A Framework for Detection of Accuracy of Spam in Twitter

Authors

  • Naik P Student, Department of Computer Science, East west Institute of Technology, Bangalore, India
  • Monisha S Student, Department of Computer Science, East west Institute of Technology, Bangalore, India
  • Shetty S Student, Department of Computer Science, East west Institute of Technology, Bangalore, India
  • Pooja NR Student, Department of Computer Science, East west Institute of Technology, Bangalore, India
  • Anoop N Prasad Student, Department of Computer Science, East west Institute of Technology, Bangalore, India

Keywords:

Twitter, tweets, spam,, navie bayes, natural lanugage processing

Abstract

With millions of users tweeting around the world, real time search systems and different types of mining tools are emerging to allow people tracking the repercussion of events and news on Twitter. Trending topics, the most talked about items on Twitter at a given point in time, have been seen as an opportunity to generate traffic and revenue. Spammers post tweets containing typical words of a trending topic and URLs, usually obfuscated by URL shortness, that lead users to completely unrelated websites. This kind of spam can contribute to de-value real time search services unless mechanisms to fight and stop spammers can be found. To solve this issue, we propose to take tweet text features along with user -based features. We have evaluated our approach with natural language processing and the naïve-Bayes machine learning algorithm.

References

[1] C. P.-Y. Chin, N. Evans, and K.-K. R. Choo, “Exploring factors influencingthe use of enterprise social networks in multinational professionalservice firms,” J. Organizat. Comput. Electron. Commerce, vol. 25, no. 3, pp. 289–315, 2017.

[2] H. T sukayama, “Twitter turns 7: Users send over 400 million tweets per day,” Washingon Post, Mar. 2017.

[3] T. Wu, S. Liu, J. Zhang, and Y. Xiang, “Twitter spam detection based on deep learning,” in Proceedings of the Australasian Computer Science Week Multiconference, ser. ACSW ’17. New York, NY,USA.

[4] C. Chen, J. Zhang, X. Chen, Y. Xiang, and W. Zhou, “6 million spam tweets: A large ground truth for timely twitter spam detection,” in 2016 IEEE International Conference on Communications (ICC), June 2015, pp. 7065–7070.

[5] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, “Detecting spammer on Twitter,” presented at the 7th Annu. Collab. Electron. Messaging Anti-Abuse Spam Conf., Redmond, WA, USA, Jul. 2017.

[6] L. Timson, “ Electoral commission Twitter account hacked, voters asked not to click,” Sydney Morning Herald, Aug. 2013 [Online]. Available: http://www.s mh.com.au/it-pro/security- it/electoral-commission-twitteraccount- hacked-voters-asked- not-to-click-20130807-hv1b 5.html

[7] Z. Miller, B. Dickinson, W. Deitrick, W. Hu, and A. H. Wang, “Twitter spammer detection using data stream clustering,” Inf. Sci., vol. 260, pp. 64– 73.

[8] K. Thomas, C. Grie r, D. Song, and V. Pa xson, Suspended accounts in retrospect: An analysis of Twitter spam,” in Proc. ACM SIGCOMM Conf. Internet Meas., pp. 243– 258.

[9] K. Thomas, C. Grie r, D. Song, and V. Pa xson, Suspended accounts in retrospect: An analysis of Twitter spam,” in Proc. ACM SIGCOMM Conf. Internet Meas.,pp. 243– 258.

[10] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, “Detecting spammers on twitter,” in In Collaboration, Electronic messaging, Anti- Abuse and Spam Conference.

[11] C. Pash., “The lure of Naked Hollywood Star Photos Sent the Internet into Meltdown in New Zealand, Bus. Insider, accessed on Aug. 1, 2015,” https://tinyurl.com/yc93ssj4,2017.

[12] “BotMaker,” blog.twitter,us/a/2014fighting-spam-with-botmaker.

[13] Witten and E. Frank. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, 2016.

[14] C. Wu, K. Cheng, Q. Zhu, and Y. Wu. Using visual features for anti-spam filtering. In IEEE Int’l Conference on Image Processing (ICIP), 2017.

[15] Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: Signatures and characteristics. In ACM SIGCOMM,.

[16] D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics: Using statistical analysis to locate spam web pages. In Int’l Workshop on the Web and Databases (WebDB),.

[17] S. Garriss, M. Kaminsky, M. Freedman, B. Karp,

[18] D. Mazi`eres, and H. Yu. Re: Reliable email. In USENIX Conference on Networked Systems Design & Implementation (NSDI), 2016.

[19] Z. Gy¨ongyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with trustrank. In Int’l. Conference on Very Large Data Bases (VLDB), 2017.

[20] P. Heymann, G. Koutrika, and H. Garcia-Molina. Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Computing, 11, 2017.

[21] A Framework for Real-Time Spam Detection in Twitter

Himank Gupta, Mohd. Saalim Jamal, Sreekanth Madisetty and Maunendra Sankar Desarkar Department of Computer Science and Engineering,Indian Institute of Technology Hyderabad, India,2018.

Downloads

Published

2025-11-26

How to Cite

[1]
P. Naik, S. Monisha, P. NR, P. NR, and A. N. Prasad, “A Framework for Detection of Accuracy of Spam in Twitter”, Int. J. Comp. Sci. Eng., vol. 7, no. 15, pp. 105–110, Nov. 2025.