Skip to main content
Erschienen in: The Journal of Supercomputing 7/2020

10.10.2018

Twitter spam account detection based on clustering and classification methods

verfasst von: Kayode Sakariyah Adewole, Tao Han, Wanqing Wu, Houbing Song, Arun Kumar Sangaiah

Erschienen in: The Journal of Supercomputing | Ausgabe 7/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Twitter social network has gained more popularity due to the increase in social activities of registered users. Twitter performs dual functions of online social network (OSN), acting as a microblogging OSN, and at the same time as a news update platform. Recently, the growth in Twitter social interactions has attracted the attention of cybercriminals. Spammers have used Twitter to spread malicious messages, post phishing links, flood the network with fake accounts, and engage in other malicious activities. The process of detecting the network of spammers who engage in these activities is an important step toward identifying individual spam account. Researchers have proposed a number of approaches to identify a group of spammers. However, each of these approaches addressed a specific category of spammer. This paper proposes a different approach to detect spammers on Twitter based on the similarities that exist among spam accounts. A number of features were introduced to improve the performance of the three classification algorithms selected in this study. The proposed approach applied principal component analysis and tuned K-means algorithm to cluster over 200,000 accounts, randomly selected from more than 2 million tweets to detect the clusters of spammers. Experimental results show that Random Forest achieved the highest accuracy of 96.30%. This result is followed by multilayer perceptron with 96.00% and support vector machine, which achieved 95.60%. The performance of the selected classifiers based on class imbalance also revealed that Random Forest achieved the highest accuracy, precision, recall, and F-measure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Adikari S, Dutta K (2014) Identifying fake profiles in LinkedIn. In: PACIS Adikari S, Dutta K (2014) Identifying fake profiles in LinkedIn. In: PACIS
3.
Zurück zum Zitat Aggarwal A, Rajadesingan A, Kumaraguru P (2012) PhishAri: Automatic realtime phishing detection on twitter. In: eCrime Researchers Summit (eCrime) Aggarwal A, Rajadesingan A, Kumaraguru P (2012) PhishAri: Automatic realtime phishing detection on twitter. In: eCrime Researchers Summit (eCrime)
4.
Zurück zum Zitat Ahmed F, Abulaish M (2012) An MCL-based approach for spam profile detection in online social networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) Ahmed F, Abulaish M (2012) An MCL-based approach for spam profile detection in online social networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
6.
Zurück zum Zitat Aiyar S, Shetty NP (2018) N-gram assisted Youtube spam comment detection. Procedia Comput Sci 132:174–182CrossRef Aiyar S, Shetty NP (2018) N-gram assisted Youtube spam comment detection. Procedia Comput Sci 132:174–182CrossRef
7.
Zurück zum Zitat Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS (2017) Sybil defense techniques in online social networks: a survey. IEEE Access 5:1200–1219CrossRef Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS (2017) Sybil defense techniques in online social networks: a survey. IEEE Access 5:1200–1219CrossRef
8.
Zurück zum Zitat Almaatouq A, Shmueli E, Nouh M, Alabdulkareem A, Singh VK, Alsaleh M, Alfaris A (2016) If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int J Inf Secur 15:475–491CrossRef Almaatouq A, Shmueli E, Nouh M, Alabdulkareem A, Singh VK, Alsaleh M, Alfaris A (2016) If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int J Inf Secur 15:475–491CrossRef
9.
Zurück zum Zitat Alsaleh M, Alarifi A, Al-Salman AM, Alfayez M, Almuhaysin A (2014) TSD: detecting sybil accounts in Twitter. In: 2014 13th IEEE International Conference on Machine Learning and Applications (ICMLA) Alsaleh M, Alarifi A, Al-Salman AM, Alfayez M, Almuhaysin A (2014) TSD: detecting sybil accounts in Twitter. In: 2014 13th IEEE International Conference on Machine Learning and Applications (ICMLA)
10.
Zurück zum Zitat Atluri AC, Tran V (2017) Botnets threat analysis and detection. In: Traoré I, Awad A, Woungang I (eds) Information security practices. Springer, Cham Atluri AC, Tran V (2017) Botnets threat analysis and detection. In: Traoré I, Awad A, Woungang I (eds) Information security practices. Springer, Cham
11.
Zurück zum Zitat Avci E, Turkoglu I (2009) An intelligent diagnosis system based on principle component analysis and ANFIS for the heart valve diseases. Expert Syst Appl 36(2):2873–2878CrossRef Avci E, Turkoglu I (2009) An intelligent diagnosis system based on principle component analysis and ANFIS for the heart valve diseases. Expert Syst Appl 36(2):2873–2878CrossRef
12.
Zurück zum Zitat Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on Twitter. In: 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2010 Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on Twitter. In: 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2010
13.
Zurück zum Zitat Bhat SY, Abulaish M (2013) Community-based features for identifying spammers in online social networks. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining Bhat SY, Abulaish M (2013) Community-based features for identifying spammers in online social networks. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
14.
Zurück zum Zitat Bhat SY, Abulaish M, Mirza AA (2014) Spammer classification using ensemble methods over structural social network features. In: Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), vol 02 Bhat SY, Abulaish M, Mirza AA (2014) Spammer classification using ensemble methods over structural social network features. In: Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), vol 02
16.
Zurück zum Zitat Chen C-M, Guan D, Su Q-K (2014) Feature set identification for detecting suspicious URLs using Bayesian classification in social networks. Inf Sci 289:133–147CrossRef Chen C-M, Guan D, Su Q-K (2014) Feature set identification for detecting suspicious URLs using Bayesian classification in social networks. Inf Sci 289:133–147CrossRef
18.
Zurück zum Zitat Chu Z, Wang H, Widjaja I (2012) Detecting social spam campaigns on Twitter. In: Bao F, Samarati P, Zhou J (eds) Applied cryptography and network security. Lecture notes in computer science, vol 7341. Springer, Berlin Chu Z, Wang H, Widjaja I (2012) Detecting social spam campaigns on Twitter. In: Bao F, Samarati P, Zhou J (eds) Applied cryptography and network security. Lecture notes in computer science, vol 7341. Springer, Berlin
19.
Zurück zum Zitat Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M (2017) The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. arXiv preprint arXiv:1701.03017 Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M (2017) The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. arXiv preprint arXiv:​1701.​03017
21.
Zurück zum Zitat Do-Jong K, Yong-Woon P, Dong-Jo P (2001) A novel validity index for determination of the optimal number of clusters. IEICE Trans Inf Syst 84(2):281–285 Do-Jong K, Yong-Woon P, Dong-Jo P (2001) A novel validity index for determination of the optimal number of clusters. IEICE Trans Inf Syst 84(2):281–285
22.
24.
Zurück zum Zitat Gani K, Hacid H, Skraba R (2012) Towards multiple identity detection in social networks. In: Proceedings of the 21st International Conference Companion on World Wide Web. ACM Gani K, Hacid H, Skraba R (2012) Towards multiple identity detection in social networks. In: Proceedings of the 21st International Conference Companion on World Wide Web. ACM
25.
Zurück zum Zitat Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement
26.
Zurück zum Zitat Gao S, Ma X, Wang L, Yu Y (2016) Spammer detection based on comprehensive features in Sina Microblog. In: 2016 13th International Conference on Service Systems and Service Management (ICSSSM) Gao S, Ma X, Wang L, Yu Y (2016) Spammer detection based on comprehensive features in Sina Microblog. In: 2016 13th International Conference on Service Systems and Service Management (ICSSSM)
27.
Zurück zum Zitat Ghosh S, Viswanath B, Kooti F, Sharma NK, Korlam G, Benevenuto F, Ganguly N, Gummadi KP (2012) Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference World Wide Web, p 61 Ghosh S, Viswanath B, Kooti F, Sharma NK, Korlam G, Benevenuto F, Ganguly N, Gummadi KP (2012) Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference World Wide Web, p 61
29.
Zurück zum Zitat Grier C, Thomas K, Paxson V, Zhang M (2010) @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp 27–37 Grier C, Thomas K, Paxson V, Zhang M (2010) @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp 27–37
30.
Zurück zum Zitat Iqbal F, Binsalleeh H, Fung BC, Debbabi M (2010) Mining writeprints from anonymous e-mails for forensic investigation. Digit Investig 7(1):56–64CrossRef Iqbal F, Binsalleeh H, Fung BC, Debbabi M (2010) Mining writeprints from anonymous e-mails for forensic investigation. Digit Investig 7(1):56–64CrossRef
31.
Zurück zum Zitat Kiliroor CC, Valliyammai C (2019) Social context based Naive Bayes filtering of spam messages from online social networks. In: Nayak J, Abraham A, Krishna B, Chandra SG, Das A (eds) Soft computing in data analytics. Springer, Singapore, pp 699–706CrossRef Kiliroor CC, Valliyammai C (2019) Social context based Naive Bayes filtering of spam messages from online social networks. In: Nayak J, Abraham A, Krishna B, Chandra SG, Das A (eds) Soft computing in data analytics. Springer, Singapore, pp 699–706CrossRef
32.
Zurück zum Zitat Kim K-J, Ahn H (2008) A recommender system using GA K-means clustering in an online shopping market. Expert Syst Appl 34(2):1200–1209CrossRef Kim K-J, Ahn H (2008) A recommender system using GA K-means clustering in an online shopping market. Expert Syst Appl 34(2):1200–1209CrossRef
33.
Zurück zum Zitat Lee S, Kim J (2014) Early filtering of ephemeral malicious accounts on Twitter. Comput Commun 54:48–57CrossRef Lee S, Kim J (2014) Early filtering of ephemeral malicious accounts on Twitter. Comput Commun 54:48–57CrossRef
34.
Zurück zum Zitat Lin P-C, Huang P-M (2013) A study of effective features for detecting long-surviving Twitter spam accounts. In: 2013 15th International Conference on Advanced Communications Technology (ICACT), p 841 Lin P-C, Huang P-M (2013) A study of effective features for detecting long-surviving Twitter spam accounts. In: 2013 15th International Conference on Advanced Communications Technology (ICACT), p 841
37.
Zurück zum Zitat Mccord M, Chuah M (2011) Spam detection on twitter using traditional classifiers. In: Calero JMA, Yang LT, Mármol FG, García Villalba LJ, Li AX, Wang Y (eds) Autonomic and trusted computing. Springer, Berlin, pp 175–186CrossRef Mccord M, Chuah M (2011) Spam detection on twitter using traditional classifiers. In: Calero JMA, Yang LT, Mármol FG, García Villalba LJ, Li AX, Wang Y (eds) Autonomic and trusted computing. Springer, Berlin, pp 175–186CrossRef
38.
Zurück zum Zitat Meligy AM, Ibrahim HM, Torky MF (2017) Identity verification mechanism for detecting fake profiles in online social networks. Int J Comput Netw Inf Secur 9(1):31 Meligy AM, Ibrahim HM, Torky MF (2017) Identity verification mechanism for detecting fake profiles in online social networks. Int J Comput Netw Inf Secur 9(1):31
39.
Zurück zum Zitat Muhammad K, Ahmad J, Rho S, Baik SW (2017) Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76(18):18985–19004CrossRef Muhammad K, Ahmad J, Rho S, Baik SW (2017) Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76(18):18985–19004CrossRef
40.
Zurück zum Zitat Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener Comput Syst 86:951–960CrossRef Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener Comput Syst 86:951–960CrossRef
41.
Zurück zum Zitat Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Computing 20(1):343–357CrossRef Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Computing 20(1):343–357CrossRef
42.
Zurück zum Zitat Noriega L (2005) Multilayer perceptron tutorial. School of Computing, Staffordshire University, Staffordshire Noriega L (2005) Multilayer perceptron tutorial. School of Computing, Staffordshire University, Staffordshire
43.
Zurück zum Zitat Nowakowska E, Koronacki J, Lipovetsky S (2016) Dimensionality reduction for data of unknown cluster structure. Inf Sci 330:74–87CrossRef Nowakowska E, Koronacki J, Lipovetsky S (2016) Dimensionality reduction for data of unknown cluster structure. Inf Sci 330:74–87CrossRef
47.
Zurück zum Zitat Rokach L, Maimon O (2005) Clustering methods. In: Maimon O, Rokach L (eds) Data mining and knowledge discovery handbook. Springer, Boston, pp 321–352CrossRef Rokach L, Maimon O (2005) Clustering methods. In: Maimon O, Rokach L (eds) Data mining and knowledge discovery handbook. Springer, Boston, pp 321–352CrossRef
48.
Zurück zum Zitat Sadan Z, Schwartz DG (2011) Social network analysis of web links to eliminate false positives in collaborative anti-spam systems. J Netw Comput Appl 34(5):1717–1723CrossRef Sadan Z, Schwartz DG (2011) Social network analysis of web links to eliminate false positives in collaborative anti-spam systems. J Netw Comput Appl 34(5):1717–1723CrossRef
50.
Zurück zum Zitat Singh M, Bansal D, Sofat S (2014) Detecting malicious users in Twitter using classifiers. In: ACM International Conference Proceeding Series, p 247 Singh M, Bansal D, Sofat S (2014) Detecting malicious users in Twitter using classifiers. In: ACM International Conference Proceeding Series, p 247
51.
Zurück zum Zitat Smith LI (2002) A tutorial on principal components analysis. Cornell University, USA, 51, 52 Smith LI (2002) A tutorial on principal components analysis. Cornell University, USA, 51, 52
52.
56.
Zurück zum Zitat Viswanath B, Bashir MA, Crovella M, Guha S, Gummadi KP, Krishnamurthy B, Mislove A (2014) Towards detecting anomalous user behavior in online social networks. In: Proceedings of the 23rd USENIX Security Symposium (USENIX Security) Viswanath B, Bashir MA, Crovella M, Guha S, Gummadi KP, Krishnamurthy B, Mislove A (2014) Towards detecting anomalous user behavior in online social networks. In: Proceedings of the 23rd USENIX Security Symposium (USENIX Security)
57.
Zurück zum Zitat Vorakitphan V, Leu F-Y, Fan Y-C (2018) Clickbait detection based on word embedding models. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing Vorakitphan V, Leu F-Y, Fan Y-C (2018) Clickbait detection based on word embedding models. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
61.
Zurück zum Zitat Yi X, Zhang Y (2013) Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Inf Syst 38(1):97–107CrossRef Yi X, Zhang Y (2013) Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Inf Syst 38(1):97–107CrossRef
63.
Zurück zum Zitat Zhang X, Zhu S, Liang W (2012) Detecting spam and promoting campaigns in the Twitter social network. In: 2012 IEEE 12th International Conference on Data Mining Zhang X, Zhu S, Liang W (2012) Detecting spam and promoting campaigns in the Twitter social network. In: 2012 IEEE 12th International Conference on Data Mining
Metadaten
Titel
Twitter spam account detection based on clustering and classification methods
verfasst von
Kayode Sakariyah Adewole
Tao Han
Wanqing Wu
Houbing Song
Arun Kumar Sangaiah
Publikationsdatum
10.10.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 7/2020
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2641-x

Weitere Artikel der Ausgabe 7/2020

The Journal of Supercomputing 7/2020 Zur Ausgabe