A machine learning approach for Twitter spammers detection | IEEE Conference Publication | IEEE Xplore
Scheduled Maintenance: On Monday, 30 June, IEEE Xplore will undergo scheduled maintenance from 1:00-2:00 PM ET (1800-1900 UTC).
On Tuesday, 1 July, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (1800-2200 UTC).
During these times, there may be intermittent impact on performance. We apologize for any inconvenience.

A machine learning approach for Twitter spammers detection


Abstract:

The ever-increasing popularity of Social Networks offers unprecedented opportunities to aggregate people and exchange information, but, at the same time, opens new modali...Show More

Abstract:

The ever-increasing popularity of Social Networks offers unprecedented opportunities to aggregate people and exchange information, but, at the same time, opens new modalities for cyber-crime perpetrations. The spamming phenomenon, so spread-out in emails, is now affecting microblogs, and exploits specific mechanisms of the messaging process. The paper proposes an inductive-learning method for the detection of Twitter-spammers, and applies a Random-Forest approach to a limited set of features that are extracted from traffic. Experimental results show that the proposed method outperforms existing approaches to this problem.
Date of Conference: 13-16 October 2014
Date Added to IEEE Xplore: 18 December 2014
ISBN Information:

ISSN Information:

Conference Location: Rome, Italy

I. Introduction

To understand how spammer users operate in the Twitter community, it is useful to recall the social network behavior. Users communicate through short “tweets” (140 characters max), that can be viewed by the users' followers and retrieved or “re-tweeted”. Two types of friends exist in Twitter: “followers” and “following”. A follower of user ‘Alice’ is any user ‘Bob’ who agrees to receive Alice's tweets. Conversely, a following of Alice is a user who is followed by Alice. These relationships are not reciprocal: albeit Alice follows Bob, Bob may not be a follower of Alice. As opposed to other Social Networks, Alice can post tweets on Bob's page without permission, since Alice does not have to be one of Bob's followers to post tweets on Bob's profile. Because of this mechanism, spammers can flood a user's page with malicious messages without permission. Likewise, a cybercriminal can post malicious links on his/her followers' profile, in order to direct them to phishing pages or to spread malware. The major problems in Twitter are the possibility to automatically receive following accounts' updates, and the possibility to write on followers' profile pages without followed in turn.

Contact IEEE to Subscribe

References

References is not available for this document.