Computer Science ›› 2018, Vol. 45 ›› Issue (11): 138-142.doi: 10.11896/j.issn.1002-137X.2018.11.020

• Information Security • Previous Articles     Next Articles

Study on Detection of Weibo Spammers Based on Danger Theory in Artificial Immunity System

YANG Chao1, QIN Ting-dong1, FAN Bo2, LI Tao3   

  1. (School of Computer Science and Information Engineering,Hubei University,Wuhan 430062,China)1
    (Office of Scientific Research and Development,Wuhan University,Wuhan 430072,China)2
    (Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System,Wuhan University of Science and Technology,Wuhan 430065,China)3
  • Received:2017-12-04 Published:2019-02-25

Abstract: This paper introduced the danger theory in artificial immunity system into the analysis of user behavior cha-racteristics to identify the spammers in Weibo effectively.Taking Sina Weibo as an example,this paper analyzed the behavior characteristics of Weibo spammers,selected the total number of Weibo,Weibo level,user authentication,sunshine credit and the number of fans as attribute characteristics and used the analysis results of attribute characteristics as the characteristic signals of distinguishing the spammers and the normal users.After that,the recognition of Sina Weibo spammers can be achieved based on Dendritic Cells Algorithm.The real data of Sina Weibo users was used to verify the effectiveness of the proposed algorithm and conducted comparison experiments.The experimental results suggest that this algorithm can effectively detect the spammers in Sina Weibo and has high detection accuracy.

Key words: Artificial immunity, Behavioral characteristics, Danger theory, Dendritic cells algorithm, Weibo spammers

CLC Number: 

  • TP393
[1]Beijing Internet Information Office.China Weibo Development Report .Beijing:People’s Publishing House,2014:59-106.(in Chinese)
北京互联网信息办公室.中国微博发展报告[M].北京:人民出版社,2014:59-106.
[2]CNNIC.The 40th “China Internet Development Statistics Report” .http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201708/t20170803_69444.htm.(in Chinese)
中国互联网络信息中心.第40次《中国互联网络发展状况统计报告》.http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201708/t20170803_69444.htm.
[3]SRIRAM B,FUHRY D,DEMIR E,et al.Short text classification in twitter to improve information filtering[C]∥Internatio-nal ACM SIGIR Conference on Research and Development in Information Retrieval.ACM,2010:841-842.
[4]ZHAO Y Y,QIN B,LIU T.Sentiment Analysis[J].Journal of Software,2010,21(8):1834-1848.(in Chinese)
赵妍妍,秦兵,刘挺.文本情感分析[J].软件学报,2010,21(8):1834-1848.
[5]LIU B.Sentiment analysis and subjectivity.https://www. researchgate.net/publication/228667268_Sentiment_analysis_and_subjectivity.
[6]JIN L R.Structure and Content-based SpammerDection in Social Networks[D].Nanjing:Nanjing University of Posts,2016.(in Chinese)
金礼仁.基于结构与内容的社交网络水军团体识别[D].南京:南京邮电大学,2016.
[7]MO Q,YANG K.Overview of Web Spammer Detection[J].Journal of Software,2014,25(7):1505-1526.(in Chinese)
莫倩,杨珂.网络水军识别研究[J].软件学报,2014,25(7):1505-1526.
[8]RAMACHANDRAN A,FEAMSTER N.Understanding the network-level behavior of spammers[C]∥ACM.2006:291-302.
[9]BHAT V H,MALKANI V R,SHENOY P D,et al.Classification of email using BeaKS:Behavior and keyword stemming.https://ieeexplore.ieee.org/document/6129290.
[10]BRENDEL R,KRAWCZYK H.Application of social relation graphs for early detection of transient spammers[M].World Scientific and Engineering Academy and Society (WSEAS),2008:267-276.
[11]ZHANG Y M,HUANG Y Y,GAN S J,et al.Weibo spammers’ identification algorithm based on Bayesian model[J].Journal on Communications,2017,38(1):44-53.(in Chinese)
张艳梅,黄莹莹,甘世杰,等.基于贝叶斯模型的微博网络水军识别算法研究[J].通信学报,2017,38(1):44-53.
[12]LING Z,BAI Z Y,LUO S S,et al.Integrated intrusion detection model based on rough set and artificial immune[J].Journal on Communications,2013,34(9):166-176.(in Chinese)
张玲,白中英,罗守山,等.基于粗糙集和人工免疫的集成入侵检测模型[J].通信学报,2013,34(9):166-176.
[13]YANG C,LI Z Y.Spam mass sending examination based on dendritic cell algorithm[J].Transducer & Microsystem Technologies,2015,34(10):133-136.(in Chinese)
杨超,李子怡.基于树突状细胞算法的垃圾邮件群发检测[J].传感器与微系统,2015,34(10):133-136.
[14]WANG X X,LIANG Y W,et al.Application of dendritic cell algorithm on Web server anomaly detection[J].Computer Engineering & Applications,2016,52(24):148-152.(in Chinese)
王新新,梁意文.树突状细胞算法在Web服务器异常检测中的应用[J].计算机工程与应用,2016,52(24):148-152.
[15]MATZINGER P.Tolerance,Danger and the Extended Family[J].Annual Review of Immunology,1994,12(1):991-1045.
[16]AICKELIN U,BENTLEY P,CAYZER S,et al.Danger Theory:The Link between AIS and IDS?[C]∥Artificial Immune Systems,Second International Conference(ICARIS 2003).Edinburgh,UK,Proceedings.DBLP,2003:147-155.
[17]AICKELIN U,GREENSMITH J,TWYCROSS J.Immune System Approaches to Intrusion Detection-A Review[C]∥International Conference on Artificial Immune Systems.Springer Berlin Heidelberg,2004:316-329.
[18]GREENSMITH J,AICKELIN U,CAYZER S.Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection[M]∥Artificial Immune Systems.Springer Berlin Heidelberg,2005:153-167.
[19]WANG Y Q,LIANG Y W,LIU S.Application-layer DDoS attack detection based on dendritic cell algorithm[J].Computer Engineering and Design,2015,36(4):841-845.(in Chinese)
王亚芹,梁意文,刘赛.基于树突状细胞算法的应用层DDoS攻击检测[J].计算机工程与设计,2015,36(4):841-845.
[20]GREENSMITH J,AICKELIN U.The Dendritic Cell Algorithm[J].RevistaClínica Espaola,2007,202(10):552-554.
[21]YI L L.Research on Statistical Characteristic Analysis and Modeling for User Behavior in Micro-blog Community Based on Human Dynamics[D].Beijing:Beijing University of Posts and Telecommunications,2012.(in Chinese)
易兰丽.基于人类动力学的微博用户行为统计特征分析与建模研究[D].北京:北京邮电大学,2012.
[22]HE L,HE Y,HUO Y Q.Micro-blog user characteristics analysis and core user mining [J].Intelligence Theory and Practice,2011,34(11):121-125.(in Chinese)
何黎,何跃,霍叶青.微博用户特征分析和核心用户挖掘[J].情报理论与实践,2011,34(11):121-125.
[23]WANG X G.Empirical Analysison Behavior Characteristics and Relation Characteristics of Micro-blog Users-Take “SinaMicro-blog” for Example[J].Library and Information Service,2010,54(14):66-70.(in Chinese)
王晓光.微博客用户行为特征与关系特征实证分析——以“新浪微博”为例[J].图书情报工作,2010,54(14):66-70.
[24]Sina Weibo.Sunshine credit[EB/OL].http://service.account.weibo.com/sunshine/guize.
[25]LIAN J,ZHOU X,CAO W,et al.SINA microblog data retrieval[J].Journal of Tsinghua University,2011,51(10):1300-1305.(in Chinese)
廉捷,周欣,曹伟,等.新浪微博数据挖掘方案[J].清华大学学报(自然科学版),2011,51(10):1300-1305.
[26]YANG M,YIN J M,JI G L.Classification Methods on Imba- lanced Data:a Survey[J].Journal of Nanjing Normal University,2008,8(4):7-12.(in Chinese)
杨明,尹军梅,吉根林.不平衡数据分类方法综述[J].南京师范大学学报(工程技术版),2008,8(4):7-12.
[1] JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331.
[2] ZHANG Min-jun, HUA Qing-yi. Personalized Recommendation of Social Network Users' Interest Points Based on ProbabilityMatrix Decomposition Algorithm [J]. Computer Science, 2020, 47(12): 144-148.
[3] YANG Chao and LI Tao. Research of Danger Signal Extraction Based on Changes in Danger Theory [J]. Computer Science, 2015, 42(8): 170-174.
[4] CHEN Yan-ling, TANG Guang-ming and SUN Yi-feng. Assessment of Network Security Situation Based on Immune Danger Theory [J]. Computer Science, 2015, 42(6): 167-170.
[5] FANG Xian-jin, WANG Li, KANG Jia and LIU Jia. On Dendritic Cell Algorithm and its Theoretical Investigation [J]. Computer Science, 2015, 42(2): 131-133.
[6] LIU Nian,LIU Sun-jun,LIU Yong,ZHAO Hui. Method of Network Security Situation Awareness Based on Artificial Immunity System [J]. Computer Science, 2010, 37(1): 126-129.
[7] ZHANG Jun-min,LIANG Yi-wen. Worm Detection Immune Model Integrating Innate and Adaptive Immunity [J]. Computer Science, 2009, 36(12): 119-123.
[8] CHAI Zheng-yi, WANG Hong-hai. Study of Anomaly Intrusion Detection System on False Positive Rate [J]. Computer Science, 2009, 36(11): 68-70.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!