Malicious Behaviour Analysis on Twitter Through the Lens of User Interest

被引:1
|
作者
Alghamdi, Bandar [1 ,2 ]
Xu, Yue [1 ]
Watson, Jason [1 ]
机构
[1] Queensland Univ Technol Australia, Fac Sci & Engn, Brisbane, Qld 4000, Australia
[2] Inst Publ Adm, Riyadh 11141, Saudi Arabia
来源
DATA MINING, AUSDM 2017 | 2018年 / 845卷
关键词
Spam; Spammers; Behaviour; Detection; Text mining; Social networks;
D O I
10.1007/978-981-13-0292-3_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Evolving behaviours by spammers on online social networks continue to be a big challenge; this phenomenon has consistently received attention from researchers in terms of how they can be combated. On micro-blogging communities, such as Twitter, spammers intentionally change their behavioural patterns and message contents to avoid detection. Understanding the behavior of spammers is important for developing effective approaches to differentiate spammers from legitimate users. Due to the dynamic and inconsistent behaviour of spammers, the problem should be considered from two different levels to properly understand this type of behaviour and differentiate it from that of legitimate users. The first level pertains to the content, and the second, to the users' demographics. In this paper, we first examine Twitter content relating to a particular topic, extracted from one hashtag, for a dataset comprising both spammers and legitimate users in order to characterise user behaviour with respect to that topic. We then investigate the users' demographic data with a focus on the users' profile description and how it relates to their tweets. The result of this experiment confirms that, in addition to the content level, users' demographic data can present an alternative approach to identify the different behaviours of both spammers and legitimate users; moreover, it can be used to detect spammers.
引用
收藏
页码:233 / 249
页数:17
相关论文
共 50 条
  • [41] Deepening and Practical Application of Sentiment Analysis: Through Exploration of Public Interest and Sentiment on "Biodiversity" From Twitter
    Ohtani, Shimon
    ENVIRONMENT AND BEHAVIOR, 2024,
  • [42] Analysis of False CSI Attack by a Malicious User in OFDMA Networks
    Wang, Xiaowei
    Tao, Meixia
    Xu, Youyun
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2012), 2012,
  • [43] Interest Analysis Based-On Knowledge Websites Through User-Browsing-Behavior
    Guo, Junxia
    Han, Hao
    Zeng, Weijia
    Lu, Gang
    FUZZY SYSTEMS AND DATA MINING III (FSDM 2017), 2017, 299 : 100 - 106
  • [44] Cultural repercussions An analysis of management behaviour through the lens of European cultural variations
    Gulev, Rune Ellemose
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2009, 109 (5-6) : 793 - 808
  • [45] CORRELATION ANALYSIS OF USER INFLUENCE AND SENTIMENT ON TWITTER DATA
    Hanif, Fadhli Mubarak bin Naina
    Saptawati, G. A. Putri
    2014 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2014,
  • [46] User interest modeling based on terminal user behavior analysis
    Li, Changlu
    Wang, Jinlin
    Guo, Zhichuan
    Han, Rui
    Journal of Computational Information Systems, 2015, 11 (01): : 349 - 356
  • [47] A framework for WWW user activity analysis based on user interest
    Zeng, Jianping
    Zhang, Shiyong
    Wu, Chengrong
    KNOWLEDGE-BASED SYSTEMS, 2008, 21 (08) : 905 - 910
  • [48] Geolocation Detection Approaches for User Discussion Analysis in Twitter
    Blekanov, Ivan
    Maksimov, Alexey
    Nepiyushchikh, Dmitry
    Bodrunova, Svetlana S.
    HCI INTERNATIONAL 2022 - LATE BREAKING PAPERS: INTERACTION IN NEW MEDIA, LEARNING AND GAMES, 2022, 13517 : 16 - 29
  • [49] TURank: Twitter User Ranking Based on User-Tweet Graph Analysis
    Yamaguchi, Yuto
    Takahashi, Tsubasa
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    WEB INFORMATION SYSTEM ENGINEERING-WISE 2010, 2010, 6488 : 240 - 253
  • [50] Examining the role of "Place" in Twitter Networks through the Lens of Contentious Politics
    Hemsley, Jeff
    Eckert, Josef
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 1844 - 1853