Classification of Malicious and Legitimate Nodes for Analysing the Users' Behaviour in Heterogeneous Online Social Networks

被引:0
|
作者
Dev, Pran [1 ]
Singh, Kulvinder [2 ]
Dhawan, Sanjeev [2 ]
机构
[1] Kurukshetra Univ, Dept Comp Sci & Engn, UIET, Comp Engn, Kurukshetra, Haryana, India
[2] Kurukshetra Univ, Dept Comp Sci & Engn, UIET, Fac Comp Sci & Engn, Kurukshetra, Haryana, India
关键词
Classification Algorithms; Social Network Analysis; Users' Behaviour; WEKA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With exponential growth of Internet in the modern era, social networking has evolved as a preference for the users. The communication overload has exposed insecurity in the network. To cope with this problem, the unwanted users' behavior needs to be distinguished from legitimate users' behavior to make social networking safe for users. In this paper, an analysis has been performed on a subset of two real datasets, one of Facebook links and other of Live Journal by applying classification algorithms. This paper employs REP Tree, Naive bayes Multinomial Updateable, Complement Naive bayes and Classification via Clustering algorithms for the classification of the datasets in online social networks like Hi5, LinkedIn, Facebook, Twitter, Live Journal etc. Moreover, on the basis of parameters like TP rate, FP rate etc., the best algorithm for the classification of malicious and legitimate users for analyzing users' behavior in heterogeneous online social networks is selected.
引用
收藏
页码:359 / 363
页数:5
相关论文
共 50 条
  • [1] Malicious Behaviour Identification in Online Social Networks
    Bin Tareaf, Raad
    Berger, Philipp
    Hennig, Patrick
    Meinel, Christoph
    [J]. DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS (DAIS 2018), 2018, 10853 : 18 - 25
  • [2] Detection of Malicious Profiles and Protecting Users in Online Social Networks
    Raja, M. Senthil
    Raj, L. Arun
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) : 107 - 124
  • [3] Detection of Malicious Profiles and Protecting Users in Online Social Networks
    M. Senthil Raja
    L. Arun Raj
    [J]. Wireless Personal Communications, 2022, 127 : 107 - 124
  • [4] Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets
    Barbon, Sylvio, Jr.
    Campos, Gabriel F. C.
    Tavares, Gabriel M.
    Igawa, Rodrigo A.
    Proenca, Mario L., Jr.
    Guido, Rodrigo Capobianco
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2018, 14 (01)
  • [5] Competitive diffusion in online social networks with heterogeneous users
    Li, Pei
    He, Su
    Wang, Hui
    Zhang, Xin
    [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2014, 28 (22):
  • [6] Visualising and Analysing Online Social Networks
    Muhongya, Kambale Vanty
    Maharaj, Manoj Sewak
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [7] Malicious and Spam Posts in Online Social Networks
    Abu-Nimeh, Saeed
    Chen, Thomas M.
    Alzubi, Omar
    [J]. COMPUTER, 2011, 44 (09) : 23 - 28
  • [8] A NOVEL METHOD FOR MULTI-DIMENSIONAL CLUSTER TO IDENTIFY THE MALICIOUS USERS ON ONLINE SOCIAL NETWORKS
    Keerthana, N.
    Vinod, Viji
    Sengan, Sudhakar
    [J]. JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2020, 15 (06): : 4107 - 4122
  • [9] A Sophisticated Deep Learning Framework of Advanced Techniques to Detect Malicious Users in Online Social Networks
    Terumalasetti, Sailaja
    Reeja, S. R.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (12) : 616 - 624
  • [10] Pricing Influential Nodes in Online Social Networks
    Zhu, Yuqing
    Tang, Jing
    Tang, Xueyan
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 13 (10): : 1614 - 1627