CFP last date
22 April 2024
Reseach Article

Techniques to Detect Spammers in Twitter- A Survey

by Monika Verma, Divya, Sanjeev Sofat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 10
Year of Publication: 2014
Authors: Monika Verma, Divya, Sanjeev Sofat
10.5120/14877-3279

Monika Verma, Divya, Sanjeev Sofat . Techniques to Detect Spammers in Twitter- A Survey. International Journal of Computer Applications. 85, 10 ( January 2014), 27-32. DOI=10.5120/14877-3279

@article{ 10.5120/14877-3279,
author = { Monika Verma, Divya, Sanjeev Sofat },
title = { Techniques to Detect Spammers in Twitter- A Survey },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 10 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number10/14877-3279/ },
doi = { 10.5120/14877-3279 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:02:05.981348+05:30
%A Monika Verma
%A Divya
%A Sanjeev Sofat
%T Techniques to Detect Spammers in Twitter- A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 10
%P 27-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid growth of social networking sites for communicating, sharing, storing and managing significant information, it is attracting cybercriminals who misuse the Web to exploit vulnerabilities for their illicit benefits. Forged online accounts crack up every day. Impersonators, phishers, scammers and spammers crop up all the time in Online Social Networks (OSNs), and are harder to identify. Spammers are the users who send unsolicited messages to a large audience with the intention of advertising some product or to lure victims to click on malicious links or infecting user's system just for the purpose of making money. A lot of research has been done to detect spam profiles in OSNs. In this paper we have reviewed the existing techniques for detecting spam users in Twitter social network. Features for the detection of spammers could be user based or content based or both. Current study provides an overview of the methods, features used, detection rate and their limitations (if any) for detecting spam profiles mainly in Twitter.

References
  1. Alex Hai Wang, Security and Cryptography (SECRYPT), Don't Follow Me: Spam Detection in Twitter, Proceedings of the 2010 International Conference, Pages 1-10, 26-28 July 2010, IEEE.
  2. Amit A. Amleshwaram, Narasimha Reddy, Sandeep Yadav, Guofei Gu, Chao Yang, CATS: Characterizing Automation of Twitter Spammers, Texas A&M University, 2013, IEEE.
  3. Anshu Malhotra, Luam Totti, Wagner Meira Jr. , Ponnurangam Kumaraguru, Virg?lio Almeida, Studying User Footprints in Different Online Social Networks ,International Conference on Advances in Social Networks Analysis and Mining, 2012, IEEE/ACM.
  4. Ayon Chakraborty, Jyotirmoy Sundi, Som Satapathy, SPAM: A Framework for Social Profile Abuse Monitoring.
  5. Boyd, Ellison, N. B. (2007), Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication, 13(1), article 11, http://jcmc. indiana. edu/vol13/issue1/boyd. ellison. html
  6. Chao Yang, Robert Chandler Harkreader, Guofei Gu , Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers, RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection, Pages 318-337, 2011, Springer-Verlag Berlin, Heidelberg, ACM
  7. Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida, Detecting Spammers on Twitter, CEAS 2010 Seventh annual Collaboration, Electronic messaging, Anti Abuse and Spam Conference, July 2010, Washington, US.
  8. Fact Sheet 35: Social Networking Privacy: How to be Safe, Secure and Social
  9. Faraz Ahmed, Muhammad Abulaish, SMIEEE, An MCL-Based Approach for Spam Profile Detection in Online Social Networks, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
  10. Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis and Evangelos P. Markatos, Detecting Social Network Profile Cloning, 3rd International Workshop on Security and Social Networking, 2011, IEEE.
  11. Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna, Detecting Spammers on Social Networks, University of California, Santa Barbara, Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, Austin, Texas USA, pages 1-9, Dec. 6-10, 2010, ACM.
  12. Grace gee, Hakson Teh, Twitter Spammer Profile Detection, 2010.
  13. http://about-threats. trendmicro. com/us/webattack-Information regarding Twitter threats.
  14. http://en. wikipedia. org/wiki/Twitter-Information of Twitter.
  15. http://expandedramblings. com/index. php/march-2013-by-the-numbers-a-few-amazing-twitter-stats-Regarding statistics of Twitter.
  16. http://help. twitter. com/forums/26257/entries/1831- The Twitter Rules.
  17. http://twittnotes. com/2009/03/, 2000-following-limit-on-twitter. html-The 2000 Following Limit Policy on Twitter.
  18. http://www. spamhaus. org/consumer/definition-Spam Definition.
  19. J. Baltazar, J. Costoya, and R. Flores, "The real face of koobface: Thelargest web 2. 0 botnet explained," Trend Micro Threat Research , 2009.
  20. J. Douceur, "The sybil attack," Peer-to-peer Systems, pp. 251–260, 2002.
  21. D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu, "Reverse socialengineering attacks in online social networks," Detection of Intrusionsand Malware, and Vulnerability Assessment , pp. 55–74, 2011.
  22. Jonghyuk Song, Sangho Lee and Jong Kim, Spam Filtering in Twitter using Sender-Receiver Relationship, RAID'11 Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, vol. 6961, Pages 301-317, 2011, Springer, Heidelberg ACM.
  23. Kyumin Lee, James Caverlee, Steve Webb, Uncovering Social Spammers: Social Honeypots + Machine Learning, Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval, 2010, Pages 435–442, ACM, New York (2010).
  24. Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda, All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks, International World Wide Web Conference Committee (IW3C2), WWW 2009, April 20–24, 2009, Madrid, Spain, ACM
  25. M. McCord, M. Chuah, Spam Detection on Twitter Using Traditional Classifiers, ATC'11, Banff, Canada, Sept 2-4, 2011, IEEE.
  26. Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna, COMPA: Detecting Compromised Accounts on Social Networks.
  27. Marcel Flores, Aleksandar Kuzmanovic, Searching for Spam: Detecting Fraudulent Accounts via Web Search, LNCS 7799, pp. 208–217, 2013. Springer-Verlag Berlin Heidelberg 2013.
  28. Mauro Conti, Radha Poovendran, Marco Secchiero, FakeBook: Detecting Fake Profiles in On-line Social Networks, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2012.
  29. Po-Ching Lin, Po-Min Huang, A Study of Effective Features for Detecting Long-surviving Twitter Spam Accounts, Advanced Communication Technology (ICACT), 15th International Conference on 27-30 Jan. 2013, IEEE.
  30. Sangho Lee and Jong Kimz, WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream, 19th Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 5-8, 2012.
  31. T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer, "Social phishing," Communications of the ACM , vol. 50, no. 10, pp. 94–100, 2007.
  32. Vijay A. Balasubramaniyan, Arjun Maheswaran, Viswanathan Mahalingam, Mustaque Ahamad, H. Venkateswaran, A Crow or a Blackbird? Using True Social Network and Tweeting Behavior to Detect Malicious Entities in Twitter, 2002, ACM
  33. Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, "The socialbotnetwork: when bots socialize for fame and money," in Proceedings of the 27th Annual Computer Security Applications Conference. ACM,2011, pp. 93–102.
  34. Yin Zhuy, Xiao Wang, Erheng Zhong, Nanthan N. Liuy, He Li, Qiang Yang, Discovering Spammers in Social Networks, Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence.
  35. Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai, Uncovering Social Network Sybils in the Wild, Proceedings of the 11th ACM/USENIX Internet Measurement Conference (IMC'11), 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Online Social Networks (OSNs) Twitter Spammers Legitimate users.