scispace - formally typeset
Journal ArticleDOI

Authorship verification applied to detection of compromised accounts on online social networks

TLDR
A pure text mining approach to check if an account has been compromised based on its posts content and shows that the developed method is stable and can detect the compromised accounts.
Abstract
Compromising legitimate accounts has been the most used strategy to spread malicious content on OSN (Online Social Network). To address this problem, we propose a pure text mining approach to check if an account has been compromised based on its posts content. In the first step, the proposed approach extracts the writing style from the user account. The second step comprehends the k-Nearest Neighbors algorithm (k-NN) to evaluate the post content and identify the user. Finally, Baseline Updating (third step) consists of a continuous updating of the user baseline to support the current trends and seasonality issues of user's posts. Experiments were carried out using a dataset from Twitter composed by tweets of 1000 users. All the three steps were individually evaluated, and the results show that the developed method is stable and can detect the compromised accounts. An important observation is the Baseline Updating contribution, which leads to an enhancement of accuracy superior of 60 %. Regarding average accuracy, the developed method achieved results over 93 %.

read more

Citations
More filters
Journal ArticleDOI

Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches

TL;DR: An expository study of various state-of-the-art techniques to detect two most interlinked apprehensive problems on social networks namely, spam detection and detection-cum-analysis of compromised accounts, providing a strong foundation for future researches to be carried out in this domain.
Journal ArticleDOI

AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique

TL;DR: Authorhip verification has been performed using different textual features such as n-grams, Bag of words (BOW), stylometric and folksonomy features to examine the authorship of tweets posted by the users on the microblogging platform Twitter.
Proceedings ArticleDOI

Recent State-of-the-art of Fake News Detection: A Review

TL;DR: The existing approaches and the new methods proposed by researchers have been summarized and the methods vary according to the content types (textual or image based) so that problem can be tackled in a better way and improved classification results can be obtained.
Journal ArticleDOI

Improving author verification based on topic modeling

TL;DR: The comparison to state‐of‐the‐art methods demonstrates the great potential of the approaches presented in this study and demonstrates that even when genre‐agnostic external documents are used, the proposed extrinsic models are very competitive.
Journal ArticleDOI

Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets

TL;DR: To detect automatic information broadcast in OSN, a wavelet-based model is developed that classifies users as being human, legitimate robot, or malicious robot, as a result of spectral patterns obtained from users’ textual content.
References
More filters

Detecting Spammers on Twitter

TL;DR: This paper uses tweets related to three famous trending topics from 2009 to construct a large labeled collection of users, manually classified into spammers and non-spammers, and identifies a number of characteristics related to tweet content and user social behavior which could potentially be used to detect spammers.
Proceedings ArticleDOI

Uncovering social spammers: social honeypots + machine learning

TL;DR: It is found that the deployed social honeypots identify social spammers with low false positive rates and that the harvested spam data contains signals that are strongly correlated with observable profile features (e.g., content, friend information, posting patterns, etc.).
Journal ArticleDOI

Automatically Categorizing Written Texts by Author Gender

TL;DR: It is shown that automated text categorization techniques can exploit combinations of simple lexical and syntactic features to infer the gender of the author of an unseen formal written document with approximately 80 per cent accuracy.
Proceedings ArticleDOI

@spam: the underground on 140 characters or less

TL;DR: A characterization of spam on Twitter finds that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blacklists, and examines whether the use of URL blacklists would help to significantly stem the spread of Twitter spam.
Related Papers (5)