Skip to main content

Detecting Suspicious Users in Social Networks Using Text Analysis

  • Conference paper
  • First Online:
  • 1174 Accesses

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 141))

Abstract

Twitter is a social networking platform that allows the users to discuss current news, recent trends, facts, and much more. Meanwhile, due to this, popularity also becomes the target for suspicious users to perform spamming activities via their posts or messages. It is true that social media entice as mechanisms to ease the spread of current news, hate, etc. and allow users to discuss their views by posting tweets as their post, but these services create an opportunity for the attacker to do some dishonest activity. Malicious users mostly post tweets having such topics that may attract us to read, based on some news, but in between, the tweet they usually muddled URL that lead users to entirely unrelated websites or suspicious profiles. This paper examines the text for a suspicious user using profile-based extraction of tweet data based on content as well as features-based attributes. This will help in the analysis of text having with some suspicious activity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cleary, G., Cox, O., Lau H., Chandrasekar, K.: Internet security threat report. Symantec Corporation World Headquarters, United Stated of America, ISTR 22 (2017)

    Google Scholar 

  2. Harisson, R.: Statista 4, 112–115 (2012)

    Google Scholar 

  3. Goodin, D.: Mystery attack drop avalance of malicious messages on Twitter. Ars technica (2014)

    Google Scholar 

  4. Magno, G., Rodrigues, T., & Almeida, V., Benevenuto, F.: Detecting spammers on twitter. In: CEAS 2010, Belo Horizonte, Brazil (2010)

    Google Scholar 

  5. Sophos.: Facebook id probe (2008)

    Google Scholar 

  6. Wang, A.H.: Don’t follow me: spam detection in Twitter. In: IEEE 2010 International Conference on Security and Cryptography (SECRYPT), Athens, Greece (2011)

    Google Scholar 

  7. Chuah, M., Mccord, M.: Spam detection on twitter using traditional classifiers. In: ATC’11, pp. 112–119. Banff, Canada (2011)

    Google Scholar 

  8. Wang, A.H.: Detecting spam bots in online social networking sites: a machine learning approach. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 335–342 (2010)

    Google Scholar 

  9. Daniel, M., Romero, D., Schoenebeck, G., Yardi, S.: Detecting spam in a twitter network. In: IEEE, vol. 5, pp. 1–4 (2010)

    Google Scholar 

  10. Grier, C., Ma, J., Paxson, V., Song, D., Thomas, K.: Design and evaluation of a real-time url spam filtering service. In: IEEE Symposium on Security and Privacy. IEEE, pp. 447–462 (2011)

    Google Scholar 

  11. Kim, J., Lee, S.: WarningBird: a near real-time detection system for suspicious urls in twitter stream. IEEE 10(3), 183–195 (2013)

    Google Scholar 

  12. Sheppard, J.W., Green, R.M.: Comparing frequency-and style-based features for twitter author identification. In: Twenty-Sixth International Florida Artificial Intelligence Research Society Conference. Association for the Advancement of Artificial, Florida (2013)

    Google Scholar 

  13. Hallé, S., Gagné, C., Baillargeon, S.: Stream clustering of tweets. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), San Francisco, CA, pp. 1256–1261 (2016)

    Google Scholar 

  14. Abbasi, A., Zeng, D., Zimbra, D.: The state-of-the-art in twitter sentiment analysis: a review and benchmark evaluation. ACM Trans. Manag. Inf. Syst. 2(10) (2018)

    Google Scholar 

  15. Lemercier, M., Birregah, B., Perez, C.: A dynamic approach to detecting suspicious profiles on social platforms. In: 2013 IEEE International Conference on Communications Workshops (ICC), Budapest, Hungary, pp. 1–4 (2013)

    Google Scholar 

  16. Zhang, J., Chen, X., Xiang, Y., Zhou, W., Chen, C.: 6 million spam tweets: a large ground truth for timely twitter spam detection. In: 2015 IEEE International Conference on Communications (ICC), London, UK, pp. 8–15 (2015)

    Google Scholar 

  17. Beqqali, O.E., Alami, S.: Detecting suspicious profiles using text analysis. J. Theor. Appl. Inf. Technol. 73(3) (2015)

    Google Scholar 

  18. Kumaraguru, P., Dewan, P.: Towards automatic real time identification of malicious posts on Facebook. In: Multiosn iiitd, Delhi, pp. 7–14 (2014)

    Google Scholar 

  19. Bennett, S.: On twitter, what’s the difference between a reply and a mention. Twitter Policies 3 (2013)

    Google Scholar 

  20. Gray, I.A.: Why you should not buy followers, USA, 17 (2017)

    Google Scholar 

  21. Jennifer Y.: Don’t let keyword stuffing kill your SEO. Here’s how to avoid it. Content Marketing, p. 2 (2018)

    Google Scholar 

Download references

Acknowledgements

First, I would like to thank everybody who assists me in writing this paper. Gratitude is owed to Associate Prof. Dr. Yogesh Kumar Meena who inspired and supported me. I would like to thank Springer for this wonderful opportunity.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nisha Kundu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kundu, N., Meena, Y.K. (2020). Detecting Suspicious Users in Social Networks Using Text Analysis. In: Somani, A.K., Shekhawat, R.S., Mundra, A., Srivastava, S., Verma, V.K. (eds) Smart Systems and IoT: Innovations in Computing. Smart Innovation, Systems and Technologies, vol 141. Springer, Singapore. https://doi.org/10.1007/978-981-13-8406-6_44

Download citation

Publish with us

Policies and ethics