Abstract
Twitter is a social networking platform that allows the users to discuss current news, recent trends, facts, and much more. Meanwhile, due to this, popularity also becomes the target for suspicious users to perform spamming activities via their posts or messages. It is true that social media entice as mechanisms to ease the spread of current news, hate, etc. and allow users to discuss their views by posting tweets as their post, but these services create an opportunity for the attacker to do some dishonest activity. Malicious users mostly post tweets having such topics that may attract us to read, based on some news, but in between, the tweet they usually muddled URL that lead users to entirely unrelated websites or suspicious profiles. This paper examines the text for a suspicious user using profile-based extraction of tweet data based on content as well as features-based attributes. This will help in the analysis of text having with some suspicious activity.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cleary, G., Cox, O., Lau H., Chandrasekar, K.: Internet security threat report. Symantec Corporation World Headquarters, United Stated of America, ISTR 22 (2017)
Harisson, R.: Statista 4, 112–115 (2012)
Goodin, D.: Mystery attack drop avalance of malicious messages on Twitter. Ars technica (2014)
Magno, G., Rodrigues, T., & Almeida, V., Benevenuto, F.: Detecting spammers on twitter. In: CEAS 2010, Belo Horizonte, Brazil (2010)
Sophos.: Facebook id probe (2008)
Wang, A.H.: Don’t follow me: spam detection in Twitter. In: IEEE 2010 International Conference on Security and Cryptography (SECRYPT), Athens, Greece (2011)
Chuah, M., Mccord, M.: Spam detection on twitter using traditional classifiers. In: ATC’11, pp. 112–119. Banff, Canada (2011)
Wang, A.H.: Detecting spam bots in online social networking sites: a machine learning approach. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 335–342 (2010)
Daniel, M., Romero, D., Schoenebeck, G., Yardi, S.: Detecting spam in a twitter network. In: IEEE, vol. 5, pp. 1–4 (2010)
Grier, C., Ma, J., Paxson, V., Song, D., Thomas, K.: Design and evaluation of a real-time url spam filtering service. In: IEEE Symposium on Security and Privacy. IEEE, pp. 447–462 (2011)
Kim, J., Lee, S.: WarningBird: a near real-time detection system for suspicious urls in twitter stream. IEEE 10(3), 183–195 (2013)
Sheppard, J.W., Green, R.M.: Comparing frequency-and style-based features for twitter author identification. In: Twenty-Sixth International Florida Artificial Intelligence Research Society Conference. Association for the Advancement of Artificial, Florida (2013)
Hallé, S., Gagné, C., Baillargeon, S.: Stream clustering of tweets. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), San Francisco, CA, pp. 1256–1261 (2016)
Abbasi, A., Zeng, D., Zimbra, D.: The state-of-the-art in twitter sentiment analysis: a review and benchmark evaluation. ACM Trans. Manag. Inf. Syst. 2(10) (2018)
Lemercier, M., Birregah, B., Perez, C.: A dynamic approach to detecting suspicious profiles on social platforms. In: 2013 IEEE International Conference on Communications Workshops (ICC), Budapest, Hungary, pp. 1–4 (2013)
Zhang, J., Chen, X., Xiang, Y., Zhou, W., Chen, C.: 6 million spam tweets: a large ground truth for timely twitter spam detection. In: 2015 IEEE International Conference on Communications (ICC), London, UK, pp. 8–15 (2015)
Beqqali, O.E., Alami, S.: Detecting suspicious profiles using text analysis. J. Theor. Appl. Inf. Technol. 73(3) (2015)
Kumaraguru, P., Dewan, P.: Towards automatic real time identification of malicious posts on Facebook. In: Multiosn iiitd, Delhi, pp. 7–14 (2014)
Bennett, S.: On twitter, what’s the difference between a reply and a mention. Twitter Policies 3 (2013)
Gray, I.A.: Why you should not buy followers, USA, 17 (2017)
Jennifer Y.: Don’t let keyword stuffing kill your SEO. Here’s how to avoid it. Content Marketing, p. 2 (2018)
Acknowledgements
First, I would like to thank everybody who assists me in writing this paper. Gratitude is owed to Associate Prof. Dr. Yogesh Kumar Meena who inspired and supported me. I would like to thank Springer for this wonderful opportunity.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kundu, N., Meena, Y.K. (2020). Detecting Suspicious Users in Social Networks Using Text Analysis. In: Somani, A.K., Shekhawat, R.S., Mundra, A., Srivastava, S., Verma, V.K. (eds) Smart Systems and IoT: Innovations in Computing. Smart Innovation, Systems and Technologies, vol 141. Springer, Singapore. https://doi.org/10.1007/978-981-13-8406-6_44
Download citation
DOI: https://doi.org/10.1007/978-981-13-8406-6_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8405-9
Online ISBN: 978-981-13-8406-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)