An Effective Twitter Spam Detection Model using Multiple Hidden Layers Extreme Learning Machine
Keywords:
Twitter, spam detection, machine learning, word2vector, extreme learning machineAbstract
In contemporary times, social networking sites have gained widespread popularity as tools for interaction and communication. Among these platforms, Twitter holds a significant position, facilitating news consumption, idea sharing, social discourse, and interpersonal communication. However, due to its wide user base, Twitter has also become a breeding ground for spam activities. Numerous studies have been conducted to detect spam on Twitter, employing both traditional and machine learning models. Addressing this issue, this paper introduces an innovative approach to Twitter spam detection using a multi-layered extreme learning machine (MELM). Additionally, the Word2Vec model is employed to map words in the dataset into multi-dimensional vectors. By introducing multiple hidden layers and adaptively initializing weights connecting input, first hidden layer, and bias, the MELM model advances beyond the conventional ELM model. The application of the least squares technique aids in determining output weights for the network. To assess the efficacy of the MELM model in detecting spam, extensive experiments were conducted on three spam datasets. The results demonstrate the MELM model's proficiency, achieving an accuracy of 0.8817, precision of 0.9057, recall of 0.8650, and an F-Score of 0.8848.
Downloads
References
Benevenuto F, Magno G, Rodrigues T, et al. Detecting spammers on twitter. Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS); Vol. 6; 2010. p. 12.
A.-Z. Ala’M, J. Alqatawna, H. Faris, Spam profile detection in social networks based on public features, in: 2017 8th International Conference on information and Communication Systems (ICICS), IEEE, 2017, pp. 130–135.
A.K. Ameen, B. Kaya, Detecting spammers in twitter network, Int. J. Appl. Math. Electron. Comput. 5 (4) (2017) 71–75.
F. Benevenuto, G. Magno, T. Rodrigues, V. Almeida, Detecting spammers on twitter, in: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), 6, 2010, p. 12.
K. Lee, J. Caverlee, S. Webb, Uncovering social spammers: social honeypots+ machine learning, in: Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, ACM, 2010, pp. 435–442.
C. Chen, J. Zhang, X. Chen, Y. Xiang, W. Zhou, 6 million spam tweets: A large ground truth for timely twitter spam detection, in: 2015 IEEE international conference on communications (ICC), IEEE, 2015, pp. 7065–7070.
G. Stringhini, C. Kruegel, G. Vigna, Detecting spammers on social networks, in: Proceedings of the 26th annual computer security applications conference, ACM, 2010, pp. 1–9.
A.H. Wang, Don’t follow me: Spam detection in twitter, in: 2010 international conference on security and cryptography (SECRYPT), IEEE, 2010, pp. 1–10
M. Fazil, M. Abulaish, A hybrid approach for detecting automated spammers in twitter, IEEE Trans. Inf. Forensics Secur. 13 (11) (2018) 2707–2719.
C. Yang, R. Harkreader, G. Gu, Empirical evaluation and new design for fighting evolving twitter spammers, IEEE Trans. Inf. Forensics Secur. 8 (8) (2013) 1280–1293.
T. Wu, S. Liu, J. Zhang, Y. Xiang, Twitter spam detection based on deep learning, in: Proceedings of the australasian computer science week multiconference, ACM, 2017, p. 3.
X. Ban, C. Chen, S. Liu, Y. Wang, J. Zhang, Deep-learnt features for twitter spam detection, in: 2018 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), IEEE, 2018, pp. 208–212.
S. Lai, L. Xu, K. Liu, J. Zhao, Recurrent convolutional neural networks for text classification, Twenty-ninth AAAI conference on artificial intelligence, 2015.
L. Mou, H. Peng, G. Li, Y. Xu, L. Zhang, and Z. Jin, “Discriminative neural sentence modeling by treebased convolution,” arXiv preprint arXiv:1504.01106, 2015 Apr 5.
K.S. Tai, R. Socher, and C.D. Manning, “Improved semantic representations from tree structured long short-term memory networks,” arXiv preprint arXiv:1503. 00075, 2015 Feb 28.
Xiao, D., Li, B. and Mao, Y., 2017. A multiple hidden layers extreme learning machine method and its application. Mathematical Problems in Engineering, 2017.
Gulati, M. ., Yadav, R. K. ., & Tewari, G. . (2023). Physiological Conditions Monitoring System Based on IoT. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 199–202. https://doi.org/10.17762/ijritcc.v11i4s.6514
Wang Wei, Natural Language Processing Techniques for Sentiment Analysis in Social Media , Machine Learning Applications Conference Proceedings, Vol 1 2021.
Wang Wei, Natural Language Processing Techniques for Sentiment Analysis in Social Media , Machine Learning Applications Conference Proceedings, Vol 1 2021.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.