Author : Sneha Rane 1
Date of Publication :22nd February 2018
Abstract: Compromised accounts are of a severe risk to the social network users. People nowadays are mostly dependent on Online Social Networks. While some persistent spams feat the relationship between the users by spreading spams. Therefore time to time detection of the compromised accounts is a necessity. In this paper, we will study different social user behaviour and detect the compromised accounts and spam users. Spam behaviour in social networks has a wide range of illegal activities. Such activities need to be evaluated and effect of spam users needs to be reduced. To reduce such effects, we require proper detection strategy. We validate the effectiveness of this behaviour by collecting the clickstream data on a social network website. Social behaviour reflects the user's behaviour online. While a legitimate user coordinates its social behaviour carefully, it is hard for the fake users to pretend to be affected. Different studies are performed in spam behaviour analysis and define a structure for spam account detection.
Reference :
-
- F.Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. “Characterizing user behavior in online social networks”, Chicago, Illinois, USA, 2009. ACM.
- M. Egele, G. Stringhini, C. Kruegel,and G.Vigna.”Compa:2}Detecting compromised accounts on social networks”. , San Diego, CA USA.
- H. Gao, Y. Chen, and K. Lee.” Towards online spam filtering in social networks,” San Diego, CA USA.
- H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. “Detecting and characterizing social spam campaigns”. Melbourne, Australia, 2010. ACM.
- F. Schneider, A. Feldmann, B. Krishnamurthy, and W. Willinger. “Understanding online social network usage from a network perspective”. Chicago, Illinois, USA, 2009. ACM.
- G. Stringhini, C. Kruegel, and G. Vigna. “Detecting spammers on social networks”.Austin, Texas, USA,2010. ACM.
- B. Viswanath, M. A. Bashir, M. Crovella, S. Guha, K. P. Gummadi, B. Krishnamurthy, and A. Mislove.“Towards detecting anomalous user behavior in online social networks”. San Diego, CA, Aug. 2014.USENIX Association.
- G. Wang, T. Konolige, C. Wilson, X. Wang, H. Zheng, and B. Y. Zhao.”You are how you click: Clickstream analysis for sybil detection”,Washington D.C., USA, 2013.
- C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. “Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter”,Lyon, France,2012. ACM.
- Nils Kammenhuber, Julia Luxenburger, Anja Feldmann, Gerhard Weikum. “Web Search Clickstreams”. Rio de Janeiro,2006.