2021
DOI: 10.1186/s42400-021-00074-w
|View full text |Cite
|
Sign up to set email alerts
|

An efficient hybrid system for anomaly detection in social networks

Abstract: Anomaly detection has been an essential and dynamic research area in the data mining. A wide range of applications including different social medias have adopted different state-of-the-art methods to identify anomaly for ensuring user’s security and privacy. The social network refers to a forum used by different groups of people to express their thoughts, communicate with each other, and share the content needed. This social networks also facilitate abnormal activities, spread fake news, rumours, misinformatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(15 citation statements)
references
References 27 publications
0
15
0
Order By: Relevance
“…The readers can easily access from any place at any time via the Internet. People are now comfortable accessing online news and can quickly share the news contents across the social network media such as WWW, Google, YouTube, Google+, Facebook, Twitter, Instagram, and Line [ 3 , 4 ]. Fake news is a threat to democracy around the world, which has weakened the confidence of governments, newspapers, and civil society.…”
Section: Introductionmentioning
confidence: 99%
“…The readers can easily access from any place at any time via the Internet. People are now comfortable accessing online news and can quickly share the news contents across the social network media such as WWW, Google, YouTube, Google+, Facebook, Twitter, Instagram, and Line [ 3 , 4 ]. Fake news is a threat to democracy around the world, which has weakened the confidence of governments, newspapers, and civil society.…”
Section: Introductionmentioning
confidence: 99%
“…In the proposed framework, the Extreme "flower model" model is used to discover log files as a criterion for an over-general model with high fitness. It allows any behavior (a combination of activities), which causes a highly imprecise process model [34,61,62]. Like this study, some studies reviewed mining techniques and Petri-net discovery algorithms [63][64][65][66][67].…”
Section: Machine Learning-based Approachesmentioning
confidence: 99%
“…The work done in can be consulted for further reading [23] as it compared the various approaches using features, advantages, and disadvantages of each approach. [5] proposed "an efficient hybrid system for anomaly detection in social networks". The model cascaded several machine learning algorithms that included decision tree, Support Vector Machine (SVM) and Naïve Bayesian classifier (NBC) for classifying normal and abnormal users on social networks.…”
Section: Mechanisms For Intrusion Detectionmentioning
confidence: 99%
“…In an attempt to enforce stronger password for authentication, social media users are forced to write their authentication credentials on papers which can also be stolen by hackers, these weaknesses have influenced many researchers to propose several security mechanisms to curtail the activities of these hackers. Some of these proposals include: biometric authentication, hybrid system for anomaly detection in social networks [5],Network Intrusion Detection System [6], [7], [8]etc. All these methods are not suitable for data warehouse security.…”
Section: Introductionmentioning
confidence: 99%