{"title":"在线社交网络中受损账户的检测","authors":"S. Rane, Megha Ainapurkar, Amey Wadekar","doi":"10.1109/ICCMC.2018.8487486","DOIUrl":null,"url":null,"abstract":"Compromised accounts are of a severe risk to the social network users. People now a days are mostly dependent on Online Social Networks. While some persistent spams feat the relationship between the users by spreading spams. Therefore time to time detection of the compromised accounts is a necessity. In this paper, we will study different social user behaviour and detect the compromised accounts and spam users. Spam behaviour in social networks has a wide range of illegal activities. Such activities need to be evaluated and effect of spam users needs to be reduced. To reduce such effects, we require proper detection strategy. We validate the effectiveness of these behaviour by collecting the clickstream data on a social network website. Social behaviour reflects the users behaviour online. While an legitimate user coordinates its social behaviour carefully, it is hard for the fake users to pretend to be affected. Different studies are performed in spam behaviour analysis and define a structure for spam account detection.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"45 1","pages":"612-614"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"DETECTION OF COMPROMISED ACCOUNTS IN ONLINE SOCIAL NETWORK\",\"authors\":\"S. Rane, Megha Ainapurkar, Amey Wadekar\",\"doi\":\"10.1109/ICCMC.2018.8487486\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Compromised accounts are of a severe risk to the social network users. People now a days are mostly dependent on Online Social Networks. While some persistent spams feat the relationship between the users by spreading spams. Therefore time to time detection of the compromised accounts is a necessity. In this paper, we will study different social user behaviour and detect the compromised accounts and spam users. Spam behaviour in social networks has a wide range of illegal activities. Such activities need to be evaluated and effect of spam users needs to be reduced. To reduce such effects, we require proper detection strategy. We validate the effectiveness of these behaviour by collecting the clickstream data on a social network website. Social behaviour reflects the users behaviour online. While an legitimate user coordinates its social behaviour carefully, it is hard for the fake users to pretend to be affected. Different studies are performed in spam behaviour analysis and define a structure for spam account detection.\",\"PeriodicalId\":6604,\"journal\":{\"name\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"45 1\",\"pages\":\"612-614\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC.2018.8487486\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487486","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DETECTION OF COMPROMISED ACCOUNTS IN ONLINE SOCIAL NETWORK
Compromised accounts are of a severe risk to the social network users. People now a days are mostly dependent on Online Social Networks. While some persistent spams feat the relationship between the users by spreading spams. Therefore time to time detection of the compromised accounts is a necessity. In this paper, we will study different social user behaviour and detect the compromised accounts and spam users. Spam behaviour in social networks has a wide range of illegal activities. Such activities need to be evaluated and effect of spam users needs to be reduced. To reduce such effects, we require proper detection strategy. We validate the effectiveness of these behaviour by collecting the clickstream data on a social network website. Social behaviour reflects the users behaviour online. While an legitimate user coordinates its social behaviour carefully, it is hard for the fake users to pretend to be affected. Different studies are performed in spam behaviour analysis and define a structure for spam account detection.