Enhancing Online Social Network Security for Effective Detection of Bots, Spam, and Fake Accounts
Main Article Content
Abstract
Online social networks (OSNs) are becoming prevalent in the lives of individuals, with a significant portion of the public actively engaging with them. Consequently, users are encountering challenges pertaining to spam and fraudulent accounts as a result of the proliferation of unregulated online social networks. As a consequence of these attacks, the security of their personal information remains compromised. In order to address these issues, academics have put forth a range of machine learning techniques. However, these strategies proved to be ineffective in accurately detecting bots, spam, and false accounts. This research presents the utilization of the Deep Learning Convolutional Neural Network (DLCNN) as a contemporary technique for the efficient detection of suspicious clickstream sequences and bots, enabling the inclusion of options and the limitation of measurements. The classification method for account verification is employed to ascertain the veracity of target accounts, distinguishing between genuine and fraudulent identities. Based on the comprehensive simulation findings, it is evident that the proposed Deep Learning Convolutional Neural Network (DLCNN) exhibits reduced training time and achieves superior classification accuracy in comparison to existing state-of-the-art methodologies.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
. Lingam, Greeshma, Rashmi Ranjan Rout, and D. V. L. N. Somayajulu. "Detection of social botnet using a trust model based on spam content in Twitter network." 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2018.
. Lingam, Greeshma, Rashmi Ranjan Rout, and Durvasula VLN Somayajulu. "Adaptive deep Q- learning model for detecting social bots and influential users in online social networks." Applied Intelligence 49.11 (2019): 3947-3964.
. Loyola-González, Octavio, et al. "Contrast pattern-based classification for bot detection on twitter." IEEE Access 7 (2019): 45800-45817.
. Schneider, Dominik, Marcos Zampieri, and Josef van Genabith. "Translation memories and the translator: a report on a user survey." Babel 64.5-6 (2018): 734-762.
. Lingam, Greeshma, Rashmi Ranjan Rout, and Durvasula VLN Somayajulu. "Deep Q-learning and particle swarm optimization for bot detection in online social networks." 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2019.
. Concone, Federico, et al. "Twitter Spam Account Detection by Effective Labeling." ITASEC.
. Belonogov, Gerold G. "Systems of Phraseological Machine Translation of Polythematic Texts from Russian into English and from English into Russian (RETRANS and ERTRANS Systems)." International forum on information and documentation. Vol. 20. No. 2. 1995.
. Comparin, Lucia. Quality in machine translation and human post-editing: error annotation and specifications. Diss. 2017.
. Rahman, Rizwan Ur, and Deepak Singh Tomar. "Botnet threats to e-commerce web applications and their detection." Research Anthology on Combating Denial-of-Service Attacks. IGI Global, 2021. 104-137.
. Shi, Peining, Zhiyong Zhang, and Kim-Kwang Raymond Choo. "Detecting malicious social bots based on clickstream sequences." IEEE Access 7 (2019): 28855-28862.
. Cabri, Alberto, et al. "Online web bot detection using a sequential classification approach." 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 2018.
. Dorri, Ali, Mahdi Abadi, and Mahila Dadfarnia. "SocialBotHunter: Botnet detection in Twitter- like social networking services using semi-supervised collective classification." 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, 2018.
. Abu-El-Rub, Noor, and Abdullah Mueen. "Botcamp: Bot-driven interactions in social campaigns." The World Wide Web Conference. 2019.
. Hans, Kanchan, Laxmi Ahuja, and Sunil Kumar Muttoo. "Detecting redirection spam using multilayer perceptron neural network." Soft Computing 21.13 (2017): 3803-3814.
. Cai, Chiyu, Linjing Li, and Daniel Zengi. "Behavior enhanced deep bot detection in social media." 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017.
. Jr, Sylvio Barbon, et al. "Detection of human, legitimate bot, and malicious bot in online social networks based on wavelets." ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 14.1s (2018): 1-17.
. Daniel, Florian, Cinzia Cappiello, and Boualem Benatallah. "Bots acting like humans: Understanding and preventing harm." IEEE Internet Computing 23.2 (2019): 40-49.
. Heydari, Mohammad. Indeterminacy-aware prediction model for authentication in IoT. Diss.
Bournemouth University, 2020.