Detecting Suspicious Profiles Using Text Analysis within Social Media

نویسندگان

  • SALIM ALAMI
  • OMAR EL BEQQALI
  • Mohammed Ben Abdellah
چکیده

The exponential advancement in information and communication technology has fostered the emergence of new channels for online discussion and has also reduced distances between people. Unfortunately, malicious people take advantage of this technological achievement in the sense that they use it for illegal purposes. In social media, the users produce several and various formats of suspicious posts (text, image, video...) and exchange them online with other people. The data in most social media sites are stored in text format, so in this work we will focus only on text posts. Text mining is an effective way to add semantics aspect to this communication’s form presenting a significant research challenge. Similarity approach is used in text analysis to detect suspicious posts in social media. The evaluation of our proposed approach is done within real posts.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

A Systematic Review on the Suspicious Profiles Detection on Online Social Media Data

Escalating crimes on digital facet alarms the law enforcement bodies to keep a gaze on online activities which involve massive amount of data. This will raise a need to detect suspicious activities on online available social media data by optimizing investigations using data mining tools. This paper intends to throw some light on the data mining techniques which are designed and developed for c...

متن کامل

Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System

The past few years have witnessed millions of credit/debit cards flowing through the underground economy and ultimately causing significant financial loss. Examining key underground economy sellers has both practical and academic significance for cybercrime forensics and criminology research. Drawing on social media analytics, we have developed the AZSecure text mining system for identifying an...

متن کامل

Identification and Prevention of Multiple Account in Social Media

Identity deception has become an increasingly important issue in the social media environment .The past methods for detecting fake profiles have mainly focused on detecting deception through verbal communication (e.g., speech or text).Although these methods yield a high detection accuracy rate, they are computationally inefficient for the social media environment .The work concentrate on detect...

متن کامل

Detecting Changes in Twitter Streams using Temporal Clusters of Hashtags

Detecting events from social media data has important applications in public security, political issues, and public health. Many studies have focused on detecting specific or unspecific events from Twitter streams. However, not much attention has been paid to detecting changes, and their impact, in online conversations related to an event. We propose methods for detecting such changes, using cl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015