0% found this document useful (0 votes)
136 views2 pages

Spammer Detection and Fake User Identification On Social Networks

This paper reviews techniques for detecting spam and fake users on social networks like Twitter. It presents a taxonomy that classifies spam detection approaches based on their ability to identify fake content, spam based on URLs, spam in trending topics, and fake users. The techniques are also compared based on features like user features, content features, graph features, structure features, and time features. The study aims to provide researchers a useful resource on recent developments in Twitter spam detection.

Uploaded by

Mahesh Prabu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views2 pages

Spammer Detection and Fake User Identification On Social Networks

This paper reviews techniques for detecting spam and fake users on social networks like Twitter. It presents a taxonomy that classifies spam detection approaches based on their ability to identify fake content, spam based on URLs, spam in trending topics, and fake users. The techniques are also compared based on features like user features, content features, graph features, structure features, and time features. The study aims to provide researchers a useful resource on recent developments in Twitter spam detection.

Uploaded by

Mahesh Prabu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Spammer Detection and Fake User

Identification on Social Networks


ABSTRACT:
Social networking sites engage millions of users around the world. The users’ interactions with these
social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable
repercussions for daily life. The prominent social networking sites have turned into a target platform
for the spammers to disperse a huge amount of irrelevant and deleterious information. Twitter, for
example, has become one of the most extravagantly used platforms of all times and therefore allows
an unreasonable amount of spam. Fake users send undesired tweets to users to promote services or
websites that not only affect legitimate users but also disrupt resource consumption. Moreover, the
possibility of expanding invalid information to users through fake identities has increased that results
in the unrolling of harmful content. Recently, the detection of spammers and identification of fake
users on Twitter has become a common area of research in contemporary online social Networks
(OSNs). In this paper, we perform a review of techniques used for detecting spammers on Twitter.
Moreover, a taxonomy of the Twitter spam detection approaches is presented that classifies the
techniques based on their ability to detect: (i) fake content, (ii) spam based on URL, (iii) spam in
trending topics, and (iv) fake users. The presented techniques are also compared based on various
features, such as user features, content features, graph features, structure features, and time
features. We are hopeful that the presented study will be a useful resource for researchers to find the
highlights of recent developments in Twitter spam detection on a single platform.

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language :
 Tool : Netbeans 7.2.1
 Database : MYSQL
REFERENCE:
FAIZA MASOOD1, GHANA AMMAD1, AHMAD ALMOGREN 2, (Senior Member, IEEE),ASSAD ABBAS 1,
HASAN ALI KHATTAK 1, (Senior Member, IEEE),IKRAM UD DIN 3, (Senior Member, IEEE),MOHSEN
GUIZANI 4, (Fellow, IEEE),AND MANSOUR ZUAIR5, “Spammer Detection and Fake User
Identificationon Social Networks”, IEEE Access, 2019.

You might also like