Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Detecting cooperative and organized spammer groups in micro-blogging community
Dang Q., Zhou Y., Gao F., Sun Q. Data Mining and Knowledge Discovery31 (3):573-605,2017.Type:Article
Date Reviewed: Jan 4 2018

Public relations (PR) companies hire and pay cooperative and organized spammer groups to post specific content on online microblogging sites, such as Twitter, to influence public opinion or trending topics (topic hijacking). Detecting such spammer groups in Twitter is challenging because they usually disguise themselves as normal users and post many tweets with common content, or they cooperate with each other in retweeting to hijack the trending topics. In addition, the spammer groups intentionally evolve their content and behavior patterns and use distributed strategies to employ only a small fraction of spam accounts to randomly hijack topics. Thus, it is even more difficult to detect them using the traditional approach of analyzing content, account, or behavior features.

The authors leverage the retweeting relationships and present a topology-based method to detect spam groups partially distributed in different trending topics to create influence. The abnormal topics are detected by the abnormal changes of topology characteristics of the retweeting networks. To measure the abnormal hijacked topics, the subgraph ranking method is presented to recognize the similarity of retweet subgraphs among different snapshots of retweet relationships over time in each topic. Once the hijacked topics have been detected, the spammer group detection algorithm works by using label propagation of a few spammer labels and recognizing the sequence of anomalous topics that the spammer joins and the set of users joining the anomalous topic sequences. This is used in calculating a cumulative user authority list, joining the anomalous topics, and clustering them to distinguish the spammer group from normal users.

As spamming attacks in social media become rampant and more sophisticated, identifying spammer groups is a step toward more trusted social media. This paper shows one effective approach to identifying the cause of topic hijacking that can mislead people’s judgment and decisions. I recommend to the authors and other researchers to employ this method to existing datasets to further verify its effectiveness. In addition, the IT companies should provide the online service platforms to adopt the proposed approach to filter out the spammer groups.

Reviewer:  Soon Ae Chun Review #: CR145748 (1805-0249)
Bookmark and Share
  Featured Reviewer  
 
Social Networking (H.3.4 ... )
 
 
Abuse And Crime Involving Computers (K.4.2 ... )
 
 
Data Mining (H.2.8 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Social Networking": Date
Social computing and virtual communities
Zaphiris P., Ang C., Chapman & Hall/CRC, Boca Raton, FL, 2009.  303, Type: Book (978-1-420090-42-0)
Sep 13 2011
A visual analytics approach to dynamic social networks
Federico P., Aigner W., Miksch S., Windhager F., Zenk L.  i-KNOW 2011 (Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies, Graz, Austria, Sep 7-9, 2011)1-8, 2011. Type: Proceedings
Nov 4 2011
Secure collaborative social networks
Zhan J. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 40(6): 682-689, 2010. Type: Article
Feb 8 2012
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy