Spammer detection of social networking sites using 4 novel techniques
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 6
Abstract
Social Networking sites number of users are increasing day by day. Facebook is haing 2 billion users from all over the world. Twitter also having large number of users and they pay the dues if account gets hacked. Many researchers are working on to provide the securities to social networking sites. Providing security to social networking site has become a major task for researcher. Social networking sites have the personal data of users where they interact with each other. But spammers use these sites as platform to spread spam, malware and viruses. There are few techniques which are used to detect the spammers such as machine learning and honey-pot. Spammers are totally aware of these techniques, they know how to penetrate those security techniques and spread the spams. We are introducing novel technique which uses the graph generation, timed based, API based and neighbour based techniques to detect the spammers on social networking sites, which reduces the false positive rate and increases the spam detection rate.
Authors and Affiliations
Sachin H. Bankar
A Survey on Performance Analysis of AODV and DSR
A Wireless network is a collection of autonomous mobile nodes that communicate with each other over wireless links without any fixed infrastructure. It is a method by which homes, telecommunications networks and...
ARM9 Based Navigation System for Vehicles
Vehicle Navigation System is one of the most challenging works today. If any accidents happen then if we know nearest hospital, route to reach hospital then we can have more chance to rescue people. Our project is...
RELIABILITY AND PROFIT EVALUATION OF COMPRESSOR SYSTEM DESCRIBING FAILURES AND DEAL WITH FAILED UNIT ON PRIORITY
The paper presents reliability and profit evaluation of compressor standby system comprising of two units.Initially one unit is operative and the other is in standby state. On failure of any one of the compressor...
A SURVEY OF DATA COMPRESSION TECHNIQUES
Most digital data are not stored in the most compact form. Rather, they are stored in whatever way makes them easiest to use, such as: ASCII text from word processors, binary code that can be executed on a compute...
A SURVEY ON DATA MINING TECHNIQUES, THEIR APPLICATION AND FUTURE SCOPE
Data mining techniques are rapidly growing and used by many researchers in past few years. The main advantage of using data mining is to extracts the knowledge from a huge amount of data which stores in variety of data r...