Skip to main content

Advertisement

Log in

Detecting Streaming of Twitter Spam Using Hybrid Method

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Twitter, the social network which evolving faster and regular usage by millions of people and who become addicted to it. So spam playing a major role for Twitter users to distract them and grab their attention over them. Spammers actually detailed like who send unwanted and irrelevant messages or websites and promote them to several users. To overcome the problem many researchers proposed some ideas using some machine learning algorithms to detect the spammers. In this research work, a new hybrid approach is proposed to detect the streaming of Twitter spam in a real-time using the combination of a Decision tree, Particle Swarm Optimization and Genetic algorithm. Twitter has given access to the researchers to get tweets from its Twitter-API for real-time streaming of tweet data which they can get direct access to public tweets. Here 600 million tweets are created by using URL based security tool and further some features are extracted for representation of tweets in real-time detection of spam. In addition, our research results are compared with other hybrid algorithms which a better detection rate is given by our proposed work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Zhang, X., Zhu, S., & Liang, W. (2012). Detecting spam and promoting campaigns in the Twitter social network. In 2012 IEEE 12th international conference on data mining. https://doi.org/10.1109/icdm.2012.28.

  2. Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010) Detecting spammer on twitter. Presented at the 7th annual collaboration electronic messaging anti-abuse spam conference, Redmond, WA, USA, Jul. 2010.

  3. Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010). @spam. In Proceedings of the 17th ACM conference on Computer and communications security—CCS 10. https://doi.org/10.1145/1866307.1866311.

  4. Yardi, S., Romero, D., Schoenebeck, G., & Boyd, D. (2009). Detecting spam in a Twitter network. First Monday. https://doi.org/10.5210/fm.v15i1.2793.

    Article  Google Scholar 

  5. Bohacik, J., Fuchs, A., & Benedikovic, M. (2017). Detecting compromised accounts on the Pokec online social network. In 2017 international conference on information and digital technologies (IDT). https://doi.org/10.1109/dt.2017.8024272.

  6. Dasu, T., Krishnan, S., Venkatasubramanian, S., Yi, K. (2006) An information-theoretic approach to detecting changes inmulti-dimensional data streams. In Proceedings of symposium on interface statistics and computer science applications.

  7. Lee, S., & Kim, J. (2013). WarningBird: A near real-time detection system for suspicious URLs in Twitter stream. IEEE Transactions on Dependable and Secure Computing, 10(3), 183–195. https://doi.org/10.1109/tdsc.2013.3.

    Article  Google Scholar 

  8. Thonnard, O., Vervier, P., & Dacier, M. (2012). Spammers operations: A multifaceted strategic analysis. Security and Communication Networks, 9(4), 336–356. https://doi.org/10.1002/sec.640.

    Article  Google Scholar 

  9. Chen, C., Zhang, J., Xie, Y., Xiang, Y., Zhou, W., Hassan, M. M., et al. (2015). A Performance evaluation of machine learning-based streaming spam tweets detection. IEEE Transactions on Computational Social Systems, 2(3), 65–76. https://doi.org/10.1109/tcss.2016.2516039.

    Article  Google Scholar 

  10. Balan, E. V., Priyan, M. K., Gokulnath, C., & Devi, G. U. (2015). Fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 50, 109–114.

    Article  Google Scholar 

  11. Kumar, P. M., & Gandhi, U. D. (2017). Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application. The Journal of Supercomputing. https://doi.org/10.1007/s11227-017-2169-5.

    Article  Google Scholar 

  12. Hu, H., Chen, Y., & Tang, K. (2013). A novel decision-tree method for structured continuous-label classification. IEEE Transactions on Cybernetics, 43(6), 1734–1746. https://doi.org/10.1109/tsmcb.2012.2229269.

    Article  Google Scholar 

  13. Manogaran, G., Thota, C., Lopez, D., Vijayakumar, V., Abbas, K. M., & Sundarsekar, R. (2017). Big data knowledge system in healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 133–157). Springer.

  14. Salehi, S., Selamat, A., & Bostanian, M. (2011). Enhanced genetic algorithm for spam detection in email. In 2011 IEEE 2nd international conference on software engineering and service science. https://doi.org/10.1109/icsess.2011.5982390.

  15. Rawal, B. S., Vijayakumar, V., Manogaran, G., Varatharajan, R., & Chilamkurti, N. (2018). Secure disintegration protocol for privacy preserving cloud storage. Wireless Personal Communications. https://doi.org/10.1007/s11277-018-5284-6.

    Article  Google Scholar 

  16. Fukuyama, Y. (2008). Fundamentals of particle swarm optimization techniques. Modern Heuristic Optimization Techniques. https://doi.org/10.1002/9780470225868.ch4.

    Article  Google Scholar 

  17. Modern Heuristic Optimization Techniques (2008). https://doi.org/10.1002/9780470225868.

    Google Scholar 

  18. Yang, C., Harkreader, R., Zhang, J., Shin, S., & Gu, G. (2012). Analyzing spammers social networks for fun and profit. In Proceedings of the 21st international conference on World Wide Web—WWW 12. https://doi.org/10.1145/2187836.2187847.

  19. Balan, E. V., Priyan, M. K., & Devi, G. U. (2015, April). Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In 2015 international conference on communications and signal processing (ICCSP) (pp. 0185–0189). IEEE.

  20. DON’T FOLLOW ME—Spam Detection in Twitter. (2010). Proceedings of the international conference on security and cryptography. https://doi.org/10.5220/0002996201420151.

  21. Bhat, S. Y., & Abulaish, M. (2013). Community-based features for identifying spammers in online social networks. In Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining—ASONAM 13. https://doi.org/10.1145/2492517.2492567.

  22. Varatharajan, R., Vasanth, K., Gunasekaran, M., Priyan, M., & Gao, X. Z. (2017). An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Computers & Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2017.05.035.

    Article  Google Scholar 

  23. Song, J., Lee, S., & Kim, J. (2011). Spam filtering in Twitter using sender-receiver relationship. Lecture Notes in Computer Science Recent Advances in Intrusion Detection. https://doi.org/10.1007/978-3-642-23644-0_16.

    Article  Google Scholar 

  24. Varatharajan, R., Manogaran, G., Priyan, M. K., & Sundarasekar, R. (2017). Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Cluster Computing. https://doi.org/10.1007/s10586-017-0977-2.

    Article  Google Scholar 

  25. Thomas, K., Grier, C., Ma, J., Paxson, V., & Song, D. (2011). Design and evaluation of a real-time URL spam filtering service. In  2011 IEEE symposium on security and privacy. https://doi.org/10.1109/sp.2011.25.

  26. Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for IoT and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141–154). IGI Global.

  27. Manogaran, G., Vijayakumar, V., Varatharajan, R., Kumar, P. M., Sundarasekar, R., & Hsu, C. H. (2017). Machine learning based big data processing framework for cancer diagnosis using hidden Markov model and GM clustering. Wireless Personal Communications. https://doi.org/10.1007/s11277-017-5044-z.

    Article  Google Scholar 

  28. Twitter. “Tweet structure” (2015). [Online] https://dev.twitter.com/docs/platform-objects/tweets.

  29. Zhang, X., Zhu, S., & Liang, W. (2012). Detecting spam and promoting campaigns in the Twitter Social Network. In 2012 IEEE 12th international conference on data mining. https://doi.org/10.1109/icdm.2012.28.

  30. Chen, C., Zhang, J., Chen, X., Xiang, Y., & Zhou, W. (2015). 6 million spam tweets: A large ground truth for timely Twitter spam detection. In 2015 IEEE international conference on communications (ICC). https://doi.org/10.1109/icc.2015.7249453.

  31. Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., & Zhao, B. Y. (2010). Detecting and characterizing social spam campaigns. In Proceedings of the 17th ACM conference on Computer and communications security—CCS 10. https://doi.org/10.1145/1866307.1866396.

  32. Devi, G. U., Balan, E. V., Priyan, M. K., & Gokulnath, C. (2015). Mutual authentication scheme for IoT application. Indian Journal of Science and Technology8(26).

  33. Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on twitter. In Proceedings of the 20th international conference on world wide web—WWW 11. https://doi.org/10.1145/1963405.1963500.

  34. Kumar, P. M., & Gandhi, U. D. (2017). A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Computers & Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2017.09.001.

    Article  Google Scholar 

  35. Varatharajan, R., Manogaran, G., & Priyan, M. K. (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-017-5318-1.

    Article  Google Scholar 

  36. Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C. (2017). A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.10.045.

    Article  Google Scholar 

  37. Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y., & Guan, Y. (2013). Network traffic classification using correlation information. IEEE Transactions on Parallel and Distributed Systems, 24(1), 104–117. https://doi.org/10.1109/tpds.2012.98.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Senthil Murugan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Senthil Murugan, N., Usha Devi, G. Detecting Streaming of Twitter Spam Using Hybrid Method. Wireless Pers Commun 103, 1353–1374 (2018). https://doi.org/10.1007/s11277-018-5513-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5513-z

Keywords

Navigation