PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Classifier ensembles using structural features for spammer detection in online social networks

Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
As the online social network technology is gaining all time high popularity and usage, the malicious behavior and attacks of spammers are getting smarter and difficult to track. The newer spamming approaches using the social engineering concepts are making traditional spam and spammer detection techniques obsolete. Especially, content-based filtering of spam messages and spammer profiles in online social networks is becoming difficult. Newer approaches for spammer detection using topological features are gaining attention. Further, the evaluation of ensemble classifiers for detection of spammers over social networking behavior-based features is still in its infancy. In this paper, we present an ensemble learning method for online social network security by evaluating the performance of some basic ensemble classifiers over novel community-based social networking features of legitimate users and spammers in online social networks. The proposed method aims to identify topological and community-based features from users’ interaction network and uses popular classifier ensembles – bagging and boosting to identify spammers in online social networks. Experimental evaluation of the proposed method is done over a real-world data set with artificial spammers that follow a behavior as reported in earlier literature. The experimental results reveal that the identified features are highly discriminative to identify spammers in online social networks.
Rocznik
Strony
89--105
Opis fizyczny
Bibliogr. 33 poz., tab.
Twórcy
autor
  • Department of Computer Science, Jamia Millia Islamia (A Central University), Delhi, India
autor
  • Department of Computer Science, Jamia Millia Islamia (A Central University), Delhi, India
Bibliografia
  • [1] Bhat S. Y., Abulaish M., Community-based features for identifying spammers in online social networks, in: Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), ACM, 2013, 100-107.
  • [2] Bhat S. Y., Abulaish M., Analysis and mining of online social networks: emerging trends and challenges, WIREs: Data Mining and Knowledge Discovery, 3, 6, 2013, 408-444.
  • [3] Bhat S. Y., Abulaish M., Mirza A. A., Spammer classification using ensemble methods over structural social network features, in: Proceedings of the 14th IEEE/WIC/ACM International Conference on Web Intelligence (WI), Warsaw, Poland, 2014, 454-458.
  • [4] Bhat S. Y., Abulaish M., HOCTracker: Tracking the evolution of hierarchical and overlapping communities in dynamic social networks, IEEE Transactions on Knowledge and Data Engineering, 27, 4, 2014, 1019-1032.
  • [5] Bilge L., Strufe T., Balzarotti D., Kirda E., All your contacts are belong to us: automated identity theft attacks on social networks, in: Proceedings of the 18th International Conference on World Wide Web (WWW), ACM, NY, USA, 2009, 551-560.
  • [6] Bouguessa M., An unsupervised approach for identifying spammers in social networks, in: Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence (ICTAI), IEEE, Washington DC, USA, 2011, 832-840.
  • [7] Breiman L., Bagging predictors, Machine Learning, 24, 2, 1996, 123-140.
  • [8] Carpinter J. M., Evaluating Ensemble Classifiers for Spam Filtering, Honours Thesis, University of Canterbury, 2005.
  • [9] Caruana R., Niculescu-Mizil A., Crew G., Ksikes A., Ensemble selection from libraries of models, in: Proceedings of the 21st International Conference on Machine Learning, 2004, 137–144.
  • [10] Dietterich T. G., Ensemble methods in machine learning, Lecture Notes in Computer Science, 1857, 2000, 1–15.
  • [11] Douceur J. R., The sybil attack, in: Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, Springer-Verlag, London, UK, 2002, 251-260.
  • [12] Erdélyi M., Garzó A., Benczúr A. A., Web spam classification: a few features worth more, in: Proceedings of the Joint WICOW/AIRWeb Workshop on Web Quality, ACM, 2011, 27-34.
  • [13] Fire M., Katz G., Elovici Y., Strangers intrusion detection-detecting spammers and fake proles in social networks based on topology anomalies, Human Journal, 1, 1, 2012, 26–39.
  • [14] Frank E., Hall M., Holmes G., Kirkby R., Pfahringer B., Witten I., Trigg L. Weka, O. Maimon and L. Rokach (Eds.), Data Mining and Knowledge Discovery Handbook, Springer, 2005, 1305-1314.
  • [15] Freund Y., Schapire R. E., Experiments with a new boosting algorithm, in Proceedings of the 13th International Conference on Machine Learning, 1996, 325-332.
  • [16] Gan Q., Suel, T., Improving web spam classifiers using link structure, in: Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), ACM, NY, USA 2007, 17–20.
  • [17] Gao H., Hu J., Wilson C., Li Z., Chen Y., Zhao B. Y., Detecting and characterizing social spam campaigns, in: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC), ACM, NY, USA, 2010, 35–47.
  • [18] Geng G. G., Wang C. H., Li Q. D., Xu L., Jin X. B., Boosting the performance of web spam detection with ensemble under-sampling classification, in: Proceedings of the 4th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'07), IEEE, 2007, 583-587.
  • [19] Gomes L. H., Almeida R. B., Bettencourt L. M. A., Almeida V., Almeida J. M., Comparative graph theoretical characterization of networks of spam and legitimate email, in: Proceedings of the 2nd Conference on Email and Anti-Spam (CEAS), 2005, 1-8.
  • [20] Jiang J., Wilson C., Wang X., Sha W., Huang P., Dai Y., Zhao B. Y., Understanding latent interactions in online social networks, ACM Transactions on the Web, 7, 4, 2013.
  • [21] John G. H., Langley P., Estimating continuous distributions in bayesian classifiers, in: Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence (UAI), San Francisco, USA, 1995, 338-345.
  • [22] Kiran P., Atmosukarto I., Spam or Not Spam – that is the question, Technical Report, University of Washington, URL: http://www.cs.washington.edu/homes/indria/research/spamfilterraviindri.pdf, Date of access: Apr 1, 2014.
  • [23] Krombholz K., Hobel H., Huber M., Weippl E., Advanced social engineering attacks, Journal of Information Security and Applications, 2014, 1-10.
  • [24] Lam Ho-Y., Yeung Dit-Y., A Learning approach to spam detection based on social networks, in: Proceedings of the 4th Conference on Email and Anti-Spam (CEAS), Mountain View, California, 2007.
  • [25] Lancichinetti A., Fortunato S., Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities, Physical Review E, 80, 2009.
  • [26] Mislove A., Marcon M., Gummadi K. P., Druschel P., Bhattacharjee B., Measurement and analysis of online social networks, in: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, ACM, 2007, 29-42.
  • [27] Neumayer R., Clustering based ensemble classification for spam filtering, in: Proceedings of the 7th Workshop on Data Analysis (WDA'06), 2006, 11-22.
  • [28] Quinlan J. R., C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers Inc., San Francisco, USA, 1993.
  • [29] Ramachandran A., Feamster N., Vempala S., Filtering spam with behavioral blacklisting, in: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), ACM, NY, USA, 2007, 342-351.
  • [30] Shrivastava N., Majumder A., Rastogi R., Mining (social) network graphs to detect random link attacks, in: Proceedings of the IEEE 24th International Conference on Data Engineering (ICDE), IEEE, Washington DC, 2008, 486-495.
  • [31] Stringhini G., Kruegel C., Vigna G., Detecting spammers on social networks, in: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), ACM, NY, USA, ACM, 2010, 1–9.
  • [32] Viswanath B., Mislove A., Cha M., Gummadi K. P., On the evolution of user interaction in Facebook, in: Proceedings of the Workshop on Online Social Networks, 2009, 37-42.
  • [33] Xie Y., Yu F., Achan K., Panigrahy R., Hulten G., Osipkov I., Spamming botnets: signatures and characteristics, SIGCOMM Computing Communication Review, 38, 4, 2008, 171-182.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-3545522b-cab1-4f2e-809a-a6dc95650485
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.