312 research outputs found

    Follow spam detection based on Cascaded Social Information

    Get PDF
    In the last decade we have witnessed the explosive growth of online social networking services (SNSs) such as Facebook, Twitter, RenRen and LinkedIn. While SNSs provide diverse benefits for example, forstering inter-personal relationships, community formations and news propagation, they also attracted uninvited nuiance. Spammers abuse SNSs as vehicles to spread spams rapidly and widely. Spams, unsolicited or inappropriate messages, significantly impair the credibility and reliability of services. Therefore, detecting spammers has become an urgent and critical issue in SNSs. This paper deals with Follow spam in Twitter. Instead of spreading annoying messages to the public, a spammer follows (subscribes to) legitimate users, and followed a legitimate user. Based on the assumption that the online relationships of spammers are different from those of legitimate users, we proposed classification schemes that detect follow spammers. Particularly, we focused on cascaded social relations and devised two schemes, TSP-Filtering and SS-Filtering, each of which utilizes Triad Significance Profile (TSP) and Social status (SS) in a two-hop subnetwork centered at each other. We also propose an emsemble technique, Cascaded-Filtering, that combine both TSP and SS properties. Our experiments on real Twitter datasets demonstrated that the proposed three approaches are very practical. The proposed schemes are scalable because instead of analyzing the whole network, they inspect user-centered two hop social networks. Our performance study showed that proposed methods yield significantly better performance than prior scheme in terms of true positives and false positives.OAIID:RECH_ACHV_DSTSH_NO:T201620357RECH_ACHV_FG:RR00200001ADJUST_YN:EMP_ID:A001118CITE_RATE:3.364FILENAME:Follow spam detection based on cascaded social information.pdfDEPT_NM:์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€EMAIL:[email protected]_YN:YFILEURL:https://srnd.snu.ac.kr/eXrepEIR/fws/file/be43ae94-4659-467d-bc0f-17dc45d3e775/linkCONFIRM:

    ๊ฐœ์ธ ์‚ฌํšŒ๋ง ๋„คํŠธ์›Œํฌ ๋ถ„์„ ๊ธฐ๋ฐ˜ ์˜จ๋ผ์ธ ์‚ฌํšŒ ๊ณต๊ฒฉ์ž ํƒ์ง€

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๊ณต๊ณผ๋Œ€ํ•™ ์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€,2020. 2. ๊น€์ข…๊ถŒ.In the last decade we have witnessed the explosive growth of online social networking services (SNSs) such as Facebook, Twitter, Weibo and LinkedIn. While SNSs provide diverse benefits โ€“ for example, fostering inter-personal relationships, community formations and news propagation, they also attracted uninvited nuiance. Spammers abuse SNSs as vehicles to spread spams rapidly and widely. Spams, unsolicited or inappropriate messages, significantly impair the credibility and reliability of services. Therefore, detecting spammers has become an urgent and critical issue in SNSs. This paper deals with spamming in Twitter and Weibo. Instead of spreading annoying messages to the public, a spammer follows (subscribes to) normal users, and followed a normal user. Sometimes a spammer makes link farm to increase target accounts explicit influence. Based on the assumption that the online relationships of spammers are different from those of normal users, I proposed classification schemes that detect online social attackers including spammers. I firstly focused on ego-network social relations and devised two features, structural features based on Triad Significance Profile (TSP) and relational semantic features based on hierarchical homophily in an ego-network. Experiments on real Twitter and Weibo datasets demonstrated that the proposed approach is very practical. The proposed features are scalable because instead of analyzing the whole network, they inspect user-centered ego-networks. My performance study showed that proposed methods yield significantly better performance than prior scheme in terms of true positives and false positives.์ตœ๊ทผ ์šฐ๋ฆฌ๋Š” Facebook, Twitter, Weibo, LinkedIn ๋“ฑ์˜ ๋‹ค์–‘ํ•œ ์‚ฌํšŒ ๊ด€๊ณ„๋ง ์„œ๋น„์Šค๊ฐ€ ํญ๋ฐœ์ ์œผ๋กœ ์„ฑ์žฅํ•˜๋Š” ํ˜„์ƒ์„ ๋ชฉ๊ฒฉํ•˜์˜€๋‹ค. ํ•˜์ง€๋งŒ ์‚ฌํšŒ ๊ด€๊ณ„๋ง ์„œ๋น„์Šค๊ฐ€ ๊ฐœ์ธ๊ณผ ๊ฐœ์ธ๊ฐ„์˜ ๊ด€๊ณ„ ๋ฐ ์ปค๋ฎค๋‹ˆํ‹ฐ ํ˜•์„ฑ๊ณผ ๋‰ด์Šค ์ „ํŒŒ ๋“ฑ์˜ ์—ฌ๋Ÿฌ ์ด์ ์„ ์ œ๊ณตํ•ด ์ฃผ๊ณ  ์žˆ๋Š”๋ฐ ๋ฐ˜ํ•ด ๋ฐ˜๊ฐ‘์ง€ ์•Š์€ ํ˜„์ƒ ์—ญ์‹œ ๋ฐœ์ƒํ•˜๊ณ  ์žˆ๋‹ค. ์ŠคํŒจ๋จธ๋“ค์€ ์‚ฌํšŒ ๊ด€๊ณ„๋ง ์„œ๋น„์Šค๋ฅผ ๋™๋ ฅ ์‚ผ์•„ ์ŠคํŒธ์„ ๋งค์šฐ ๋น ๋ฅด๊ณ  ๋„“๊ฒŒ ์ „ํŒŒํ•˜๋Š” ์‹์œผ๋กœ ์•…์šฉํ•˜๊ณ  ์žˆ๋‹ค. ์ŠคํŒธ์€ ์ˆ˜์‹ ์ž๊ฐ€ ์›์น˜ ์•Š๋Š” ๋ฉ”์‹œ์ง€๋“ค์„ ์ผ์ปฝ๋Š”๋ฐ ์ด๋Š” ์„œ๋น„์Šค์˜ ์‹ ๋ขฐ๋„์™€ ์•ˆ์ •์„ฑ์„ ํฌ๊ฒŒ ์†์ƒ์‹œํ‚จ๋‹ค. ๋”ฐ๋ผ์„œ, ์ŠคํŒจ๋จธ๋ฅผ ํƒ์ง€ํ•˜๋Š” ๊ฒƒ์ด ํ˜„์žฌ ์†Œ์…œ ๋ฏธ๋””์–ด์—์„œ ๋งค์šฐ ๊ธด๊ธ‰ํ•˜๊ณ  ์ค‘์š”ํ•œ ๋ฌธ์ œ๊ฐ€ ๋˜์—ˆ๋‹ค. ์ด ๋…ผ๋ฌธ์€ ๋Œ€ํ‘œ์ ์ธ ์‚ฌํšŒ ๊ด€๊ณ„๋ง ์„œ๋น„์Šค๋“ค ์ค‘ Twitter์™€ Weibo์—์„œ ๋ฐœ์ƒํ•˜๋Š” ์ŠคํŒจ๋ฐ์„ ๋‹ค๋ฃจ๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์œ ํ˜•์˜ ์ŠคํŒจ๋ฐ๋“ค์€ ๋ถˆํŠน์ • ๋‹ค์ˆ˜์—๊ฒŒ ๋ฉ”์‹œ์ง€๋ฅผ ์ „ํŒŒํ•˜๋Š” ๋Œ€์‹ ์—, ๋งŽ์€ ์ผ๋ฐ˜ ์‚ฌ์šฉ์ž๋“ค์„ 'ํŒ”๋กœ์šฐ(๊ตฌ๋…)'ํ•˜๊ณ  ์ด๋“ค๋กœ๋ถ€ํ„ฐ '๋งž ํŒ”๋กœ์ž‰(๋งž ๊ตฌ๋…)'์„ ์ด๋Œ์–ด ๋‚ด๋Š” ๊ฒƒ์„ ๋ชฉ์ ์œผ๋กœ ํ•˜๊ธฐ๋„ ํ•œ๋‹ค. ๋•Œ๋กœ๋Š” link farm์„ ์ด์šฉํ•ด ํŠน์ • ๊ณ„์ •์˜ ํŒ”๋กœ์›Œ ์ˆ˜๋ฅผ ๋†’์ด๊ณ  ๋ช…์‹œ์  ์˜ํ–ฅ๋ ฅ์„ ์ฆ๊ฐ€์‹œํ‚ค๊ธฐ๋„ ํ•œ๋‹ค. ์ŠคํŒจ๋จธ์˜ ์˜จ๋ผ์ธ ๊ด€๊ณ„๋ง์ด ์ผ๋ฐ˜ ์‚ฌ์šฉ์ž์˜ ์˜จ๋ผ์ธ ์‚ฌํšŒ๋ง๊ณผ ๋‹ค๋ฅผ ๊ฒƒ์ด๋ผ๋Š” ๊ฐ€์ • ํ•˜์—, ๋‚˜๋Š” ์ŠคํŒจ๋จธ๋“ค์„ ํฌํ•จํ•œ ์ผ๋ฐ˜์ ์ธ ์˜จ๋ผ์ธ ์‚ฌํšŒ๋ง ๊ณต๊ฒฉ์ž๋“ค์„ ํƒ์ง€ํ•˜๋Š” ๋ถ„๋ฅ˜ ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. ๋‚˜๋Š” ๋จผ์ € ๊ฐœ์ธ ์‚ฌํšŒ๋ง ๋‚ด ์‚ฌํšŒ ๊ด€๊ณ„์— ์ฃผ๋ชฉํ•˜๊ณ  ๋‘ ๊ฐ€์ง€ ์ข…๋ฅ˜์˜ ๋ถ„๋ฅ˜ ํŠน์„ฑ์„ ์ œ์•ˆํ•˜์˜€๋‹ค. ์ด๋“ค์€ ๊ฐœ์ธ ์‚ฌํšŒ๋ง์˜ Triad Significance Profile (TSP)์— ๊ธฐ๋ฐ˜ํ•œ ๊ตฌ์กฐ์  ํŠน์„ฑ๊ณผ Hierarchical homophily์— ๊ธฐ๋ฐ˜ํ•œ ๊ด€๊ณ„ ์˜๋ฏธ์  ํŠน์„ฑ์ด๋‹ค. ์‹ค์ œ Twitter์™€ Weibo ๋ฐ์ดํ„ฐ์…‹์— ๋Œ€ํ•œ ์‹คํ—˜ ๊ฒฐ๊ณผ๋Š” ์ œ์•ˆํ•œ ๋ฐฉ๋ฒ•์ด ๋งค์šฐ ์‹ค์šฉ์ ์ด๋ผ๋Š” ๊ฒƒ์„ ๋ณด์—ฌ์ค€๋‹ค. ์ œ์•ˆํ•œ ํŠน์„ฑ๋“ค์€ ์ „์ฒด ๋„คํŠธ์›Œํฌ๋ฅผ ๋ถ„์„ํ•˜์ง€ ์•Š์•„๋„ ๊ฐœ์ธ ์‚ฌํšŒ๋ง๋งŒ ๋ถ„์„ํ•˜๋ฉด ๋˜๊ธฐ ๋•Œ๋ฌธ์— scalableํ•˜๊ฒŒ ์ธก์ •๋  ์ˆ˜ ์žˆ๋‹ค. ๋‚˜์˜ ์„ฑ๋Šฅ ๋ถ„์„ ๊ฒฐ๊ณผ๋Š” ์ œ์•ˆํ•œ ๊ธฐ๋ฒ•์ด ๊ธฐ์กด ๋ฐฉ๋ฒ•์— ๋น„ํ•ด true positive์™€ false positive ์ธก๋ฉด์—์„œ ์šฐ์ˆ˜ํ•˜๋‹ค๋Š” ๊ฒƒ์„ ๋ณด์—ฌ์ค€๋‹ค.1 Introduction 1 2 Related Work 6 2.1 OSN Spammer Detection Approaches 6 2.1.1 Contents-based Approach 6 2.1.2 Social Network-based Approach 7 2.1.3 Subnetwork-based Approach 8 2.1.4 Behavior-based Approach 9 2.2 Link Spam Detection 10 2.3 Data mining schemes for Spammer Detection 10 2.4 Sybil Detection 12 3 Triad Significance Profile Analysis 14 3.1 Motivation 14 3.2 Twitter Dataset 18 3.3 Indegree and Outdegree of Dataset 20 3.4 Twitter spammer Detection with TSP 22 3.5 TSP-Filtering 27 3.6 Performance Evaluation of TSP-Filtering 29 4 Hierarchical Homophily Analysis 33 4.1 Motivation 33 4.2 Hierarchical Homophily in OSN 37 4.2.1 Basic Analysis of Datasets 39 4.2.2 Status gap distribution and Assortativity 44 4.2.3 Hierarchical gap distribution 49 4.3 Performance Evaluation of HH-Filtering 53 5 Overall Performance Evaluation 58 6 Conclusion 63 Bibliography 65Docto

    Real-time road traffic events detection and geo-parsing

    Get PDF
    Indiana University-Purdue University Indianapolis (IUPUI)In the 21st century, there is an increasing number of vehicles on the road as well as a limited road infrastructure. These aspects culminate in daily challenges for the average commuter due to congestion and slow moving traffic. In the United States alone, it costs an average US driver $1200 every year in the form of fuel and time. Some positive steps, including (a) introduction of the push notification system and (b) deploying more law enforcement troops, have been taken for better traffic management. However, these methods have limitations and require extensive planning. Another method to deal with traffic problems is to track the congested area in a city using social media. Next, law enforcement resources can be re-routed to these areas on a real-time basis. Given the ever-increasing number of smartphone devices, social media can be used as a source of information to track the traffic-related incidents. Social media sites allow users to share their opinions and information. Platforms like Twitter, Facebook, and Instagram are very popular among users. These platforms enable users to share whatever they want in the form of text and images. Facebook users generate millions of posts in a minute. On these platforms, abundant data, including news, trends, events, opinions, product reviews, etc. are generated on a daily basis. Worldwide, organizations are using social media for marketing purposes. This data can also be used to analyze the traffic-related events like congestion, construction work, slow-moving traffic etc. Thus the motivation behind this research is to use social media posts to extract information relevant to traffic, with effective and proactive traffic administration as the primary focus. I propose an intuitive two-step process to utilize Twitter users' posts to obtain for retrieving traffic-related information on a real-time basis. It uses a text classifier to filter out the data that contains only traffic information. This is followed by a Part-Of-Speech (POS) tagger to find the geolocation information. A prototype of the proposed system is implemented using distributed microservices architecture

    TWEEZER โ€“ Tweets Analysis

    Get PDF
    Twitter is one in all the foremost used applications by the people to precise their opinion and show their sentiments towards different occasions. Sentiment analysis is an approach to retrieve the sentiment through the tweets of the general public. Twitter sentiment analysis is application for sentiment analysis of information which are extracted from the twitter(tweets). With the assistance of twitter people get opinion about several things round the nation .Twitter is one such online social networking website where people post their views regarding to trending topics .It s huge platform having over 317 million users registered from everywhere the globe. a decent sentimental analysis of information of this huge platform can result in achieve many new applications like โ€“ Movie reviews, Product reviews, Spam detection, Knowing consumer needs, etc. during this paper, we used two specific algorithm โ€“Naรฏve Bayes Classifier Algorithm for polarity Classification & Hashtag classification for top modeling. this system individually has some limitations for Sentiment analysis. The goal of this report is to relinquish an introduction to the present fascinating problem and to present a framework which is able to perform sentiment analysis on online mobile reviews by associating modified naรฏve bayes means algorithm with Naรฏve bayes classification

    Deep learning to filter SMS spam

    Get PDF
    The popularity of short message service (SMS) has been growing over the last decade. For businesses, these text messages are more effective than even emails. This is because while 98% of mobile users read their SMS by the end of the day, about 80% of the emails remain unopened. The popularity of SMS has also given rise to SMS Spam, which refers to any irrelevant text messages delivered using mobile networks. They are severely annoying to users. Most existing research that has attempted to filter SMS Spam has relied on manually identified features. Extending the current literature, this paper uses deep learning to classify Spam and Not-Spam text messages. Specifically, Convolutional Neural Network and Long Short-term memory models were employed. The proposed models were based on text data only, and self-extracted the feature set. On a benchmark dataset consisting of 747 Spam and 4,827 Not-Spam text messages, a remarkable accuracy of 99.44% was achieved

    Click Fraud Detection in Online and In-app Advertisements: A Learning Based Approach

    Get PDF
    Click Fraud is the fraudulent act of clicking on pay-per-click advertisements to increase a siteโ€™s revenue, to drain revenue from the advertiser, or to inflate the popularity of content on social media platforms. In-app advertisements on mobile platforms are among the most common targets for click fraud, which makes companies hesitant to advertise their products. Fraudulent clicks are supposed to be caught by ad providers as part of their service to advertisers, which is commonly done using machine learning methods. However: (1) there is a lack of research in current literature addressing and evaluating the different techniques of click fraud detection and prevention, (2) threat models composed of active learning systems (smart attackers) can mislead the training process of the fraud detection model by polluting the training data, (3) current deep learning models have significant computational overhead, (4) training data is often in an imbalanced state, and balancing it still results in noisy data that can train the classifier incorrectly, and (5) datasets with high dimensionality cause increased computational overhead and decreased classifier correctness -- while existing feature selection techniques address this issue, they have their own performance limitations. By extending the state-of-the-art techniques in the field of machine learning, this dissertation provides the following solutions: (i) To address (1) and (2), we propose a hybrid deep-learning-based model which consists of an artificial neural network, auto-encoder and semi-supervised generative adversarial network. (ii) As a solution for (3), we present Cascaded Forest and Extreme Gradient Boosting with less hyperparameter tuning. (iii) To overcome (4), we propose a row-wise data reduction method, KSMOTE, which filters out noisy data samples both in the raw data and the synthetically generated samples. (iv) For (5), we propose different column-reduction methods such as multi-time-scale Time Series analysis for fraud forecasting, using binary labeled imbalanced datasets and hybrid filter-wrapper feature selection approaches

    Detecting cyberbullying and cyberaggression in social media

    Get PDF
    Cyberbullying and cyberaggression are increasingly worrisome phenomena affecting people across all demographics. More than half of young social media users worldwide have been exposed to such prolonged and/or coordinated digital harassment. Victims can experience a wide range of emotions, with negative consequences such as embarrassment, depression, isolation from other community members, which embed the risk to lead to even more critical consequences, such as suicide attempts. In this work, we take the first concrete steps to understand the characteristics of abusive behavior in Twitter, one of todayโ€™s largest social media platforms. We analyze 1.2 million users and 2.1 million tweets, comparing users participating in discussions around seemingly normal topics like the NBA, to those more likely to be hate-related, such as the Gamergate controversy, or the gender pay inequality at the BBC station. We also explore specific manifestations of abusive behavior, i.e., cyberbullying and cyberaggression, in one of the hate-related communities (Gamergate). We present a robust methodology to distinguish bullies and aggressors from normal Twitter users by considering text, user, and network-based attributes. Using various state-of-the-art machine-learning algorithms, we classify these accounts with over 90% accuracy and AUC. Finally, we discuss the current status of Twitter user accounts marked as abusive by our methodology and study the performance of potential mechanisms that can be used by Twitter to suspend users in the future

    Comparison of Novel Recurrent Neural Network Over Artificial Neural network in Predicting Email spammers with improved accuracy

    Get PDF
    The main aim is to compare Novel Recurrent Neural Network over Artificial Neural Network in predicting Email spammers with improved accuracy. Material and Methods : This research study contains two groups namely Novel Recurrent Neural Network and Artificial Neural Network. Each group consists of a sample size of 10 and the study parameters are calculated using clincalc with preset parameters as alpha 0.8, beta 0.2 and CI as 90%. Results and Discussion : The Novel Recurrent Neural Network has the highest accuracy 97.96% when compared to Artificial Neural Network it has 93.79% accuracy in Electronic Mail spam prediction with significance value p=0.000(p<0.05) that is significantly better. The G-power value is 80%. When used as a spam predictor for electronic mail, the Novel Recurrent Neural Network performance analysis outperforms the best results than the Artificial Neural Network performance
    • โ€ฆ
    corecore