Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 404))

Abstract

With the escalation in popularity of social networking sites such as Twitter, Facebook, LinkedIn, MySpace, Google+, Weibo, and Hyves, the rate of spammers and unsolicited messages has increased significantly. Spamming agents can be automated spam bots or users. The main objective of this paper is to propose an unsupervised approach to detect spam content messages. In this paper, stochastic approach for link-structure analysis (SALSA) algorithm is used to classify a message being spam or not-spam. The dataset from the popular Dutch social networking site named Hyves has been obtained and tested with different performance measures namely true positive rate, false positive rate, accuracy, and time of execution, and it is found that this mechanism outperforms the previously existing unsupervised author-reporter model for spam detection based on HITS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Subrahmanyam, K., Reich, S.M., Waechter, N., Espinoza, G.: Online and offline social networks: use of social networking sites by emerging adults. J. Appl. Dev. Psychol. 29(6), 420–433 (2008)

    Article  Google Scholar 

  2. Lin, K.-Y., Lu, H.-P.: Why people use social networking sites: an empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27(3), 1152–1161 (2011)

    Article  Google Scholar 

  3. Brandtzaeg, P.B., Heim, J.: Why people use social networking sites. In: Online Communities and Social Computing, pp. 143–152. Springer, Berlin (2009)

    Google Scholar 

  4. Murugesan, S.: Understanding Web 2.0. IT Prof. 9(4), 34–41 (2007)

    Article  Google Scholar 

  5. Lempel, R., Moran, S.: SALSA: the stochastic approach for link-structure analysis. ACM Trans. Inf. Syst. TOIS 19(2), 131–160 (2001)

    Article  Google Scholar 

  6. Gupta, P., Goel, A., Lin, J., Sharma, A., Wang, D., Zadeh, R.: Wtf: the who to follow service at twitter. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 505–514 (2013)

    Google Scholar 

  7. Cisco 2011 Annual Security Report

    Google Scholar 

  8. Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. Internet Comput. IEEE 11(6), 36–45 (2007)

    Article  Google Scholar 

  9. Castillo, C., Donato, D., Gionis, A., Murdock, V., Silvestri, F.: Know your neighbours: web spam detection using the web topology. In: ACM SIGIR, pp. 423–430 (2007)

    Google Scholar 

  10. Zeng, Z., Zheng, X., Chen, G., Yu, Y.: Spammer detection on Weibo social network, pp. 881–886 (2014)

    Google Scholar 

  11. Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)

    Google Scholar 

  12. DeBarr, D., Wechsler, H.: Spam detection using random boost. Pattern Recognit. Lett. 33(10), 1237–1244 (2012)

    Article  Google Scholar 

  13. Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Secure Comput. 9(6), 811–824 (2012)

    Article  Google Scholar 

  14. Ahmed, F., Abulaish, M.: A generic statistical approach for spam detection in online social networks. Comput. Commun. 36(10–11), 1120–1129 (2013)

    Article  Google Scholar 

  15. Wang, K., Wang, Y., Li, H., Xiong, Y., Zhang, X.: A new approach for detecting spam microblogs based on text and user’s social network features. In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems (VITAE), pp. 1–5 (2014)

    Google Scholar 

  16. Bosma, M., Meij, E., Weerkamp, W.: A framework for unsupervised spam detection in social networking sites. In: Advances in Information Retrieval, pp. 364–375. Springer, Berlin (2012)

    Google Scholar 

  17. Najork, M.A.: Comparing the effectiveness of HITS and SALSA. In: Proceedings of the Sixteenth ACM Conference on Information and Knowledge Management, pp. 157–164 (2007)

    Google Scholar 

  18. Najork, M., Gollapudi, S., Panigrahy, R.: Less is more: sampling the neighborhood graph makes salsa better and faster. In: Proceedings of the Second ACM International Conference on Web Search and Data Mining, pp. 242–251 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohit Agrawal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Agrawal, M., Leela Velusamy, R. (2016). Unsupervised Spam Detection in Hyves Using SALSA. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, vol 404. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2695-6_43

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2695-6_43

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2693-2

  • Online ISBN: 978-81-322-2695-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics