Skip to main content

Efficient Detection of Content Polluters in Social Networks

  • Conference paper
  • First Online:
IT Convergence and Security 2012

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

Abstract

A large number of Internet users are currently using social networking services (SNS) such as Twitter and Facebook. However, the SNS users are exposed to threats of malicious messages and spams from unwanted sources. It would be useful to have an effective method for detecting spammers or content polluters on social networks. In this paper, we present an efficient method for detecting content polluters on Twitter. Our approach needs only a few feature values for each Twitter user and hence requires a lot less time in the overall mining process. We demonstrate that our approach performs better than the previous approach in terms of the classification accuracy and the mining time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bosma M, Meij E, Weerkamp W (2012) A framework for unsupervised spam detection in social networking sites. In: European conference on information retrieval (ECIR), pp 364–375

    Google Scholar 

  2. Abu-Nimeh S, Chen T, Alzubi O (2011) Malicious and spam posts in online social networks. IEEE Comput Soc 44(9):23–28

    Article  Google Scholar 

  3. Beck K (2011) Analyzing tweets to identify malicious messages. In: Proceedings of IEEE international conference on electro/information technology (EIT), pp 1–5

    Google Scholar 

  4. Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceeding of annual computer security applications conference (ACSAC), pp 1–9

    Google Scholar 

  5. Wang A (2010) Don’t follow me: spam detection in twitter. In: Proceeding of international conference on security and cryptography (SECRYPT), pp. 1–10

    Google Scholar 

  6. Lee K, Eoff B, Caverlee J (2011) Seven months with the devils: a long-term study of content polluters on twitter. In: Proceedings of AAAI international conference on weblogs and social media (ICWSM), pp. 185–192

    Google Scholar 

  7. http://infolab.tamu.edu/static/users/kyumin/social_honeypot_icwsm_2011.zip

  8. http://www.cs.waikato.ac.nz/ml/weka/index.html

Download references

Acknowledgments

The present research has been supported by the Research Grant of Kwangwoon University (No. 60012007197)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Byung Joon Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Han, J.S., Park, B.J. (2013). Efficient Detection of Content Polluters in Social Networks. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_119

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_119

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics