Spammer Detection Prediction and Identification by ML
Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter and Facebook, which are both influential and unpopular in everyday life, are both influential and unpopular. Spammers have turned to well-kn...
Saved in:
Published in | 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) pp. 322 - 326 |
---|---|
Main Authors | , , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
16.12.2022
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ICAC3N56670.2022.10074489 |
Cover
Abstract | Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter and Facebook, which are both influential and unpopular in everyday life, are both influential and unpopular. Spammers have turned to well-known social networking sites to disseminate a significant volume of useless and delete able content. For example, Twitter has grown to become one of the most frequently utilized platforms of all time, allowing for a fictitious spam level. Spam detection and false identity detection on Twitter have recently been frequent study topics on modern online social networks (OSNs). We conduct a strategic evaluation in this study to identify persons who publish spam on Twitter. Furthermore, the group of Twitter spam detection algorithms divides them into categories depending on their capacity to trace false content, spam-based URLs, spam on popular subjects, and phone users. The methodologies are also contrasted in terms of other characteristics, such as user, content, graph, layout, and time characteristics. Unwanted tweets by fraudulent users disrupts authorized customers and impedes resource usages. Additionally, the potential to distribute information about phone identities to users has grown, leading in the distribution of inappropriate content. |
---|---|
AbstractList | Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter and Facebook, which are both influential and unpopular in everyday life, are both influential and unpopular. Spammers have turned to well-known social networking sites to disseminate a significant volume of useless and delete able content. For example, Twitter has grown to become one of the most frequently utilized platforms of all time, allowing for a fictitious spam level. Spam detection and false identity detection on Twitter have recently been frequent study topics on modern online social networks (OSNs). We conduct a strategic evaluation in this study to identify persons who publish spam on Twitter. Furthermore, the group of Twitter spam detection algorithms divides them into categories depending on their capacity to trace false content, spam-based URLs, spam on popular subjects, and phone users. The methodologies are also contrasted in terms of other characteristics, such as user, content, graph, layout, and time characteristics. Unwanted tweets by fraudulent users disrupts authorized customers and impedes resource usages. Additionally, the potential to distribute information about phone identities to users has grown, leading in the distribution of inappropriate content. |
Author | Manoj, Challapalli Sandeep, M. Chandan, Seelam Ramaswamy, Viswanathan Tejaswi, Talluru Ganesan, Vithya Akilan, T. |
Author_xml | – sequence: 1 givenname: Challapalli surname: Manoj fullname: Manoj, Challapalli email: manojchallapalli93@gmail.com organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India – sequence: 2 givenname: Talluru surname: Tejaswi fullname: Tejaswi, Talluru email: tallurutejaswi@gmail.com organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India – sequence: 3 givenname: M. surname: Sandeep fullname: Sandeep, M. email: 180030950@kluniversity.in organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India – sequence: 4 givenname: Vithya surname: Ganesan fullname: Ganesan, Vithya email: vithyamtech@gmail.com organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India – sequence: 5 givenname: Viswanathan surname: Ramaswamy fullname: Ramaswamy, Viswanathan email: rvnathan006@gmail.com organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India – sequence: 6 givenname: Seelam surname: Chandan fullname: Chandan, Seelam organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India – sequence: 7 givenname: T. surname: Akilan fullname: Akilan, T. organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India |
BookMark | eNo1j81OwzAQhI1ED9D2DTiEB0jw2s7aPqLwVym0ldp7tbE3kiXiViGXvj0VhdOM5vDNzL24zcfMQjyCrACkf1o1z41e14hWVkoqVYGU1hjnb8TSWweItbFGo7sT9e5Ew8Bj8cIThykdc7EdOaarpRyLVeQ8pT4F-o26c_HZLsSsp69vXv7pXOzfXvfNR9lu3i_lbZkA_FTWHklH1WFUnm2w_jKiD8opcKgNcCRtvfMyGEekNIKkXqMFjF2wsdNz8XDFJmY-nMY00Hg-_J_RP6qqQ0o |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICAC3N56670.2022.10074489 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781665474368 166547436X |
EndPage | 326 |
ExternalDocumentID | 10074489 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i119t-596a3d2b6d29e7c79744fc282186341eda379890c48aa23610af36716dbc7db3 |
IEDL.DBID | RIE |
IngestDate | Thu Jan 18 11:14:23 EST 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i119t-596a3d2b6d29e7c79744fc282186341eda379890c48aa23610af36716dbc7db3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_10074489 |
PublicationCentury | 2000 |
PublicationDate | 2022-Dec.-16 |
PublicationDateYYYYMMDD | 2022-12-16 |
PublicationDate_xml | – month: 12 year: 2022 text: 2022-Dec.-16 day: 16 |
PublicationDecade | 2020 |
PublicationTitle | 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) |
PublicationTitleAbbrev | ICAC3N |
PublicationYear | 2022 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.818186 |
Snippet | Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 322 |
SubjectTerms | Blogs Fake news fraud ham mail Layout naive bayes Social networking (online) social-network spam spam mails support vector machine Support vector machines Taxonomy Uniform resource locators |
Title | Spammer Detection Prediction and Identification by ML |
URI | https://ieeexplore.ieee.org/document/10074489 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5sD-JJxYpvVvCa7T6yyeYo1VLFFsEKvZU8QYRtke1Bf72T7K6iIHgLS5ZssoFvvpn5ZgCuEDKsdEVOaEodQfuWEsWpIanmLFHO8TT0WJrO2OSZ3i-KRStWD1oYa21IPrOxH4ZYvlnpjXeVDX1EH-mE6EEP71kj1tqGy7Zu5vBudD3KZ2if8ASJX5bF3fwfnVMCcIx3YdYt2eSLvMabWsX641c1xn9_0x4MvjV60eMX-uzDlq0OoHhaB090dGPrkGNV4RwfiglDWZmoEea61lMXqfdo-jCA-fh2PpqQtjECecGjq0khmMxNppjJhOWaIyegTiN5SkuGqGSNzLkoRaJpKaWvrpJIlzNkRkZpblR-CP1qVdkjiKzgygieaDQ8qEJzoTAZvi4zZEncCnYMA7_l5bopfbHsdnvyx_NT2PEn7_M9UnYG_fptY88RtWt1Ef7WJ6e9lk4 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB60gnpSseLbFbxmu49s0hylWlptF8EKvZW8FqSwLbI96K93kt0qCoK3EDZkkxy--WbmmwG4QciwsshSQmNaELRvKVGcGhJrziJVFDz2PZbGORu80IdpNm3E6l4LY631yWc2dEMfyzcLvXKuso6L6COdEJuwhcBPs1qutQ3XTeXMzrB320tztFB4hNQvScL1ih-9Uzx09PcgX29aZ4zMw1WlQv3xqx7jv_9qH9rfKr3g6Qt_DmDDloeQPS-9Lzq4s5XPsirxGxeM8UNZmqCW5haNry5Q78F41IZJ_37SG5CmNQJ5xcurSCaYTE2imEmE5ZojK6CFRvoUdxnikjUy5aIrIk27Urr6KpEsUobcyCjNjUqPoFUuSnsMgRVcGcEjjaYHVWgwZCbB5TJBnsStYCfQdkeeLeviF7P1aU__mL-CncFkPJqNhvnjGey6V3DZHzE7h1b1trIXiOGVuvQv9wm7Upmb |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+4th+International+Conference+on+Advances+in+Computing%2C+Communication+Control+and+Networking+%28ICAC3N%29&rft.atitle=Spammer+Detection+Prediction+and+Identification+by+ML&rft.au=Manoj%2C+Challapalli&rft.au=Tejaswi%2C+Talluru&rft.au=Sandeep%2C+M.&rft.au=Ganesan%2C+Vithya&rft.date=2022-12-16&rft.pub=IEEE&rft.spage=322&rft.epage=326&rft_id=info:doi/10.1109%2FICAC3N56670.2022.10074489&rft.externalDocID=10074489 |