Computer Science ›› 2018, Vol. 45 ›› Issue (12): 111-116.doi: 10.11896/j.issn.1002-137X.2018.12.017

• Information Security • Previous Articles     Next Articles

Microblogging Malicious User Identification Based on Behavior Characteristic Analysis

XIA Chong-huan, LI Hua-kang, SUN Guo-zi   

  1. (School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)
  • Received:2017-11-29 Online:2018-12-15 Published:2019-02-25

Abstract: In recent years,as a hotspot in data mining of physical network,social network data mining has made grati-fying achievements in the current user behavior analysis,interest recognition and product recommendation.With the advent of social networking business opportunities,many malicious users and malicious behaviors have also emerged,which have a great impact on the effectiveness of data mining.A malicious user identification method based on user behavior feature analysis was proposed.This method uses the principal component analysis(PCA) to mine the user behavior data in microblogging network,and ranks the weight of each feature.It can effectively identify malicious users with first six-dimensional principal component features.The new features fitted by the principal component features are used to improve the recognition performance of the system.The experimental results show that the proposed method can effectively sort the microblogging user features and identify the malicious users in the microblogging social network,which provides a good data cleaning technique for social network data mining in other directions.

Key words: Feature extraction, Machine learning, Malicious users, Microblogging, Principal component analysis(PCA)

CLC Number: 

  • TP309
[1]WANG Y L,ZHANG M.Summary of the Current ResearchStatus of Weibo in China [J].Library Science Research,2014(12):2-8.(in Chinese)
王莹莉,张敏.国内微博研究现状综述[J].图书馆学研究,2014(12):2-8.
[2]Wikipedia:Spamming[EB/OL].[2017-03-25].http://en.wik-ipedia.org/wiki/Spamming.
[3]CHU Z,GIANVECCHIO S,WANG H N,et al.Detecting Automation of Twitter Accounts:ARE you a human,bot,or cyborg?[J].IEEE Transactions on Dependable and Secure Computing,2012,9(6):811-824.
[4]ZHU X,TANG J,LIU H.Leveraging knowledge across media for spammer detection in microbiogging[C]∥Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval.ACM,2014:547-556.
[5]WANG A H.Don’t follow me:Spam detection in Twitter[C]∥Secrypt 2010-Proceedings of the International Conference on Security and Cryptography.2010:1-10.
[6]ZHENG X,ZENG Z,CHEN Z,et al.Detecting spammers on social networks[J].Neurocomputing,2015,159(C):27-34.
[7]ZHANG X Y,CHE X,TIAN X Y.A Malicious User Identification Method Based on Weibo User Behavior [J].Natural Science Journal of Heilongjiang University,2014,10(1):250-254.(in Chinese)
张锡英,车鑫,田宪允.一种基于微博用户行为的恶意用户识别方法[J].黑龙江大学自然科学学报,2014,10(1):250-254.
[8]CHU Z,GIANVECCHIO S,WANG H,et al.Who is tweeting on twitter:human,bot,or cyborg?[C]∥Twenty-Sixth Computer Security Applications Conference.2011:21-30.
[9]LI G C.Weibo spam user behavior modeling and screening [D].Beijing:Beijing University of Posts and Telecommunications,2014.(in Chinese)
李冠辰.微博垃圾用户行为建模和甄别[D].北京:北京邮电大学,2014.
[10]MCCORD M,CHUAH M.Spam detection on twitter using traditional classifiers [C]∥International Conference on Autonomic and Trusted Computing.2011:175-186.
[11]ANTONAKAKI D,POLAKIS I,ATHANASOPOULOS E,etal.Social Network Analysis and Mining[J].International Journal of Advanced Computer Science & Applications,2016,6(1):48.
[12]PERVEEN N,MISSEN M S,RASOOL Q,et al.SentimentBased Twitter Spam Detection[J].International Journal of Advanced Computer Science & Applications,2016,7(7):568-573.
[13]FU H,XIE X,RUI Y.Leveraging Careful Microblog Users for Spammer Detection[C]∥Proceedings of the 24th International Conference on World Wide Web Companion.International World Wide Web Conferences Steering Committee,2015:419-429.
[14]MOH T S,MURMANN A J.Can you judge a man by hisfriends?-enhancing spammer detection on the twitter microblogging platform using friends and followers [M]∥Information Systems,Technology and Management.Springer Berlin Heidelberg,2010:210-220.
[15]BECCHETTI L,BOLDI P,CASTILLO C,et al.Efficient semi-streaming algorithms for local triangle counting in massive graphs[C]∥Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2008:16-24.
[16]HU X,TANG J,ZHANG Y,et al.Social spammer detection in microblogging[C]∥Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence.AAAI Press,2013:2633-2639.
[17]ZHANG X,LI Z,ZHU S,et al.Detecting Spam and Promoting Campaigns in Twitter[J].Acm Transactions on the Web,2016,10(1):4-8.
[18]BENEVENUTO F,MAGNO G,RODRIGUES T,et al.Detecting spammers on twitter [C]∥International Joint Conference on Artificial Intelligence.2010:1723-1728.
[19]HU X,TANG J,ZHANG Y,et al.Social spammer detection in microblogging [C]∥International Joint Conference on Artificial Intelligence.2013:1709-1714.
[20]NESTEROV Y.Introductory lectures on convex optimization[M].IEEE Transactions on Dependable and Secure Computing,2007.
[21]LIU K,YUAN Y Y,LIU P.A Weibo Bot-users Indentification Model Based on Random Forest [J].Acta Scientiarum Natura-lium Universitatis Pekinensis,2015,10(2):10-13.(in Chinese)
刘勘,哀蕴英,刘萍.基于随机森林分类的微博机器用户识别研究[J].北京大学学报(自然科学版),2015,10(2):10-13.
[1] LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214.
[2] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[3] HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11.
[4] LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266.
[5] ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343.
[6] ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39.
[7] ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112.
[8] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[9] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[10] XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406.
[11] YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515.
[12] WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789.
[13] LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11.
[14] LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92.
[15] ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!