YS, Tan AH et al (2008) A fast pruned-extreme learning machine for classification problem. Neurocomputing 72(1):359–366CrossRef
7.
go back to reference Hsu C-W, Lin C-J (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13(2):415–425CrossRef Hsu C-W, Lin C-J (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13(2):415–425CrossRef
8.
go back to reference Huang GB, Zhu QY, Siew CK (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. Neural Networks 2004. In: Proceedings 2004 IEEE international joint conference on. IEEE, vol 2, pp 985–990 Huang GB, Zhu QY, Siew CK (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. Neural Networks 2004. In: Proceedings 2004 IEEE international joint conference on. IEEE, vol 2, pp 985–990
9.
go back to reference Hirose Y, Yamashita K, Hijiya S (1991) Back-propagation algorithm which varies the number of hidden units. Neural Netw 4(1):61–66CrossRef Hirose Y, Yamashita K, Hijiya S (1991) Back-propagation algorithm which varies the number of hidden units. Neural Netw 4(1):61–66CrossRef
10.
11.
go back to reference Uemura M, Tabata T (2008) Design and evaluation of a Bayesian-filter-based image spam filtering method, international conference on information security and assurance (ISA), IEEE, pp 46–51 Uemura M, Tabata T (2008) Design and evaluation of a Bayesian-filter-based image spam filtering method, international conference on information security and assurance (ISA), IEEE, pp 46–51
12.
go back to reference Zhou B, Yao Y, Luo J (2013) Cost-sensitive three-way email spam filtering. J Intell Inf Syst 42(1):19–45CrossRef Zhou B, Yao Y, Luo J (2013) Cost-sensitive three-way email spam filtering. J Intell Inf Syst 42(1):19–45CrossRef
13.
go back to reference Jung J, Sit E (2004) An empirical study of spam traffic and the use of DNS black Lists. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, ACM, pp 370–375 Jung J, Sit E (2004) An empirical study of spam traffic and the use of DNS black Lists. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, ACM, pp 370–375
14.
go back to reference Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for DNS, In: Proceedings of the third USENIX workshop on large-scale exploits and emergent threats (LEET) Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for DNS, In: Proceedings of the third USENIX workshop on large-scale exploits and emergent threats (LEET)
15.
go back to reference Xu L, Zheng X, Rong C (2013) Trust evaluation based content filtering in social interactive data. In: Cloud computing and big data (CloudCom-Asia), 2013 international conference on. IEEE, pp 538–542 Xu L, Zheng X, Rong C (2013) Trust evaluation based content filtering in social interactive data. In: Cloud computing and big data (CloudCom-Asia), 2013 international conference on. IEEE, pp 538–542
16.
go back to reference Kincaid J (2010) EdgeRank: the secret sauce that makes Facebook’s news feed tick. TechCrunch Kincaid J (2010) EdgeRank: the secret sauce that makes Facebook’s news feed tick. TechCrunch
17.
go back to reference Wang AH (2010) Don’t follow me: Spam detection in twitter. Security and cryptography (SECRYPT), Proceedings of the 2010 international conference on. IEEE, pp 1–10 Wang AH (2010) Don’t follow me: Spam detection in twitter. Security and cryptography (SECRYPT), Proceedings of the 2010 international conference on. IEEE, pp 1–10
18.
go back to reference Yardi S, Romero D, Schoenebeck G (2009) Detecting spam in a twitter network. First Monday 15(1) Yardi S, Romero D, Schoenebeck G (2009) Detecting spam in a twitter network. First Monday 15(1)
19.
go back to reference Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference. ACM, pp 1–9 Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference. ACM, pp 1–9
20.
go back to reference Gao H, Chen Y, Lee K et al (2012) Towards online spam filtering in social networks, NDSS Gao H, Chen Y, Lee K et al (2012) Towards online spam filtering in social networks, NDSS
21.
go back to reference Benevenuto F, Magno G, Rodrigues T et al (2010) Detecting spammers on twitter. Collab, Elect Messag Anti Abuse Spam Conf (CEAS), 6:12 Benevenuto F, Magno G, Rodrigues T et al (2010) Detecting spammers on twitter. Collab, Elect Messag Anti Abuse Spam Conf (CEAS), 6:12
22.
go back to reference Zheng X, Zeng Z, Chen Z et al (2015) Detecting spammers on social networks. Neurocomputing 159:27–34CrossRef Zheng X, Zeng Z, Chen Z et al (2015) Detecting spammers on social networks. Neurocomputing 159:27–34CrossRef
23.
go back to reference Lee K, Caverlee J, Webb S (2010) The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on World wide web. ACM, pp 1139–1140 Lee K, Caverlee J, Webb S (2010) The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on World wide web. ACM, pp 1139–1140
24.
go back to reference Zhou Y, Chen K, Song L et al (2012) Feature analysis of spammers in social networks with active honeypots: a case study of Chinese microblogging networks. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012). IEEE Computer Society, pp 728–729 Zhou Y, Chen K, Song L et al (2012) Feature analysis of spammers in social networks with active honeypots: a case study of Chinese microblogging networks. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012). IEEE Computer Society, pp 728–729
25.
go back to reference Miller Z, Dickinson B, Deitrick W et al (2014) Twitter spammer detection using data stream clustering. Inf Sci 260:64–73CrossRef Miller Z, Dickinson B, Deitrick W et al (2014) Twitter spammer detection using data stream clustering. Inf Sci 260:64–73CrossRef
26.
go back to reference Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1):489–501CrossRef Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1):489–501CrossRef
27.
go back to reference Rao CR, Mitra SK (1971) Generalized inverse of matrices and its applications. Wiley, New YorkMATH Rao CR, Mitra SK (1971) Generalized inverse of matrices and its applications. Wiley, New YorkMATH
28.
go back to reference Ghanty P, Paul S, Pal NR (2009) NEUROSVM: an architecture to reduce the effect of the choice of kernel on the performance of SVM. J Mach Learn Res 10:591–622 Ghanty P, Paul S, Pal NR (2009) NEUROSVM: an architecture to reduce the effect of the choice of kernel on the performance of SVM. J Mach Learn Res 10:591–622
29.
go back to reference Huang GB, Ding X, Zhou H (2010) Optimization method based extreme learning machine for classification. Neurocomputing 74(1):155–163CrossRef Huang GB, Ding X, Zhou H (2010) Optimization method based extreme learning machine for classification. Neurocomputing 74(1):155–163CrossRef
30.
go back to reference Zheng XH, Chen N, Chen Z et al (2014) Mobile cloud based framework for remote-resident multimedia discovery and access. J Intern Technol 15(6):1043–1050 Zheng XH, Chen N, Chen Z et al (2014) Mobile cloud based framework for remote-resident multimedia discovery and access. J Intern Technol 15(6):1043–1050
31.
go back to reference Hinton GE (2007) Learning multiple layers of representation. Trends Cogn Sci 11(10):428–434CrossRef Hinton GE (2007) Learning multiple layers of representation. Trends Cogn Sci 11(10):428–434CrossRef
32.
go back to reference Bengio Y (2014) Scaling up deep learning. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, p 1966.1 Bengio Y (2014) Scaling up deep learning. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, p 1966.1
33.
go back to reference Zhou S, Chen Q, Wang X (2013) Active deep learning method for semi-supervised sentiment classification. Neurocomputing 120:536–546CrossRef Zhou S, Chen Q, Wang X (2013) Active deep learning method for semi-supervised sentiment classification. Neurocomputing 120:536–546CrossRef
Metadata
Title
ELM-based spammer detection in social networks
Authors
Xianghan Zheng
Xueying Zhang
Yuanlong Yu
Tahar Kechadi
Chunming Rong
Publication date
01-08-2016
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 8/2016
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1437-5

Other articles of this Issue 8/2016

The Journal of Supercomputing 8/2016 Go to the issue

Premium Partner