CFP last date
22 April 2024
Reseach Article

An Effective Technique to Identify Anomalous Accounts on Social Networks using Bloom Filter

by Sarbjeet Kaur, Prabhjot Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 11
Year of Publication: 2017
Authors: Sarbjeet Kaur, Prabhjot Kaur
10.5120/ijca2017913732

Sarbjeet Kaur, Prabhjot Kaur . An Effective Technique to Identify Anomalous Accounts on Social Networks using Bloom Filter. International Journal of Computer Applications. 164, 11 ( Apr 2017), 38-41. DOI=10.5120/ijca2017913732

@article{ 10.5120/ijca2017913732,
author = { Sarbjeet Kaur, Prabhjot Kaur },
title = { An Effective Technique to Identify Anomalous Accounts on Social Networks using Bloom Filter },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 11 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 38-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number11/27530-2017913732/ },
doi = { 10.5120/ijca2017913732 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:11:05.089419+05:30
%A Sarbjeet Kaur
%A Prabhjot Kaur
%T An Effective Technique to Identify Anomalous Accounts on Social Networks using Bloom Filter
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 11
%P 38-41
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The anomaly detection is the technique which is applied to detect malicious activities from the social network data. The existing technique is based on to classify the Facebook accounts into three classes which are fake, genuine and moderate. To increase accuracy of account classification is increased when bloom filter is being applied in the algorithm. The bloom filter is the algorithm which learns from the previous experiences and drive new values. When the bloom filter is applied the accounts are classified into two classes. The simulation is being performed in MATLAB and it is being analyzed that accuracy is increased and execution time is reduced.

References
  1. AbdolazimRezaei, ZarinahMohdKasirun, Vala Ali Rohani, TourajKhodadadi,” Anomaly Detection in Online Social Networks Using Structure-Based Technique”, The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
  2. Shota Saito, RyotaTomioka, Kenji Yamanishi,” Early detection of persistent topics in social networks”, 2015, Soc. Netw. Anal. Min, pp. 5:19
  3. Anita Zakrzewska and David A. Bader,” A Dynamic Algorithm for Local Community Detection in Graphs”, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
  4. Renjun Hu, Charu C. Aggarwal, Shuai Ma, and Jinpeng Huai,” An Embedding Approach to Anomaly Detection”, 2016, IEEE
  5. Ravneet Kaur, Sarbjeet Singh,” Detecting Anomalies in Online Social Networks using Graph Metrics”, 2015, IEEE
  6. P. Kayalvizhi, C. AnoorSelvi,” Detecting Dynamic Topics in Social Network Using Citation based Anomaly Detection”, 2015, IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)
  7. Evangelos E. Papalexakis, Alex Beutel, Peter Steenkiste,” Network Anomaly Detection using Co-clustering”, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
  8. Weiling Chen, Chai Kiat Yeo, Chiew Tong Lau, Bu Sung Lee,” Behavior Deviation: An Anomaly Detection View of Rumor Preemption”, 2016, IEEE
  9. Cuneyt Gurcan Akcora, Barbara Carminati, Elena Ferrari, Murat Kantarcioglu,” Detecting anomalies in social network data consumption”, 2014, Soc. Network Analysis Min
  10. Hamid Alipour, Youssif B. Al-Nashif, Pratik Satam and Salim Hariri,” Wireless Anomaly Detection based on IEEE 802.11 Behavior Analysis”, 2015, IEEE
  11. Flora Amato, Giovanni Cozzolino, Antonino Mazzeo and Sara Romano,” Detecting anomalies inTwitter stream for public security issues”, 2016, IEEE
  12. William Eberle, Lawrence Holder,” Streaming Data Analytics for Anomalies in Graphs”, 2015, IEEE
  13. David Savage, Xiuzhen Jenny Zhang, Xinghuo Yu, Qingmai Wang,” Anomaly Detection in Online Social Networks”, 2014, Social Networks, Volume 39, pp. 62-70, ISSN: 0378-8733
  14. Shahabeddin Geravand, Mahmood Ahmadi“Bloom filter application in network security: A-state-of-the-art-of-survey” 2013 Elsevier journal, computer networks, ScienceDirect.
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly Analysis Classification.