2014
DOI: 10.5120/14877-3279
|View full text |Cite
|
Sign up to set email alerts
|

Techniques to Detect Spammers in Twitter- A Survey

Abstract: With the rapid growth of social networking sites for communicating, sharing, storing and managing significant information, it is attracting cybercriminals who misuse the Web to exploit vulnerabilities for their illicit benefits. Forged online accounts crack up every day. Impersonators, phishers, scammers and spammers crop up all the time in Online Social Networks (OSNs), and are harder to identify. Spammers are the users who send unsolicited messages to a large audience with the intention of advertising some p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 45 publications
(20 citation statements)
references
References 18 publications
0
19
0
1
Order By: Relevance
“…Previous research (Verma et al 2014) and Twitter rules (Twitter Rules) suggest that this ratio should be 1 for a genuine user and very less for a spammer. While looking at the calculated values of this feature for the collected dataset, nothing could be concluded as the values were not in any specific range.…”
Section: No Of Followers/no Of Followingsmentioning
confidence: 97%
“…Previous research (Verma et al 2014) and Twitter rules (Twitter Rules) suggest that this ratio should be 1 for a genuine user and very less for a spammer. While looking at the calculated values of this feature for the collected dataset, nothing could be concluded as the values were not in any specific range.…”
Section: No Of Followers/no Of Followingsmentioning
confidence: 97%
“…Then, the data mining or text classification algorithm is used to detect the overall spam [3] . [4] In this paper the techniques available for detection of spammers in Twitter have been presented along with their analysis and comparison. This paper is structured as follows: Section 2 describes methodology used to carry out this review; followed security issues in OSNs which have been briefed in Section 3; Section 4 presents definition of spammers and their motives; Introduction to Twitter and its threats has been covered in Section 5; Section 6 is about the motivation behind this survey paper; Section 7 covers the attributes that can be used for detection purpose; Section 8 reviews the work done by various researchers with a comparative analysis [4] .…”
Section: Spam Detection and Filtration Using Data Mining For Sociamentioning
confidence: 99%
“…We refer readers to [6] for a recent review. However, according to [6], existing spammer-detecting mechanisms rely mainly on user profiles or the tweets of users to differentiate spammers from others. In this paper, we argue that social relations should also be utilized to defend against spammers.…”
Section: Introductionmentioning
confidence: 99%