Spammer Detection Prediction and Identification by ML

Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter and Facebook, which are both influential and unpopular in everyday life, are both influential and unpopular. Spammers have turned to well-kn...

Full description

Saved in:
Bibliographic Details
Published in2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) pp. 322 - 326
Main Authors Manoj, Challapalli, Tejaswi, Talluru, Sandeep, M., Ganesan, Vithya, Ramaswamy, Viswanathan, Chandan, Seelam, Akilan, T.
Format Conference Proceeding
LanguageEnglish
Published IEEE 16.12.2022
Subjects
Online AccessGet full text
DOI10.1109/ICAC3N56670.2022.10074489

Cover

Abstract Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter and Facebook, which are both influential and unpopular in everyday life, are both influential and unpopular. Spammers have turned to well-known social networking sites to disseminate a significant volume of useless and delete able content. For example, Twitter has grown to become one of the most frequently utilized platforms of all time, allowing for a fictitious spam level. Spam detection and false identity detection on Twitter have recently been frequent study topics on modern online social networks (OSNs). We conduct a strategic evaluation in this study to identify persons who publish spam on Twitter. Furthermore, the group of Twitter spam detection algorithms divides them into categories depending on their capacity to trace false content, spam-based URLs, spam on popular subjects, and phone users. The methodologies are also contrasted in terms of other characteristics, such as user, content, graph, layout, and time characteristics. Unwanted tweets by fraudulent users disrupts authorized customers and impedes resource usages. Additionally, the potential to distribute information about phone identities to users has grown, leading in the distribution of inappropriate content.
AbstractList Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter and Facebook, which are both influential and unpopular in everyday life, are both influential and unpopular. Spammers have turned to well-known social networking sites to disseminate a significant volume of useless and delete able content. For example, Twitter has grown to become one of the most frequently utilized platforms of all time, allowing for a fictitious spam level. Spam detection and false identity detection on Twitter have recently been frequent study topics on modern online social networks (OSNs). We conduct a strategic evaluation in this study to identify persons who publish spam on Twitter. Furthermore, the group of Twitter spam detection algorithms divides them into categories depending on their capacity to trace false content, spam-based URLs, spam on popular subjects, and phone users. The methodologies are also contrasted in terms of other characteristics, such as user, content, graph, layout, and time characteristics. Unwanted tweets by fraudulent users disrupts authorized customers and impedes resource usages. Additionally, the potential to distribute information about phone identities to users has grown, leading in the distribution of inappropriate content.
Author Manoj, Challapalli
Sandeep, M.
Chandan, Seelam
Ramaswamy, Viswanathan
Tejaswi, Talluru
Ganesan, Vithya
Akilan, T.
Author_xml – sequence: 1
  givenname: Challapalli
  surname: Manoj
  fullname: Manoj, Challapalli
  email: manojchallapalli93@gmail.com
  organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India
– sequence: 2
  givenname: Talluru
  surname: Tejaswi
  fullname: Tejaswi, Talluru
  email: tallurutejaswi@gmail.com
  organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India
– sequence: 3
  givenname: M.
  surname: Sandeep
  fullname: Sandeep, M.
  email: 180030950@kluniversity.in
  organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India
– sequence: 4
  givenname: Vithya
  surname: Ganesan
  fullname: Ganesan, Vithya
  email: vithyamtech@gmail.com
  organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India
– sequence: 5
  givenname: Viswanathan
  surname: Ramaswamy
  fullname: Ramaswamy, Viswanathan
  email: rvnathan006@gmail.com
  organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India
– sequence: 6
  givenname: Seelam
  surname: Chandan
  fullname: Chandan, Seelam
  organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India
– sequence: 7
  givenname: T.
  surname: Akilan
  fullname: Akilan, T.
  organization: Koneru Lakshmaih Educational Foundation,Computer Science and Engineering,Guntur,India
BookMark eNo1j81OwzAQhI1ED9D2DTiEB0jw2s7aPqLwVym0ldp7tbE3kiXiViGXvj0VhdOM5vDNzL24zcfMQjyCrACkf1o1z41e14hWVkoqVYGU1hjnb8TSWweItbFGo7sT9e5Ew8Bj8cIThykdc7EdOaarpRyLVeQ8pT4F-o26c_HZLsSsp69vXv7pXOzfXvfNR9lu3i_lbZkA_FTWHklH1WFUnm2w_jKiD8opcKgNcCRtvfMyGEekNIKkXqMFjF2wsdNz8XDFJmY-nMY00Hg-_J_RP6qqQ0o
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICAC3N56670.2022.10074489
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665474368
166547436X
EndPage 326
ExternalDocumentID 10074489
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-596a3d2b6d29e7c79744fc282186341eda379890c48aa23610af36716dbc7db3
IEDL.DBID RIE
IngestDate Thu Jan 18 11:14:23 EST 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-596a3d2b6d29e7c79744fc282186341eda379890c48aa23610af36716dbc7db3
PageCount 5
ParticipantIDs ieee_primary_10074489
PublicationCentury 2000
PublicationDate 2022-Dec.-16
PublicationDateYYYYMMDD 2022-12-16
PublicationDate_xml – month: 12
  year: 2022
  text: 2022-Dec.-16
  day: 16
PublicationDecade 2020
PublicationTitle 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)
PublicationTitleAbbrev ICAC3N
PublicationYear 2022
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.818186
Snippet Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter...
SourceID ieee
SourceType Publisher
StartPage 322
SubjectTerms Blogs
Fake news
fraud
ham mail
Layout
naive bayes
Social networking (online)
social-network
spam
spam mails
support vector machine
Support vector machines
Taxonomy
Uniform resource locators
Title Spammer Detection Prediction and Identification by ML
URI https://ieeexplore.ieee.org/document/10074489
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5sD-JJxYpvVvCa7T6yyeYo1VLFFsEKvZU8QYRtke1Bf72T7K6iIHgLS5ZssoFvvpn5ZgCuEDKsdEVOaEodQfuWEsWpIanmLFHO8TT0WJrO2OSZ3i-KRStWD1oYa21IPrOxH4ZYvlnpjXeVDX1EH-mE6EEP71kj1tqGy7Zu5vBudD3KZ2if8ASJX5bF3fwfnVMCcIx3YdYt2eSLvMabWsX641c1xn9_0x4MvjV60eMX-uzDlq0OoHhaB090dGPrkGNV4RwfiglDWZmoEea61lMXqfdo-jCA-fh2PpqQtjECecGjq0khmMxNppjJhOWaIyegTiN5SkuGqGSNzLkoRaJpKaWvrpJIlzNkRkZpblR-CP1qVdkjiKzgygieaDQ8qEJzoTAZvi4zZEncCnYMA7_l5bopfbHsdnvyx_NT2PEn7_M9UnYG_fptY88RtWt1Ef7WJ6e9lk4
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB60gnpSseLbFbxmu49s0hylWlptF8EKvZW8FqSwLbI96K93kt0qCoK3EDZkkxy--WbmmwG4QciwsshSQmNaELRvKVGcGhJrziJVFDz2PZbGORu80IdpNm3E6l4LY631yWc2dEMfyzcLvXKuso6L6COdEJuwhcBPs1qutQ3XTeXMzrB320tztFB4hNQvScL1ih-9Uzx09PcgX29aZ4zMw1WlQv3xqx7jv_9qH9rfKr3g6Qt_DmDDloeQPS-9Lzq4s5XPsirxGxeM8UNZmqCW5haNry5Q78F41IZJ_37SG5CmNQJ5xcurSCaYTE2imEmE5ZojK6CFRvoUdxnikjUy5aIrIk27Urr6KpEsUobcyCjNjUqPoFUuSnsMgRVcGcEjjaYHVWgwZCbB5TJBnsStYCfQdkeeLeviF7P1aU__mL-CncFkPJqNhvnjGey6V3DZHzE7h1b1trIXiOGVuvQv9wm7Upmb
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+4th+International+Conference+on+Advances+in+Computing%2C+Communication+Control+and+Networking+%28ICAC3N%29&rft.atitle=Spammer+Detection+Prediction+and+Identification+by+ML&rft.au=Manoj%2C+Challapalli&rft.au=Tejaswi%2C+Talluru&rft.au=Sandeep%2C+M.&rft.au=Ganesan%2C+Vithya&rft.date=2022-12-16&rft.pub=IEEE&rft.spage=322&rft.epage=326&rft_id=info:doi/10.1109%2FICAC3N56670.2022.10074489&rft.externalDocID=10074489