Abstract
Twitter, the social network which evolving faster and regular usage by millions of people and who become addicted to it. So spam playing a major role for Twitter users to distract them and grab their attention over them. Spammers actually detailed like who send unwanted and irrelevant messages or websites and promote them to several users. To overcome the problem many researchers proposed some ideas using some machine learning algorithms to detect the spammers. In this research work, a new hybrid approach is proposed to detect the streaming of Twitter spam in a real-time using the combination of a Decision tree, Particle Swarm Optimization and Genetic algorithm. Twitter has given access to the researchers to get tweets from its Twitter-API for real-time streaming of tweet data which they can get direct access to public tweets. Here 600 million tweets are created by using URL based security tool and further some features are extracted for representation of tweets in real-time detection of spam. In addition, our research results are compared with other hybrid algorithms which a better detection rate is given by our proposed work.
Similar content being viewed by others
References
Zhang, X., Zhu, S., & Liang, W. (2012). Detecting spam and promoting campaigns in the Twitter social network. In 2012 IEEE 12th international conference on data mining. https://doi.org/10.1109/icdm.2012.28.
Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010) Detecting spammer on twitter. Presented at the 7th annual collaboration electronic messaging anti-abuse spam conference, Redmond, WA, USA, Jul. 2010.
Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010). @spam. In Proceedings of the 17th ACM conference on Computer and communications security—CCS 10. https://doi.org/10.1145/1866307.1866311.
Yardi, S., Romero, D., Schoenebeck, G., & Boyd, D. (2009). Detecting spam in a Twitter network. First Monday. https://doi.org/10.5210/fm.v15i1.2793.
Bohacik, J., Fuchs, A., & Benedikovic, M. (2017). Detecting compromised accounts on the Pokec online social network. In 2017 international conference on information and digital technologies (IDT). https://doi.org/10.1109/dt.2017.8024272.
Dasu, T., Krishnan, S., Venkatasubramanian, S., Yi, K. (2006) An information-theoretic approach to detecting changes inmulti-dimensional data streams. In Proceedings of symposium on interface statistics and computer science applications.
Lee, S., & Kim, J. (2013). WarningBird: A near real-time detection system for suspicious URLs in Twitter stream. IEEE Transactions on Dependable and Secure Computing, 10(3), 183–195. https://doi.org/10.1109/tdsc.2013.3.
Thonnard, O., Vervier, P., & Dacier, M. (2012). Spammers operations: A multifaceted strategic analysis. Security and Communication Networks, 9(4), 336–356. https://doi.org/10.1002/sec.640.
Chen, C., Zhang, J., Xie, Y., Xiang, Y., Zhou, W., Hassan, M. M., et al. (2015). A Performance evaluation of machine learning-based streaming spam tweets detection. IEEE Transactions on Computational Social Systems, 2(3), 65–76. https://doi.org/10.1109/tcss.2016.2516039.
Balan, E. V., Priyan, M. K., Gokulnath, C., & Devi, G. U. (2015). Fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 50, 109–114.
Kumar, P. M., & Gandhi, U. D. (2017). Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application. The Journal of Supercomputing. https://doi.org/10.1007/s11227-017-2169-5.
Hu, H., Chen, Y., & Tang, K. (2013). A novel decision-tree method for structured continuous-label classification. IEEE Transactions on Cybernetics, 43(6), 1734–1746. https://doi.org/10.1109/tsmcb.2012.2229269.
Manogaran, G., Thota, C., Lopez, D., Vijayakumar, V., Abbas, K. M., & Sundarsekar, R. (2017). Big data knowledge system in healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 133–157). Springer.
Salehi, S., Selamat, A., & Bostanian, M. (2011). Enhanced genetic algorithm for spam detection in email. In 2011 IEEE 2nd international conference on software engineering and service science. https://doi.org/10.1109/icsess.2011.5982390.
Rawal, B. S., Vijayakumar, V., Manogaran, G., Varatharajan, R., & Chilamkurti, N. (2018). Secure disintegration protocol for privacy preserving cloud storage. Wireless Personal Communications. https://doi.org/10.1007/s11277-018-5284-6.
Fukuyama, Y. (2008). Fundamentals of particle swarm optimization techniques. Modern Heuristic Optimization Techniques. https://doi.org/10.1002/9780470225868.ch4.
Modern Heuristic Optimization Techniques (2008). https://doi.org/10.1002/9780470225868.
Yang, C., Harkreader, R., Zhang, J., Shin, S., & Gu, G. (2012). Analyzing spammers social networks for fun and profit. In Proceedings of the 21st international conference on World Wide Web—WWW 12. https://doi.org/10.1145/2187836.2187847.
Balan, E. V., Priyan, M. K., & Devi, G. U. (2015, April). Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In 2015 international conference on communications and signal processing (ICCSP) (pp. 0185–0189). IEEE.
DON’T FOLLOW ME—Spam Detection in Twitter. (2010). Proceedings of the international conference on security and cryptography. https://doi.org/10.5220/0002996201420151.
Bhat, S. Y., & Abulaish, M. (2013). Community-based features for identifying spammers in online social networks. In Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining—ASONAM 13. https://doi.org/10.1145/2492517.2492567.
Varatharajan, R., Vasanth, K., Gunasekaran, M., Priyan, M., & Gao, X. Z. (2017). An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Computers & Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2017.05.035.
Song, J., Lee, S., & Kim, J. (2011). Spam filtering in Twitter using sender-receiver relationship. Lecture Notes in Computer Science Recent Advances in Intrusion Detection. https://doi.org/10.1007/978-3-642-23644-0_16.
Varatharajan, R., Manogaran, G., Priyan, M. K., & Sundarasekar, R. (2017). Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Cluster Computing. https://doi.org/10.1007/s10586-017-0977-2.
Thomas, K., Grier, C., Ma, J., Paxson, V., & Song, D. (2011). Design and evaluation of a real-time URL spam filtering service. In 2011 IEEE symposium on security and privacy. https://doi.org/10.1109/sp.2011.25.
Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for IoT and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141–154). IGI Global.
Manogaran, G., Vijayakumar, V., Varatharajan, R., Kumar, P. M., Sundarasekar, R., & Hsu, C. H. (2017). Machine learning based big data processing framework for cancer diagnosis using hidden Markov model and GM clustering. Wireless Personal Communications. https://doi.org/10.1007/s11277-017-5044-z.
Twitter. “Tweet structure” (2015). [Online] https://dev.twitter.com/docs/platform-objects/tweets.
Zhang, X., Zhu, S., & Liang, W. (2012). Detecting spam and promoting campaigns in the Twitter Social Network. In 2012 IEEE 12th international conference on data mining. https://doi.org/10.1109/icdm.2012.28.
Chen, C., Zhang, J., Chen, X., Xiang, Y., & Zhou, W. (2015). 6 million spam tweets: A large ground truth for timely Twitter spam detection. In 2015 IEEE international conference on communications (ICC). https://doi.org/10.1109/icc.2015.7249453.
Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., & Zhao, B. Y. (2010). Detecting and characterizing social spam campaigns. In Proceedings of the 17th ACM conference on Computer and communications security—CCS 10. https://doi.org/10.1145/1866307.1866396.
Devi, G. U., Balan, E. V., Priyan, M. K., & Gokulnath, C. (2015). Mutual authentication scheme for IoT application. Indian Journal of Science and Technology, 8(26).
Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on twitter. In Proceedings of the 20th international conference on world wide web—WWW 11. https://doi.org/10.1145/1963405.1963500.
Kumar, P. M., & Gandhi, U. D. (2017). A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Computers & Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2017.09.001.
Varatharajan, R., Manogaran, G., & Priyan, M. K. (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-017-5318-1.
Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C. (2017). A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.10.045.
Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y., & Guan, Y. (2013). Network traffic classification using correlation information. IEEE Transactions on Parallel and Distributed Systems, 24(1), 104–117. https://doi.org/10.1109/tpds.2012.98.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Senthil Murugan, N., Usha Devi, G. Detecting Streaming of Twitter Spam Using Hybrid Method. Wireless Pers Commun 103, 1353–1374 (2018). https://doi.org/10.1007/s11277-018-5513-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5513-z