SlideShare a Scribd company logo
Spammer Detection and Fake User Identification on Social
Networks
ABSTRACT:
Social networking sites engage millions of users around the world. The users'
interactions with these social sites, such as Twitter and Facebook have a
tremendous impact and occasionally undesirable repercussions for daily life. The
prominent social networking sites have turned into a target platform for the
spammers to disperse a huge amount of irrelevant and deleterious information.
Twitter, for example, has become one of the most extravagantly used platforms of
all times and therefore allows an unreasonable amount of spam. Fake users send
undesired tweets to users to promote services or websites that not only affect
legitimate users but also disrupt resource consumption. Moreover, the possibility
of expanding invalid information to users through fake identities has increased that
results in the unrolling of harmful content. Recently, the detection of spammers
and identification of fake users on Twitter has become a common area of research
in contemporary online social Networks (OSNs). In this paper, we perform a
review of techniques used for detecting spammers on Twitter. Moreover, a
taxonomy of the Twitter spam detection approaches is presented that classifies the
techniques based on their ability to detect: (i) fake content, (ii) spam based on
URL, (iii) spam in trending topics, and (iv) fake users. The presented techniques
are also compared based on various features, such as user features, content
features, graph features, structure features, and time features. We are hopeful that
the presented study will be a useful resource for researchers to find the highlights
of recent developments in Twitter spam detection on a single platform.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : ASP.NET,C#.NET
 Tool : Visual Studio 2008
 Database : SQL SERVER 2005
REFERENCE:
FAIZA MASOOD1, GHANA AMMAD1, AHMAD ALMOGREN 2, (Senior
Member, IEEE), ASSAD ABBAS 1, HASAN ALI KHATTAK 1, (Senior
Member, IEEE), IKRAM UD DIN 3, (Senior Member, IEEE), MOHSEN
GUIZANI 4, (Fellow, IEEE), AND MANSOUR ZUAIR5, “Spammer Detection
and Fake User Identification on Social Networks”, IEEE Access, 2019.
Spammer Detection and Fake User Identificationon Social Networks

More Related Content

DOCX
Spammer Detection and Fake User Identification on Social Networks
DOCX
Spammer detection and fake user Identification on Social Networks
DOCX
PPTX
Presentation-Detecting Spammers on Social Networks
PDF
Microposts2015 - Social Spam Detection on Twitter
DOCX
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...
PPTX
FRAppE Detecting Malicious Facebook Applications
PDF
An iac approach for detecting profile cloning
Spammer Detection and Fake User Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
Presentation-Detecting Spammers on Social Networks
Microposts2015 - Social Spam Detection on Twitter
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...
FRAppE Detecting Malicious Facebook Applications
An iac approach for detecting profile cloning

What's hot (16)

DOCX
Fr app e detecting malicious facebook applications
DOCX
Fr app e detecting malicious facebook applications
PPTX
Tarea seminario 3. TIC
DOCX
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
PPTX
Android security
DOCX
Twitter broadens ban on dehumanizing comments
PPTX
Social tagging, facets, and social spaces
PDF
Detailed Research on Fake News: Opportunities, Challenges and Methods
PPTX
Fake news detection project
PPT
Protecting Your Campus With Shared Intelligence
PDF
identifying malevolent facebook requests
PPTX
Seminar on detecting fake accounts in social media using machine learning
PPTX
Live Social Semantics @ ESWC2010
PPTX
A research of software vulnerabilities
DOCX
Retrieving Hidden Friends: A Collusion PrivacyAttack Against Online Friend Se...
PPTX
Twitter
Fr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applications
Tarea seminario 3. TIC
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
Android security
Twitter broadens ban on dehumanizing comments
Social tagging, facets, and social spaces
Detailed Research on Fake News: Opportunities, Challenges and Methods
Fake news detection project
Protecting Your Campus With Shared Intelligence
identifying malevolent facebook requests
Seminar on detecting fake accounts in social media using machine learning
Live Social Semantics @ ESWC2010
A research of software vulnerabilities
Retrieving Hidden Friends: A Collusion PrivacyAttack Against Online Friend Se...
Twitter
Ad

Similar to Spammer Detection and Fake User Identificationon Social Networks (20)

PPTX
PPT.pptx
PPTX
sdfi_spammmer_detction_and_fakesppt.pptx
PDF
A Survey of Methods for Spotting Spammers on Twitter
PDF
Classification Methods for Spam Detection in Online Social Network
PDF
Spammer Detection and Fake User Identification on Social Networks
PDF
6356152.pdf
PPTX
Spammer_Detection_Project_Presentation.pptx
PDF
IRJET- Twitter Spammer Detection
DOCX
📘 Project Document automated spam.docx
DOCX
📘 automated spam Project Document.docx
PDF
762019109
PDF
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
PDF
Integrated approach to detect spam in social media networks using hybrid feat...
PDF
B13 FIRST REVIEW 2 (1).pdf advanced machine learning
PDF
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
PDF
IRJET- Fake Profile Identification using Machine Learning
PDF
Database Admin for Comp review seminar.pdf
DOCX
FAKE SOCIAL MEDIA ACCOUNT DETECTION DOCUMENTATION[6][1] (1).docx
PDF
microposts2015presentation-150518124457-lva1-app6892.pdf
PDF
20574-38941-1-PB.pdf
PPT.pptx
sdfi_spammmer_detction_and_fakesppt.pptx
A Survey of Methods for Spotting Spammers on Twitter
Classification Methods for Spam Detection in Online Social Network
Spammer Detection and Fake User Identification on Social Networks
6356152.pdf
Spammer_Detection_Project_Presentation.pptx
IRJET- Twitter Spammer Detection
📘 Project Document automated spam.docx
📘 automated spam Project Document.docx
762019109
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Integrated approach to detect spam in social media networks using hybrid feat...
B13 FIRST REVIEW 2 (1).pdf advanced machine learning
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
IRJET- Fake Profile Identification using Machine Learning
Database Admin for Comp review seminar.pdf
FAKE SOCIAL MEDIA ACCOUNT DETECTION DOCUMENTATION[6][1] (1).docx
microposts2015presentation-150518124457-lva1-app6892.pdf
20574-38941-1-PB.pdf
Ad

More from JAYAPRAKASH JPINFOTECH (20)

PDF
Java Web Application Project Titles 2023-2024.pdf
PDF
Dot Net Final Year IEEE Project Titles.pdf
PDF
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
PDF
Python IEEE Project Titles 2023 - 2024.pdf
PDF
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
DOCX
Sentiment Classification using N-gram IDF and Automated Machine Learning
DOCX
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
DOCX
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
DOCX
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
DOCX
Crop Yield Prediction and Efficient use of Fertilizers
DOCX
Collaborative Filtering-based Electricity Plan Recommender System
DOCX
Achieving Data Truthfulness and Privacy Preservation in Data Markets
DOCX
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
DOCX
Towards Fast and Reliable Multi-hop Routing in VANETs
DOCX
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
DOCX
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
DOCX
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
DOCX
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
DOCX
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks
Java Web Application Project Titles 2023-2024.pdf
Dot Net Final Year IEEE Project Titles.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Sentiment Classification using N-gram IDF and Automated Machine Learning
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Crop Yield Prediction and Efficient use of Fertilizers
Collaborative Filtering-based Electricity Plan Recommender System
Achieving Data Truthfulness and Privacy Preservation in Data Markets
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
Towards Fast and Reliable Multi-hop Routing in VANETs
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Node-Level Trust Evaluation in Wireless Sensor Networks
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Computing-Curriculum for Schools in Ghana
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Lesson notes of climatology university.
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Pharma ospi slides which help in ospi learning
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
STATICS OF THE RIGID BODIES Hibbelers.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Final Presentation General Medicine 03-08-2024.pptx
Computing-Curriculum for Schools in Ghana
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Orientation - ARALprogram of Deped to the Parents.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
human mycosis Human fungal infections are called human mycosis..pptx
O5-L3 Freight Transport Ops (International) V1.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Lesson notes of climatology university.
A systematic review of self-coping strategies used by university students to ...
GDM (1) (1).pptx small presentation for students
Pharma ospi slides which help in ospi learning
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF

Spammer Detection and Fake User Identificationon Social Networks

  • 1. Spammer Detection and Fake User Identification on Social Networks ABSTRACT: Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily life. The prominent social networking sites have turned into a target platform for the spammers to disperse a huge amount of irrelevant and deleterious information. Twitter, for example, has become one of the most extravagantly used platforms of all times and therefore allows an unreasonable amount of spam. Fake users send undesired tweets to users to promote services or websites that not only affect legitimate users but also disrupt resource consumption. Moreover, the possibility of expanding invalid information to users through fake identities has increased that results in the unrolling of harmful content. Recently, the detection of spammers and identification of fake users on Twitter has become a common area of research in contemporary online social Networks (OSNs). In this paper, we perform a review of techniques used for detecting spammers on Twitter. Moreover, a taxonomy of the Twitter spam detection approaches is presented that classifies the techniques based on their ability to detect: (i) fake content, (ii) spam based on URL, (iii) spam in trending topics, and (iv) fake users. The presented techniques are also compared based on various features, such as user features, content features, graph features, structure features, and time features. We are hopeful that
  • 2. the presented study will be a useful resource for researchers to find the highlights of recent developments in Twitter spam detection on a single platform. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB. SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : ASP.NET,C#.NET  Tool : Visual Studio 2008  Database : SQL SERVER 2005 REFERENCE: FAIZA MASOOD1, GHANA AMMAD1, AHMAD ALMOGREN 2, (Senior Member, IEEE), ASSAD ABBAS 1, HASAN ALI KHATTAK 1, (Senior Member, IEEE), IKRAM UD DIN 3, (Senior Member, IEEE), MOHSEN GUIZANI 4, (Fellow, IEEE), AND MANSOUR ZUAIR5, “Spammer Detection and Fake User Identification on Social Networks”, IEEE Access, 2019.