Fake Accounts Identification in Mobile Communication Networks Based on Machine Learning

نویسندگان

چکیده

Fake accounts on online social networks are increasing today with an increase in the number of active network users. Social media websites allow users to share thoughts, facts, views and re-sharing these into various networks. platforms provide enormous valuable information but this great amount media, many issues like fake profile, hacking have also grown. The profiles sites create news unwanted material which contains spam links that affect natural massive issue communication is it necessary identify stop spam. In paper, a supervised machine learning algorithm called support vector (SVM) used effectively. order automatically profiles, Random Forest classifier SVM. With concept, can be applied easily millions cannot examined manually. result model compared other identification techniques results show proposed performs better high precision recall. This method efficiently safeguards from threats attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of Fake Accounts in Social Networks Based on One Class Classification

Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...

متن کامل

Identification Psychological Disorders Based on Data in Virtual Environments Using Machine Learning

Introduction: Psychological disorders is one of the most problematic and important issue in today's society. Early prognosis of these disorders matters because receiving professional help at the appropriate time could improve the quality of life of these patients. Recently, researches use social media as a form of new tools in identifying psychological disorder. It seems that through the use of...

متن کامل

Combating QR-Code-Based Compromised Accounts in Mobile Social Networks

Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential t...

متن کامل

Creating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks

Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...

متن کامل

Creating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks

Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of interactive mobile technologies

سال: 2023

ISSN: ['1865-7923']

DOI: https://doi.org/10.3991/ijim.v17i04.37645