Spammer Detection Prediction and Identification by ML

Challapalli Manoj, Talluru Tejaswi, M. Sandeep, V. Ganesan, Viswanathan Ramaswamy, Seelam Chandan, T. Akilan
{"title":"Spammer Detection Prediction and Identification by ML","authors":"Challapalli Manoj, Talluru Tejaswi, M. Sandeep, V. Ganesan, Viswanathan Ramaswamy, Seelam Chandan, T. Akilan","doi":"10.1109/ICAC3N56670.2022.10074489","DOIUrl":null,"url":null,"abstract":"Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter and Facebook, which are both influential and unpopular in everyday life, are both influential and unpopular. Spammers have turned to well-known social networking sites to disseminate a significant volume of useless and delete able content. For example, Twitter has grown to become one of the most frequently utilized platforms of all time, allowing for a fictitious spam level. Spam detection and false identity detection on Twitter have recently been frequent study topics on modern online social networks (OSNs). We conduct a strategic evaluation in this study to identify persons who publish spam on Twitter. Furthermore, the group of Twitter spam detection algorithms divides them into categories depending on their capacity to trace false content, spam-based URLs, spam on popular subjects, and phone users. The methodologies are also contrasted in terms of other characteristics, such as user, content, graph, layout, and time characteristics. Unwanted tweets by fraudulent users disrupts authorized customers and impedes resource usages. Additionally, the potential to distribute information about phone identities to users has grown, leading in the distribution of inappropriate content.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAC3N56670.2022.10074489","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Social networking platforms are used by millions of individuals all around the world. The effects of user interaction with social networking sites like Twitter and Facebook, which are both influential and unpopular in everyday life, are both influential and unpopular. Spammers have turned to well-known social networking sites to disseminate a significant volume of useless and delete able content. For example, Twitter has grown to become one of the most frequently utilized platforms of all time, allowing for a fictitious spam level. Spam detection and false identity detection on Twitter have recently been frequent study topics on modern online social networks (OSNs). We conduct a strategic evaluation in this study to identify persons who publish spam on Twitter. Furthermore, the group of Twitter spam detection algorithms divides them into categories depending on their capacity to trace false content, spam-based URLs, spam on popular subjects, and phone users. The methodologies are also contrasted in terms of other characteristics, such as user, content, graph, layout, and time characteristics. Unwanted tweets by fraudulent users disrupts authorized customers and impedes resource usages. Additionally, the potential to distribute information about phone identities to users has grown, leading in the distribution of inappropriate content.
基于ML的垃圾邮件检测预测与识别
世界各地数以百万计的个人使用社交网络平台。Twitter和Facebook等社交网站在日常生活中既具有影响力又不受欢迎,用户与它们互动的影响既具有影响力又不受欢迎。垃圾邮件发送者已经转向知名的社交网站来传播大量无用和可删除的内容。例如,Twitter已经发展成为有史以来最常用的平台之一,允许虚构的垃圾邮件级别。近年来,Twitter上的垃圾邮件检测和虚假身份检测一直是现代在线社交网络(online social networks, OSNs)研究的热点。我们在这项研究中进行了战略评估,以确定在Twitter上发布垃圾邮件的人。此外,Twitter垃圾邮件检测算法组根据其跟踪虚假内容、基于垃圾邮件的url、流行主题的垃圾邮件和电话用户的能力将它们分为几类。这些方法还在其他特征方面进行了对比,例如用户、内容、图形、布局和时间特征。欺诈性用户发出的不受欢迎的推文扰乱了授权客户并阻碍了资源使用。此外,向用户分发电话身份信息的可能性也在增加,导致不适当内容的分发。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信