Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 364-368.doi: 10.11896/JsJkx.190700008

• Information Security • Previous Articles     Next Articles

Abnormal User Detection Method in Sina Weibo Based on User Feature Extraction

YUAN De-yu1, 2, ZHANG Yi-fan1, GAO Jian1, 2 and SUN Hai-chun1, 2   

  1. 1 Institute of Information Technology and Cyber Security,People’s Public Security University of China,BeiJing 102623,China
    2 Key Laboratory of Safety Precautions and Risk Assessment,Ministry of Public Security,BeiJing 102623,China
  • Published:2020-07-07
  • About author:YUAN De-yu, born in 1986, Ph.D, lecturer.His main research interests include cyber security, and complex networks.
    GAO Jian, born in 1982, Ph.D, lecturer.His main research interests include botnet, malware analysis and cyber crime.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61771072) and Special ProJect of People’s Public Security University of China (2020JWCX01).

Abstract: With the development of the Internet,Weibo has gradually become an important social media.However,in Weibo,abnormal users influence the behaviors of users by spreading harmful information,sending malicious links,and even launching malicious attacks,thus affecting the value of social networks.Therefore,it is important to realize the detection of abnormal users.Based on the Weibo abnormal users and normal user data sets obtained from multiple ways,this paper proposes to comprehensive extract and analyze various attributes of users.An abnormal user detection model is established through various data mining methods to identify abnormal user accounts.Experimental results of C4.5 decision tree and random forest algorithms show that by using the proposed method,the selected features are effective and the detection accuracy of abnormal users is high.

Key words: Abnormal user, Data mining, Feature extraction, Weibo

CLC Number: 

  • TP309
[1] 中国互联网信息中心.第43次中国互联网络发展状况统计报告.北京.CNNIC,2019.
[2] FABRICO B,MAGNO G,RODRIGUES T,et al.Detecting spammers and content promoters in online video social networks//Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval.ACM,2009:620-627.
[3] BENEVENUTO F,MAGNO G,RODRIGUES T,et al.Detecting spammers on twitter//Collaboration,Electronicmessaging,Anti-Abuse and Spam Conference.Washington,2010:6-12.
[4] STRINGHINI G,KRUEGEL C,VIGNA G.Detecting spammers on socia networks//Proceedings of the 26th Annual Computer Security Applications Conference.ACM,2010:1-9.
[5] 彭希羡,朱庆华,刘璇.微博客用户特征分析及分类研究——以“新浪微博”为例.情报科学,2015,33(1):69-75.
[6] 刘勘,袁蕴英,刘萍.基于随机森林分类的微博机器用户识别研究.北京大学学报,2015,51(2):289-300.
[7] APHINYANAPHONGS Y,RAY B,STATNIKOV A,et al.
[8] Text classification for automatic detection of alcohol use-related tweets:A feasibility study//2014 IEEE 15th International Conference on Information Reuse and Integration(IRI).IEEE,2014:93-97.
[9] 蒋鑫.基于属性约简的社交网络异常用户识别系统的设计与实现.北京:北京邮电大学,2016:2-3.
[10] 夏崇欢.基于行为特征分析的微博恶意用户检测方法.南京:南京邮电大学,2018:5-6.
[11] 郝亚洲,郑庆华,陈艳,等.面向网络舆情数据的异常行为识别.计算机研究与发展,2016,53(3):611-620.
[12] 张玉清,吕少卿,范丹.在线社交网络中异常帐号检测方法研究.计算机学报,2015,38(10):2011-2027.
[13] 吴大鹏,司书山,闫俊杰,等.基于行为特征分析的社交网络女巫节点检测机制.电子与信息学报,2017,39(9):2089-2096.
[14] 刘琛.基于行为分析的社交网络异常账号的检测.北京:北京交通大学,2017.
[15] 孙洋.LBSN中基于好友聚类的社交搜索系统设计与实现.南京:东南大学,2017.
[1] LI Rong-fan, ZHONG Ting, WU Jin, ZHOU Fan, KUANG Ping. Spatio-Temporal Attention-based Kriging for Land Deformation Data Interpolation [J]. Computer Science, 2022, 49(8): 33-39.
[2] ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39.
[3] ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112.
[4] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[5] LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11.
[6] GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63.
[7] YAO Xiao-ming, DING Shi-chang, ZHAO Tao, HUANG Hong, LUO Jar-der, FU Xiao-ming. Big Data-driven Based Socioeconomic Status Analysis:A Survey [J]. Computer Science, 2022, 49(4): 80-87.
[8] ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203.
[9] KONG Yu-ting, TAN Fu-xiang, ZHAO Xin, ZHANG Zheng-hang, BAI Lu, QIAN Yu-rong. Review of K-means Algorithm Optimization Based on Differential Privacy [J]. Computer Science, 2022, 49(2): 162-173.
[10] LI Yu-qiang, ZHANG Wei-jiang, HUANG Yu, LI Lin, LIU Ai-hua. Improved Topic Sentiment Model with Word Embedding Based on Gaussian Distribution [J]. Computer Science, 2022, 49(2): 256-264.
[11] REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271.
[12] ZHANG Ya-di, SUN Yue, LIU Feng, ZHU Er-zhou. Study on Density Parameter and Center-Replacement Combined K-means and New Clustering Validity Index [J]. Computer Science, 2022, 49(1): 121-132.
[13] MA Dong, LI Xin-yuan, CHEN Hong-mei, XIAO Qing. Mining Spatial co-location Patterns with Star High Influence [J]. Computer Science, 2022, 49(1): 166-174.
[14] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[15] FENG Xia, HU Zhi-yi, LIU Cai-hua. Survey of Research Progress on Cross-modal Retrieval [J]. Computer Science, 2021, 48(8): 13-23.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!