Skip to main content

Advertisement

Log in

Effective Filtering of Unsolicited Messages from Online Social Networks Using Spam Templates and Social Contexts

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Online social networking sites have shown an unbelievable widening in the last decade. Spammers utilise social networking sites to unroll spam messages due to its fame and use various procedures to spread spam. Consequently, the identification of spam must be well fortified enough to detect unsolicited messages and deter spammers. Though various spam identification procedures are obtainable, to improve the accuracy for spam identification is inevitable. In this work, a method to detect unsolicited messages is proposed to recognise and avert spam messages. The social context parameters such as trust and strength as well as spam template matching are also considered along with basic classifiers for effective spam classification. The intercommunication factors between the users are used for strength calculation. Spam template generation is performed based on the majority merge operation on the spam messages during the training time, and spam templates comparison is performed with the incoming messages during the testing time. Trust value updation is performed after the message classification. Experimental results demonstrate that the proposed model with SVM-Polynomial Radial Basis kernel which provides better accuracy in spam classification and outperforms all the state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Wang, D., & Pu, C. (2015). BEAN: A behaviour analysis approach of url spam filtering in twitter. In Proceedings of the IEEE international conference on information reuse and integration, San Francisco (pp. 403–410).

  2. Chao, C., Jun, Z., Yi, X., Yang, X., Wanlei, Z., Mohammad, M. H., et al. (2015). A performance evaluation of machine learning based streaming spam tweets detection. IEEE Transactions on Computational Social Systems,2, 65–76.

    Article  Google Scholar 

  3. Jong, M. K, Zae, K., & Kwangjo, K. (2016). An approach to spam comment detection through domain-independent features. In Proceedings of the IEEE international conference on big data and smart computing (pp. 273–276).

  4. Injadat, M., Salo, F., & Nassif, A. B. (2016). Data mining techniques in social media: A survey. Elsevier Journal on Neurocomputing,214, 654–670.

    Article  Google Scholar 

  5. Kaur, R., & Singh, S. (2016). A survey of data mining and social network analysis based anomaly detection techniques. Journal of Egyptian Informatics,17(2), 199–216.

    Article  Google Scholar 

  6. Chakraborty, M., Pal, S., Chowdary, C. R., & Pramanik, R. (2016). Recent developments in social spam detection and combating techniques. International journal on Information Processing and Management,52, 1053–1073.

    Article  Google Scholar 

  7. Yin, R., Wang, H. & Liu, L. (2015). Research of integrated algorithm: Establishment of spam detection system. In Proceedings of the IEEE conference on computer science and network technology (pp. 584–589).

  8. Fernandes, M. A., Patel, P., & Marwala T. (2015). Automated detection of human users in twitter. In Proceedings of the INNS conference on big data (pp. 224–231).

  9. Cresci, S., Petrocchi, M., Spagnardi, A., Tesconi, M., & Pierto, R. (2015). Fame for sale: Efficient detection of fake twitter followers. Elsevier Journal on Decision Support Systems,80, 56–71.

    Article  Google Scholar 

  10. Zhu, T., Gao, H., Yang, Y., Bu, K., Chen, Y., Downey, D., et al. (2016). Beating the artificial chaos: Fighting OSN spam using its own templates. IEEE/ACM Transactions on Networking,24, 3856–3869.

    Article  Google Scholar 

  11. Fangzhao, W., Jinyun, S., Yongfeng, H., & Zhigang, Y. (2016). Co-detecting social spammers and spam messages in microblogging via exploiting social contexts. Elsevier Journal on Neurocomputing,201, 51–65.

    Article  Google Scholar 

  12. Jeong, S., Noh, G., Kim, C., & Oh, H. (2016). Follow spam detection based on cascaded social information. Elsevier Journal on Information Sciences,369, 481–499.

    Article  Google Scholar 

  13. Vanetti, M., Binaghi, E., Ferrari, E., Carminati, B., & Carullo, M. (2013). A system to filter unwanted messages from OSN user walls. IEEE Transactions on Knowledge and Data Engineering,25, 285–297.

    Article  Google Scholar 

  14. Sunil, B., Tareek, R., & Pattewar M. (2015). Content based spam detection in email using bayesian classifier. In Proceedings of the IEEE conference on communications and signal processing (pp. 1257–1261).

  15. Hua, J. I., & Huaxiang, Z. (2015). Analysis on the content features and their correlation of web pages for spam detection. IEEE on China Communications,12, 84–94.

    Google Scholar 

  16. Ashraf, A., Zanaty, E. A., & Ghoniemy, S. (2013). Improving the classification accuracy using SVM (SVMs) with new kernel. Journal of Global Research in Computer Science,4, 1–7.

    Google Scholar 

  17. Zhang, K., Liang, X., Lu, R., & Shen, X. (2015). PIF: A personalized fine grained spam filtering scheme with privacy preservation in mobile social networks. IEEE Transactions on Computational Social Systems,2, 41–52.

    Article  Google Scholar 

  18. Chenwei, L., Jiawei, W., & Kai, L. (2016). Detecting spam comments posted in micro-blogs using self-extensible spam dictionary. In Proceedings of the IEEE international conference on communications (ICC), Kuala Lumpur (pp. 1–7).

  19. Aboli, S. V., & Rupa, A. F. (2016). Automated content based short text classification for filtering undesired posts on facebook. In Proceedings of the IEEE world conference on futuristic trends in research and innovation for social welfare (Startup Conclave), Coimbatore (pp. 1–5).

  20. Gao, L., Zhou, S., & Guan, J. (2015). Effectively classifying short texts by sparse representation with dictionary filtering. Elsevier Journal on Information Sciences,323, 130–142.

    Article  MathSciNet  Google Scholar 

  21. Massa, P., Souren, K., Salvetti, M., & Tomasoni D. (2008). Trustlet, open research on trust metrics. In Proceedings of the workshop on social aspects of the web (pp. 31–43).

  22. Jiang, W., Wu, J., Li, F., Wang, G., & Zheng, H. (2016). Trust evaluation in OSN using generalized network flow. IEEE Transactions on Computers,65, 952–963.

    Article  MathSciNet  Google Scholar 

  23. Shen, X., Long, H., & Ma, C. (2015). Incorporating trust relationships in collaborative filtering recommender system. In Proceedings of the IEEE/ACIS conference on software engineering (pp. 1–8).

  24. Cheng, Y., Park, J., & Sandhu, R. (2016). An access control model for OSN using user-to-user relationships. IEEE Transactions on Dependable and Secure Computing,13, 424–436.

    Article  Google Scholar 

  25. Aliaksandr Barushka & Petr Hajek. (2018). Spam filtering using integrated distribution-based balancing approach and regularized deep neural networks. Springer Journal on Applied Intelligence,48, 3538–3556.

    Article  Google Scholar 

  26. Deng, X., Li, Y., Wen, J., & Zhang, J. (2018). Feature selection for text classification: A review. Springer Journal on Multimedia Tools and Applications,78(3), 3797–3816.

    Article  Google Scholar 

  27. Kiliroor, C. C., & Valliyammai, C. (2018). Social context based Naive Bayes filtering of spam messages from online social networks. Proceedings of Springer Conference on Soft Computing in Data Analytics, AISC,758, 699–706.

    Article  Google Scholar 

Download references

Acknowledgements

This work is financially supported by Grants provided by the Visvesvaraya Ph.D. scheme for Electronics and IT.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Valliyammai.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Valliyammai, C., Kiliroor, C.C. Effective Filtering of Unsolicited Messages from Online Social Networks Using Spam Templates and Social Contexts. Wireless Pers Commun 113, 519–536 (2020). https://doi.org/10.1007/s11277-020-07228-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07228-y

Keywords

Navigation