Suspicious behaviour detection in multilayer social networks using PF-KMA and SS-GAE techniques

被引:0
|
作者
Sandeep, B. L. [1 ]
Siddesh, G. M. [2 ]
Naresh, E. [3 ]
机构
[1] Visvesvaraya Technol Univ Belagavi, Ramaiah Inst Technol, Dept Informat Sci & Engn, Bangalore, India
[2] Visvesvaraya Technol Univ Belagavi, Ramaiah Inst Technol, Dept Artificial Intelligence & Data Sci, Bengaluru, India
[3] Manipal Acad Higher Educ, Manipal Inst Technol Bengaluru, Dept Informat Technol, Manipal, India
关键词
Exponential Distribution (ED) baser graph construction; Soft Sign based (SS) graph encoding; Pareto Front based (PF) clustering; Multi-layer social networks; Graph structural analysis;
D O I
10.1007/s13278-024-01265-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multilayer Social networks are an important part of human life to interact on different networks at the same time. Due to the openness of such networks, they become a platform for spammers to spread malicious behaviors. Hence, there is an urgent need for effective detection of malicious behaviors; thereby, enabling the networks to take mitigation actions to decrease the possibility to reward such activities. Detection of suspicious behaviors in previous works is challenging due to the problems of community detection, the large amount of feature corruption, and memory requirements. Thus, to deal with such problems, in this paper, an efficient clustering-based detection of malicious users in multilayer social networks is proposed. Initially, the input dataset is pre-processed and used for Exponential Distribution based Erd & odblac;s-R & eacute;nyi based graph construction. From the graph structure, two types of data, such as user representations and graph features are extracted for graph encoding using the Soft Sign activated Graph Auto Encoder model. Then, the decoding is done to predict the information diffusion level, thereby, ranking the users using the Laplace Regularization technique. Then, the ranked users are clustered into different groups using the Pareto Front based K-Means Clustering Algorithm technique. Finally, the experimental results were analyzed to demonstrate the efficacy of the proposed model to detect malicious users in multilayer social networks.
引用
收藏
页数:15
相关论文
共 10 条
  • [1] Research into the behaviour of minors and young people on social networks using Social Big Data techniques
    Suarez-Alvarez, Rebeca
    Garcia-Jimenez, Antonio
    DOXA COMUNICACION, 2021, (32):
  • [2] Fake News Detection in Social Networks Using Data Mining Techniques
    Alquran, Hebah
    Banitaan, Shadi
    2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 155 - 160
  • [3] Fake news detection on social networks using Machine learning techniques
    Raja, M. Senthil
    Raj, L. Arun
    MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4821 - 4827
  • [4] Fake News Detection in Social Networks Using Machine Learning Techniques
    Saeed, Ammar
    Al Solami, Eesa
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 778 - 784
  • [5] Ranking community detection algorithms for complex social networks using multilayer network design approach
    Rani, Seema
    Kumar, Mukesh
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2022, 18 (5/6) : 310 - 341
  • [6] Outlier Detection from Multidimensional Space using Multilayer Perceptron, RBF Networks and Pattern Clustering Techniques
    Sinwar, Deepak
    Dhaka, V. S.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 573 - 579
  • [7] Automatic Glaucoma Detection from Fundus Images Using Deep Convolutional Neural Networks and Exploring Networks Behaviour Using Visualization Techniques
    Velpula V.K.
    Sharma L.D.
    SN Computer Science, 4 (5)
  • [8] Automatic Cyberbullying Detection in Spanish-language Social Networks using Sentiment Analysis Techniques
    Montufar Mercado, Rolfy Nixon
    Chacca Chuctaya, Hernan Faustino
    Castro Gutierrez, Eveling Gloria
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (07) : 228 - 235
  • [9] Detection of Jihadism in Social Networks Using Big Data Techniques Supported by Graphs and Fuzzy Clustering
    Sanchez-Rebollo, Cristina
    Puente, Cristina
    Palacios, Rafael
    Piriz, Claudia
    Fuentes, Juan P.
    Jarauta, Javier
    COMPLEXITY, 2019, 2019
  • [10] Detection of Behavior Patterns through Social Networks like Twitter, using Data Mining techniques as a method to detect Cyberbullying
    Tapia, Freddy
    Aguinaga, Cristina
    Luje, Roger
    2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE PROCESS IMPROVEMENT (CIMPS): APPLICATIONS IN SOFTWARE ENGINEERING, 2018, : 111 - 118