Skip to main content

Fake News Detection in Social Networks Using Machine Learning and Trust

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13301))

Abstract

Fake news propagation is a major challenge for Online Social Networks (OSN) security, which is not yet resolved. Fake news propagates because of several reasons, one of which is non-trustworthy users. Non-trustworthy users are those who spread misleading information either for malicious intentions or innocently as they lack social media awareness. As a result, they expose their sub networks to false or inaccurate information.

In our previous research we have devised a comprehensive Trust-based model that can handle this problem from the user Trust aspect. The model involves Access Control for the direct circle of friends and Flow Control for the friends’ networks. In this paper we use this model and extend it for the purpose of preventing Fake News. We analyze user’s activity in the network (posts, shares, etc.) to learn their contexts. Using Machine Learning methods on data items that are fake or misleading, we detect suspicious users. This addition facilitates a much more accurate mapping of OSN users and their data which enables the identification of the Fake News propagation source. The extended model can be used to create a strong and reliable data infrastructure for OSN.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Voloch, N., Nissim, P., Elmakies, M., Gudes, E.: A Role and Trust Access Control model for preserving privacy and image anonymization in Social Networks. In: Meng, W., Cofta, P., Jensen, C.D., Grandison, T. (eds.) IFIPTM 2019. IAICT, vol. 563, pp. 19–27. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-33716-2_2

    Chapter  Google Scholar 

  2. Voloch, N., Levy, P., Elmakies, M., Gudes, E.: An Access Control model for Data Security in Online Social Networks based on role and user credibility. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds.) CSCML 2019. LNCS, vol. 11527, pp. 156–168. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-20951-3_14

    Chapter  Google Scholar 

  3. Gudes, E., Voloch, N.: An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. In: Dinur, I., Dolev, S., Lodha, S. (eds.) CSCML 2018. LNCS, vol. 10879, pp. 55–67. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94147-9_5

    Chapter  Google Scholar 

  4. Voloch, N., Gudes, E.: An MST-based information flow model for security in online social networks. In: The 11th IEEE International Conference on Ubiquitous and Future Networks (2019)

    Google Scholar 

  5. Voloch, N., Gudes, E., Gal-Oz, N.: Preventing fake news propagation in social networks using a context trust-based security model. In: Yang, M., Chen, C., Liu, Y. (eds.) NSS 2021. LNCS, vol. 13041, pp. 100–115. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-92708-0_6

    Chapter  Google Scholar 

  6. Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22–36 (2017)

    Article  Google Scholar 

  7. Tandoc, E.C., Jr., Lim, Z.W., Ling, R.: Defining ‘fake news’ a typology of scholarly definitions. Digit. Journal. 6(2), 137–153 (2018)

    Google Scholar 

  8. Kumar, K.P.K., Geethakumari, G.: Detecting misinformation in online social networks using cognitive psychology. HCIS 4(1), 1–22 (2014). https://doi.org/10.1186/s13673-014-0014-x

    Article  Google Scholar 

  9. Levi, O., Hosseini, P., Diab, M., Broniatowski, D.A.: Identifying nuances in fake news vs. satire: using semantic and linguistic cues. arXiv preprint arXiv:1910.01160. (2019)

  10. Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science 359(6380), 1146–1151 (2018)

    Article  Google Scholar 

  11. Li, Y., Li, Y., Yan, Q., Deng, R.H.: Privacy leakage analysis in online social networks. Comput. Secur. 49, 239–254 (2015)

    Article  Google Scholar 

  12. Atallah, M.J., McDonough, C.J., Raskin, V., Nirenburg, S.: Natural language processing for information assurance and security: an overview and implementations. In: NSPW, pp. 51–65, September 2000

    Google Scholar 

  13. Tsoumas, B., Gritzalis, D.: Towards an ontology-based security management. In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), vol. 1, pp. 985–992. IEEE, April 2006

    Google Scholar 

  14. Wang, X., Tokarchuk, L., Poslad, S.: Identifying relevant event content for real-time event detection. In: 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), Beijing, pp. 395–398 (2014)

    Google Scholar 

  15. May, C., Ferraro, F., McCree, A., Wintrode, J., Garcia-Romero, D., Van Durme, B.: Topic identification and discovery on text and speech. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 2377–2387, September 2015

    Google Scholar 

  16. Choudhary, A., Arora, A.: Linguistic feature based learning model for fake news detection and classification. Expert Syst. Appl. 169, 114171 (2021)

    Article  Google Scholar 

  17. Monti, F., Frasca, F., Eynard, D., Mannion, D., Bronstein, M.M.: Fake news detection on social media using geometric deep learning. arXiv preprint arXiv:1902.06673. (2019)

  18. Helmstetter, S., Paulheim, H.: Weakly supervised learning for fake news detection on Twitter. In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 274–277. IEEE, August 2018

    Google Scholar 

  19. Pierri, F., Ceri, S.: False news on social media: a data-driven survey. ACM SIGMOD Rec. 48(2), 18–27 (2019)

    Article  Google Scholar 

  20. Voloch, N.: Using Sentiment Analysis and context evaluation for preserving Trust-based privacy in Social Networks (2020).‏ https://www.cs.bgu.ac.il/~voloch/FinalProjectReport.pdf

  21. Cui, L., Wang, S., Lee, D.: SAME: sentiment-aware multi-modal embedding for detecting fake news. In: Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 41–48, August 2019‏

    Google Scholar 

  22. Voloch, N., Gal-Oz, N., Gudes, E.: A trust based privacy providing model for online social networks. Online Soc. Netw. Media 24, 100138 (2021)

    Article  Google Scholar 

  23. https://www.youtube.com/watch?v=uSPknKXaWJ4&ab_channel=voloch

  24. Chen, Y.P., Chen, Y.Y., Lin, J.J., Huang, C.H., Lai, F.: Modified bidirectional encoder representations from transformers extractive summarization model for hospital information systems based on character-level tokens (AlphaBERT): development and performance evaluation. JMIR Med. Inform. 8(4), e17787 (2020)

    Article  Google Scholar 

  25. https://github.com/rotemit/FakeNewsDetector

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadav Voloch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Voloch, N., Gudes, E., Gal-Oz, N., Mitrany, R., Shani, O., Shoel, M. (2022). Fake News Detection in Social Networks Using Machine Learning and Trust. In: Dolev, S., Katz, J., Meisels, A. (eds) Cyber Security, Cryptology, and Machine Learning. CSCML 2022. Lecture Notes in Computer Science, vol 13301. Springer, Cham. https://doi.org/10.1007/978-3-031-07689-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-07689-3_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-07688-6

  • Online ISBN: 978-3-031-07689-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics