Mining Product Reviews for Spam Detection Using Supervised Technique



Similar documents
Fraud Detection in Online Reviews using Machine Learning Techniques

Feature Subset Selection in Spam Detection

Social Media Mining. Data Mining Essentials

A Content based Spam Filtering Using Optical Back Propagation Technique

Machine Learning in Spam Filtering

T : Classification as Spam or Ham using Naive Bayes Classifier. Santosh Tirunagari :

On Attacking Statistical Spam Filters

Spam Detection Using Customized SimHash Function

Search and Information Retrieval

Spam Detection A Machine Learning Approach

Bayesian Spam Filtering

A Comparative Study on Sentiment Classification and Ranking on Product Reviews

Detecting Spam Using Spam Word Associations

A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing Classifier

Data Mining Algorithms Part 1. Dejan Sarka

Active Learning SVM for Blogs recommendation

Bing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. ~ Spring~r

International Journal of Research in Advent Technology Available Online at:

Spam Filtering using Naïve Bayesian Classification

Sentiment analysis on tweets in a financial domain

Data Mining Application in Direct Marketing: Identifying Hot Prospects for Banking Product

Chapter 6. The stacking ensemble approach

6367(Print), ISSN (Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME

How To Filter Spam Image From A Picture By Color Or Color

Inner Classification of Clusters for Online News

SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2

An Efficient Spam Filtering Techniques for Account

Naïve Bayesian Anti-spam Filtering Technique for Malay Language

AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM

Towards better accuracy for Spam predictions

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM FILTERING 1 2

Machine Learning Final Project Spam Filtering

Spam Detection on Twitter Using Traditional Classifiers M. McCord CSE Dept Lehigh University 19 Memorial Drive West Bethlehem, PA 18015, USA

Blog Post Extraction Using Title Finding

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

Spam detection with data mining method:

Improving spam mail filtering using classification algorithms with discretization Filter

Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach

Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing

Defending Networks with Incomplete Information: A Machine Learning Approach. Alexandre

Classification Using Data Reduction Method

Experiments in Web Page Classification for Semantic Web

FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS

Contextual Feature Based One-Class Classifier Approach for Detecting Video Response Spam on YouTube

BIDM Project. Predicting the contract type for IT/ITES outsourcing contracts

Keywords social media, internet, data, sentiment analysis, opinion mining, business

The Data Mining Process

Final Project Report

Impact of Feature Selection Technique on Classification

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

Mining a Corpus of Job Ads

A Logistic Regression Approach to Ad Click Prediction

DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7

Spam Filtering with Naive Bayesian Classification

Mining the Software Change Repository of a Legacy Telephony System

An Approach to Detect Spam s by Using Majority Voting

Université de Montpellier 2 Hugo Alatrista-Salas : hugo.alatrista-salas@teledetection.fr

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Keywords Phishing Attack, phishing , Fraud, Identity Theft

SWOT Analysis of E-Commerce

Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis

A Survey on Spam Filtering for Online Social Networks

Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100

Supervised Learning (Big Data Analytics)

OPINION MINING IN PRODUCT REVIEW SYSTEM USING BIG DATA TECHNOLOGY HADOOP

SOPS: Stock Prediction using Web Sentiment

Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type.

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification

Role of Social Networking in Marketing using Data Mining

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

Machine Learning using MapReduce

Adaption of Statistical Filtering Techniques

Dr. D. Y. Patil College of Engineering, Ambi,. University of Pune, M.S, India University of Pune, M.S, India

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, HIKARI Ltd,

Some fitting of naive Bayesian spam filtering for Japanese environment

Data Mining in CRM & Direct Marketing. Jun Du The University of Western Ontario jdu43@uwo.ca

Comparison of K-means and Backpropagation Data Mining Algorithms

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL

Kaspersky Anti-Spam 3.0

Anti Spamming Techniques

University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task

Why Content Filters Can t Eradicate spam

Spam Detection and the Types of

Web Document Clustering

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware

Equity forecast: Predicting long term stock price movement using machine learning

IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION

Machine learning for algo trading

Forecasting stock markets with Twitter

Anti-Spam Methodologies: A Comparative Study

Machine Learning with MATLAB David Willingham Application Engineer

CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance

How To Create A Text Classification System For Spam Filtering

Data Mining. Nonlinear Classification

VCU-TSA at Semeval-2016 Task 4: Sentiment Analysis in Twitter

Cross-Validation. Synonyms Rotation estimation

Fighting spam in Australia. A consumer guide

Transcription:

Mining Product Reviews for Spam Detection Using Supervised Technique M. Daiyan 1, Dr. S. K.Tiwari 2, M. A. Alam 3 1 Research Scholar, Institute of Computer Science & IT, Magadh University, Bodh Gaya. 2 Associate Professor, PG Department of Mathematics, Magadh University, Bodh Gaya. 3 Research Scholar, School of Computer Science, Singhania University, Rajasthan Abstract By the introduction of web 2.0 and cheap accessibility of web, many merchant sites are operating and providing space for their users to share their experiences in form of customer reviews. Such reviews contain precious knowledge useful for both customers as well as manufacturers. E-customer accesses these reviews to know opinion expressed by existing users on a product before making purchase decision. Further, such reviews are used by manufactures to know shortcoming in their existing products as well as to know strength of a competitor products for making business plans. Since Internet has no quality control, anyone can write anything which results in low quality reviews that contain biased information known as spam, and may mislead the customer affecting his buying decisions. Thus, it is very essential to have a mechanism which is capable of assessing the trustworthiness of reviews for proper decision making or for marketing intelligence. In this paper we propose a supervised method for spam detection. Dataset are taken from merchant sites like amazon.com. However our experimental results show our proposed method is very effective over the existing method. Keywords-- Text Mining, Feature Extraction, opinion Mining I. INTRODUCTION The Internet is public cooperated & self sustaining facility accessible to billions of people worldwide.internet which literary means network of networks includes the use of information entertainment, socialization, education and advertisement. Internet is growing fields now days. It has got impetus in the last decade of the century. The Internet has a lot of potential as commercial medium. Introduction of Web 2.0, use of internet becomes more flexible as far as the possibility of choosing technologies is concerned. Easier and faster access to information, when and where it is needed is possible. Also, it integrates verity of technologies in the teaching-learning activities. It promotes amateurishness by invaluable contents generated by users. Due to rapid expansion of e-commerce, web documents are receiving great attention as a new medium that describes individual experiences. Due to the existence of numerous merchant sites, forums, discussion groups and blogs, individual users are participating more actively and generating vast amount of new data which is symbolized by new terms such as Blog journalism, Consumer generated mediums and User Generated Contents. As customer feedbacks on the Web influence other customer s decision, these feedbacks have become an important source of information for business to take into account while developing marketing and product development plans. It has been observed that user generated contents includes junk and unnecessary information known as spam, whose identification is important to safeguard the interest of large web community. Spam is basically an electronic message system (including most broadcast media, digital delivery systems) to send Spontaneous bulk messages aimlessly same message large number of recipients on the Internet1. Most spam on the Internet today is advertisements from individuals and the occasional small business looking for a way to make a fast buck. Spam messages are usually sent using sophisticated techniques designed to mask the messages true senders and points of origin. There exist difference between electronic spam and conventional marketing techniques, thus identification and development of preventive methods is required to stop spam, otherwise it could ultimately destroy the usefulness of the Internet. Following sub-section describes types of spam. 1.1 Types of Spam 1.1.1 Email Spam: Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses 1. 1.1.2 Comment Spam: Another category includes, comment spam which is widely used by spammer by posting comments for their nefarious purpose1. 619

1.1.3 Instant Messaging spam: This type of spam makes use of instant messaging systems. Instant messaging (IM) is a form of real-time direct text-based chatting communication in push mode between two or more people using personal computers or other devices, along with shared clients. Text is conveyed over a network. It is very common on many instant messaging systems such as Skype 1. 1.1.4 Junk Fax: It is form of telemarketing where unsolicited advertisements are sent via fax transmission. Junk faxes are the faxed equivalent of spam or junk mail. It is an advertising medium 1. 1.1.5 Unsolicited Text Messages Spam or SMS Spam: This type of spam (SMS) is hard to filter. SMS spam is going to be the next big challenge as the fast development of technology allows SMS spam to be sent at relatively low cost using Internet SMS portals 1. 1.1.6 Social Networking Spam: It is spam directed at users of internet social networking services such as MySpace, Facebook or LinkedIn. The Users of social networking services can send note that include embedded links to other social network locations or even outside sites, to one another. This is where the social network spammer comes in. Utilizing the social network's search tools, target ----------------------------------------------------------------------- - [1] http://en.wikipedia.org/wiki/spam_(electronic) a certain demographic segment of the users, or use common fan pages or groups to send notes to them from an account disguised as that of a real person. Such notes may include embedded links to pornographic or other product sites designed to sell something1. 1.1.7 Review Spam: In merchant sites such as www.amazon.com, www.cnet.com etc. review spam is designed to give unfair view of some products so as to influence the consumer perception of the products by directly or indirectly inflating or damaging the product s reputation. It was found that 10 to 15% of reviews essentially echo the earlier reviews and may potentially be influenced by reviews spam [1]. There exist three types of review spam: Type 1 (Untruthful opinions): It purposely mislead readers or opinion mining system by giving undeserving positive reviews to some target objects in order to promote the objects and or by giving malicious negative reviews to some other objects in order to damage the reputation. Type 2 (reviews on brands only): Spam that comments only the brands, the manufacturers or the sellers of the products. Although they may be useful, it is consider as spam because they are not targeted at the specific products and are often biased. Type 3 (non-reviews): It is non-reviews, which have two main sub-types: (a) advertisements and (b) other irrelevant reviews containing no opinions (e.g., questions, answers, and random texts). Spam detection can be regarded as a classification problem with two classes, spam and non-spam. However, due to the specific nature of different types of spam, it requires dealing in different ways. For spam reviews of type 2 and type 3, detection can be based on traditional classification learning using manually labeled spam and non-spam reviews because these two types of spam reviews are recognizable manually[2]. It is important to identify and filter out the review spam. There is no reported study on the trustworthiness of opinions in reviews. As internet has no quality control, anyone can write anything on the web which results in many low quality reviews, and worse still review spam which is often biased and may mislead the customer affecting his buying decisions. Thus, it is very essential to have a mechanism which is capable of assessing the trustworthiness of reviews for proper decision making or for marketing intelligence. Trusted customer reviews are useful for both potential buyers and product manufacturers. It is more convenient and less time consuming for buyer to see at a glance feature by feature comparison of reviews written by most of the customers in taking buying decisions without getting biased and product manufacturer gets to know strengths and weaknesses of his/her own products and also that of the competitors, consumer preferences and interests by which profits could be maximized [3]. II. RELATED WORK A Spam is many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send most of the costs are paid for by the recipient or the carriers rather than by the sender. In [1], the author proposes scoring methods to measure the degree of spam for each reviewer and apply them on an Amazon review dataset. They mainly focus on Spam found in online product review sites commonly known as, review spam or opinion spam. 620

Study in [2], attempts to detect a review is a spam or a non spam, in order to provide a trusted review to help the customer in making the proper buying decision. The trustworthiness of the reviews is assessed as spam or a non spam review which includes both duplicate and near duplicate reviews classified as spam reviews, and partially related and unique reviews classified as non spam reviews. The author have proposed a novel and effective technique, namely Shingling technique, for detecting spam reviews based on the product features that have been commented in the reviews. In [4], a preliminary study was performed and it has been stated that, review spam detection is a relatively new research problem which has not yet been well studied. A more in-depth investigation has been done in [5] in which, three types of review spam were identified, namely untruthful reviews (reviews that promote or defame products), reviews on brands but not products, and nonreviews (e.g., advertisements). By representing a review using a set of review, reviewer and product-level features, classification techniques are used to assign spam labels to reviews. In particular, untruthful review detection is performed by using duplicate reviews as labeled data. Further researchers attempted in [6], identify items that are targets of spamming by identifying singleton reviews on the reviewed items. Singleton reviews are the reviews written by users who contribute only one review each. These users subsequently contribute no other reviews. Proportion of positive singleton reviews, concentration of positive singleton reviews, and rating distortion caused by singleton reviews are thus used to analyses possibly spammed hotels in Trip Advisor [4]. Study in [7], performs on usability of linguistic features in the Web spam classification task. The features were computed on two Web spam corpora i.e. Webspam-Uk2006 and Webspam- Uk2007. Further in [8], Miklos Spam Filtering in Internet Archives illustrate spam filtering needs, opportunities and blockers for Internet archives via analyzing several crawl snapshots and the difficulty of grating filter models across different crawls via the example of the 13.uk snapshots performed by UbiCrawler that include WEBSPAM- UK2006 and WEBSPAMUK2007. Keeping in mind the above, our assumption is that effective spam detection and filtering system is required to save the interest of e- community from spam. III. SPAM DETECTION TECHNIQUE In general, spam detection techniques can be broadly classified in to two types namely Supervised Techniques and Unsupervised Techniques. A further detail of these techniques is given in following sub section. 3.1 Supervised Technique: Supervised spam detection techniques require labeled review spam data set to identify review spam. Its uses several supervised methods, including SVM, logistic regression, Naive Bayes etc. 3.2 Unsupervised Techniques: In unsupervised methods refers to problem of trying to find hidden structure in unlabeled data. Unsupervised methods consist of: clustering (e.g., k-means, mixture models, hierarchical clustering), Blind signal separation using feature extraction technique for dimensionality reduction. IV. MOTIVATION AND PURPOSED WORK Spam is a big problem facing by Internet community in today s world. As internet has no quality control, anyone can write anything on the web which results in many low quality reviews, and worse still review spam which is often biased and may mislead the customer affecting his buying decisions. Thus, it is very essential to have a mechanism which is capable of assessing the trustworthiness of reviews for proper decision making or for marketing intelligence. The information contained in a review message is divided into two fields first the header (details containing general information on the message, such as the subject, sender and recipient) and body (the actual contents of the message). Before the available information can be used by a classifier in a filter, appropriate pre-processing steps are required. We have purpose supervised classification approach for spam filtering. The main steps involved in our work consist of following components. Web Crawler: used to download target documents from merchant / web sites & store locally in database for further processing. Document Pre-processor: converts the set of words present in the message to a specific format required by the machine learning algorithm. In documents Pre-processor main steps are followings: Tokenization: used to extracts the word from messages. Lemmatization: it reduces words to their root forms (e.g., getting to get). Word Remover: remove words that frequently happen in many messages. 621

Review website International Journal of Emerging Technology and Advanced Engineering Spam classifier: classifies the message or documents are spam or legitimate using supervised classification techniques. V. DATASET For an experiment we use product reviews which are obtained from various merchant sites like www.amazon.com. It is very large and covers all range of products. In amazon site, there is a facility for users can evaluate the posted review after the review is posted. The user can provide achieve to symbolize if this review is helpful, or write comments for the reviews. To review spam, we manually build a review spam corpus. In this work we used different products of mobile and camera. The Dataset consist of 600 product reviews which are crawled from amazon.com. Spam or Legitimate Crawler Document Preprocessor Feature Extraction SVM, NB Classification Fig.I: Main Steps involved in Spam Filter Spam Review 10 fold cross validation Product Name Table I Datasets of different camera. Review Spam Legitimate Sony 115 55 60 Nikon 100 39 61 Acer 120 50 70 Samsung 150 80 70 Konica 115 75 40 VI. EXPERIMENT We used supervised learning model to build review spam or legitimate detectors based on the product features. These models or classifier forecast definite class labels. In a product review, to find whether a review is spam or legitimate, a model or classifier is constructed to envisage class labels, such as Spam or Legitimate. Firstly supervised learning model builds the classifier by analyzing or learning from a training set made up of database tuples and their associated class labels. In the second step, the model is used for classification [9]. We used 10-fold cross validation to calculate performance of our system. We use support for value of the patterns and build a feature vector for each sample. Subsequently we applied support vector machine as classifier. We conduct the experiments using Weka [10] and SVM light tools to train Naïve Bayes and Support Vector Machine classifiers respectively. The data has been described in Section 5. We divided the data set into training set and test set and conducts 10-fold crossvalidation: the data set is randomly split into ten folds, where nine folds are selected for training and the tenth fold is selected for test. We calculate experimental results using standard Information Retrieval (IR) metrics Precision, Recall and F-score. Where TP indicates true positive FP indicates false positive and FN indicates false negatives. 622

Product Name International Journal of Emerging Technology and Advanced Engineering Table 2 Result of different camera model dataset TP FP FN Precision Recall F1-score Accuracy NB- FM NB- Accuracy SVM- FM Sony 41 26 31 81.50 57.81 71.15 91.46 89.32 89.49 93.76 94.78 Nikon 60 28 76 74.83 42.97 73.16 85.02 86.79 82.34 86.71 92.43 Acer 48 29 67 66.67 41.12 64.71 89.85 89.91 91.78 94.71 94.95 Samsung 36 31 22 71.43 64.00 74.29 89.90 91.71 89.76 91.79 91.89 SVM- Accuracy Konica 26 16 17 78.20 48.94 69.16 88.14 89.76 88.78 94.89 95.96 Figure II: A comparisons of Precision, Recall, F-score and Accuracy values of different camera 100 95 90 85 80 75 100 80 60 40 20 0 VII. RESULTS & DISCUSSION Sony Nikon Acer FigIII: A comparison of Naive Bayes and Support vector Machine. VIII. CONCLUSION AND FUTURE WORK Samsung Konica NB-FM NB-Accuracy SVM-FM In this paper, we represent a method to identify product review Spam or Legitimate. We applied SVM and Naïve Bayes classifier on different dataset of camera and its performance was evaluated manually. We use SVM light and Weka tools for conducting the experiments. Our results shows that our proposed method is effective in compared to similar method. In future, we try improving our accuracy with same corpus using another method. REFERENCES [1] Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Detecting Product Review Spammers using Rating Behaviors, CIKM 10,October 26-30,2010,Toronto,Ontario. [2] Nitin Jindal Bing Liu, Opinion Spam and Analysis, WSDM 08, February 11-12, 2008, Palo Alto, California, USA. [3] Siddu P. Algur, Amit P. Patil, P.S Hiremath, S. Shivshankar, Spam Detection of Customer Reviews from Web Pages. [4] Nitial Jindal,Bing Liu,Review Spam Detection, WWW 2007, May 8 12, 2007, 1189-1190,Banff, Alberta, Canada. [5] E.Peng, Lim,V.A.Nguyen, N.Jindal, Detecting Product Review Spammers using Rating Behaviors,CIKM 10,October 26-30,2010, Toronto, Ontario, Canada. [6] G. Wu, D. Greene, B. Smyth, and P. Cunningham, Distortion as a validation criterion in the identification of suspicious review, Technical ReportUCD-CSI-2010-04, University College Dublin, 2010. [7] J. Piskorski, M. Sydow, D.Weiss, Exploring Linguistic Features for Web Spam Detection: A Preliminary Study, AIRWeb 08, April 22, 2008 Bejing, China. [8] Miklos, Andras A. Benczur, J,Masanes, D. Siklosi, Web Spam Filtering in Internet Archieves, AIRWeb 09,April 21, 2009 Madrid, Spain. [9] M. Ramzara, A.Ramzara, M. Narouuei, Textual Spam Detection: An Iterative Pattern Mining Approach, World Applied Sciences Journal 20(2): 198-204, 2012, ISSN 1818-4952. [10] Wekato, Weka 3: Data Mining open source Software, 2008. Available: http//www.cs.wekato.ac.nz/ml/weka. 623