DocumentCode
568456
Title
An MCL-Based Approach for Spam Profile Detection in Online Social Networks
Author
Ahmed, Faraz ; Abulaish, Muhammad
Author_Institution
Center of Excellence in Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia
fYear
2012
fDate
25-27 June 2012
Firstpage
602
Lastpage
608
Abstract
Over the past few years, Online Social Networks (OSNs) have emerged as cheap and popular communication and information sharing media. Huge amount of information is being shared through popular OSN sites. This aspect of sharing information to a large number of individuals with ease has attracted social spammers to exploit the network of trust for spreading spam messages to promote personal blogs, advertisements, phishing, scam and so on. In this paper, we present a Markov Clustering (MCL) based approach for the detection of spam profiles on OSNs. Our study is based on a real dataset of Facebook profiles, which includes both benign and spam profiles. We model social network using a weighted graph in which profiles are represented as nodes and their interactions as edges. The weight of an edge, connecting a pair of user profiles, is calculated as a function of their real social interactions in terms of active friends, page likes and shared URLs within the network. MCL is applied on the weighted graph to generate different clusters containing different categories of profiles. Majority voting is applied to handle the cases in which a cluster contains both spam and normal profiles. Our experimental results show that majority voting not only reduces the number of clusters to a minimum, but also increases the performance values in terms of FP and FB measures from FP=0.85 and FB=0.75 to FP=0.88 and FB=0.79, respectively.
Keywords
Markov processes; graph theory; pattern clustering; security of data; social networking (online); unsolicited e-mail; Facebook profiles; MCL-based approach; Markov clustering-based approach; OSN sites; active friends; edges interactions; information sharing media; nodes representation; online social networks; page likes; personal blogs; real social interactions; shared URL; social spammers; spam messages; spam profile detection; user profiles; weighted graph; Communities; Equations; Facebook; Mathematical model; Twitter; Unsolicited electronic mail; Cyber security; Social network analysis; Social network security; Spam campaign identification; Spam profile detection;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.83
Filename
6296026
Link To Document