A NEW APPROACH TO FILTER SPAMS FROM ONLINE SOCIAL NETWORK USER WALLS



Similar documents
A Survey on Spam Filtering for Online Social Networks

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS

Filtering Status Messages in Online Social Services

Spam Filtering in Online Social Networks Using Machine Learning Technique

Introduction to Social Networking. Tim Trampedach, RockYou!

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System

Social Media Statistics. What is going on out there

Note: For campaigns, plan the whole thing before you start! Lisa Hodges, Online Fundraising and Social Media Workshop

Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down.

smart. uncommon. ideas.

INTERNET MARKETING. SEO Course Syllabus Modules includes: COURSE BROCHURE

City of Edmonton Social Media Guidelines

SOCIAL MEDIA MARKETING 101. By Debbie Laskey, MBA

DIGITAL MARKETING TRAINING

INTRODUCTION TO SOCIAL MEDIA

Social Media Marketing. Hours 45

Search Engine Optimization Guide CONTENTS. 1.0 What is SEO?

Social Media Guidelines

The Experts Guide to Keyword Research for Social Media. A WordStream Guide

WSI White Paper. Prepared by: Francois Muscat Search Engine Optimization Expert, WSI

Your Business s Online Check-Up

Small Business Internet Marketing: Just What You Need to Know. ecape 900 Route 134 South Dennis, MA x10

Social Media Creating an Approach That Will Bring You More Business

Keyword Research for Social Media

Technology for Small Business

105 Tasks You Can Outsource To Virtual Assistants

Essential Communication Methods for Today s Public Social Media 101. Presented by Tom D. Trimble, CIO Tulsa County Government

Why Digital Marketing?

Social Media Influencer Survey 2014

SEO Search Engine Optimization. ~ Certificate ~ For: By. and

What You Need to Know Before Distributing Your Infographic

The Five Biggest MISSED Internet Marketing Opportunities Most Lawyers Don't Know About

Online Reputation Management Services

MARKETING KUNG FU SEO: Key Things to Expand Your Digital Footprint. A Practical Checklist

Website, Blogs, Social Sites : Create web presence in the world of Internet rcchak@gmail.com, June 21, 2015.

SOCIAL NETWORKS AND STUDENTS' FUTURE JOBS

Sample Social Media Strategic Plan

DEVELOPING A SOCIAL MEDIA STRATEGY

Youtube Search Engine Optimization (SEO) - How to Rank a Youtube Video:

Developing a Social Media Marketing Plan

The 2012 State of Web and Social Media Analytics in Higher Education

From Grassroots to the Cloud

Automatic measurement of Social Media Use

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Presented by David Vane

[Example] Social Media Acceptable Use Policy

Social Media Marketing for Small Business Demystified

Oracle Cloud Marketplace Get Partner Solutions for Oracle Cloud

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

Search Engine Optimization Report (BTW 490: Workplace Writing in a Digital Age)

Marketing Tips. From M R K Development

Social Media Monitoring, Planning and Delivery

SEO Consulting Services By Cromosys. [Strategy & Plan]

Solving the Unique Challenges of IT Recruiting

INTRODUCTION TO THE WEB

Social Media and how Parks can benefit from it

10 Actionable SEO Tips for Small Businesses

SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2

A How-to Guide to Social Media Marketing

I N D U S T R Y T R E N D S & R E S E A R C H R E P O R T S F O R I N D U S T R I A L M A R K E T E R S. Social Media Use in the Industrial Sector

SEO - SMO- SEM - PPC - VSEO

DIGITAL MARKETING. The Page Title Meta Descriptions & Meta Keywords

What is Data Science? Girl Develop It! Meetup Renée M. P. Teate, March 2015

How To Be Successful With Social Media And Marketing

Digital Strategy Social Media Branding & Design Search Mobile Marketing

SEO & CONTENT MARKETING SERVICES

Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS

Introduction to Social Media

TRICKS AND TACTICS TO ONLINE LEADS

Clarity High School Student Survey

Web School: Search Engine Optimization

SPONSORSHIP OF TWO WHEEL THUNDER TV

Prof,Sanjay Hanji Associate Professor Department of Management Studies Basaveshwar Engineering College, Bagalkot Karnataka, India

Social Media Glossary of Terms

10 Social Media Tips for Your Dental Practice

MY DIGITAL PLAN MY DIGITAL PLAN BROCHURE

Social Media Boot Camp

Grow Your Business With Digital Marketing

Guide to Social Marketing for Tourist Destinations & Travel Agents Introduction

Guerrilla Marketing Tactics

Media. Are You Involved?

SOCIAL MEDIA ADVERTISING STRATEGIES THAT WORK

LGBT Social Media & Web 2.0 Marketing. 5/16/2013 LGBT Social Media & Web 2.0 Marketing

Your Trade Show Participation

Internet Marketing Institute Delhi Mobile No.: DIMI. Internet Marketing Institute Delhi (DIMI)

INTERNET MARKETING SERVICES (IMS)

Social Networking: Building Your Personal Brand. Speaker: Tom Jackson, Sale Fish Marketing

10 Ways To Use Social Media To Build Your List

COMPUTER SCIENCE: MISCONCEPTIONS, CAREER PATHS AND RESEARCH CHALLENGES

Salesforce ExactTarget Marketing Cloud Radian6 Mobile User Guide

SEO: What is it and Why is it Important?

The 2011 State of Inbound Marketing

Entrepreneurship /Skill Development On. Digital Marketing

Social Media Business Partner Advertising Kit. Click to add text IBM Corporation

101 Basics to Search Engine Optimization. (A Guide on How to Utilize Search Engine Optimization for Your Website)

THE GROWING ROLE OF SOCIAL MEDIA IN TOURISM MARKETING

experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation

Thinking Social Insights. White Paper

Search Engine Optimization & Social Media

LLNL Approved Document

Transcription:

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A NEW APPROACH TO FILTER SPAMS FROM ONLINE SOCIAL NETWORK USER WALLS M. Bhavish Santhosh Kumar 1, G. V. R. Reddy 2 1 Computer Networks Information Security, bhavishsanthoshkumar@gmail.com 2 Computer Science Engineering, gvr_reddi@yahoo.co.in JNTU Hyderabad, India Abstract Nowadays, Internet has become the part of our daily lives with many reasons. Social networking sites are the main reason to make interactions and to maintain human relationships by using the internet. To maintain healthy relationships user need to get some support from the Online Social Networks, to avoid spam messages posted on their walls. But now, due to the lack of support user can't handle these messages directly to discard from their walls. This little drawback leads to spoil the entire network of the user. I propose a system to filter spam messages from user walls which can be achieved through content-based filtering. Keywords: spam, online social networking, messages, user walls, user control, content based filtering 1. Introduction Technology has been developed and the internet users have been increased quite rapidly in the past 10 years [3]. Most of the internet users are spending much time on watching videos and social networking [4]. Now a day's online social networks have become the most common need to everyone since of the features facilitated by the social networks. The features facilitated by online social networks are - a. Multimedia : Multimedia applications like photo sharing, video sharing, audio sharing are the elegant features. Photos can be shared through Flickr, Google plus, Orkut etc Videos can be shared via YouTube, Dailymotion etc Audio sharing is done with Imeem, Doregama, Songs.pk etc b. Entertainment : The social networks provide entertainment by playing online games Virtual Worlds: Second Life World of Warcraft, Zapak many more sites provide Online Gaming c. News/Opinion : News and expert opinions also useful to the users. Digg, Reddit, RSSfeed are the Social news providers Yelp, epinions are for reviews. For technical, analytical and mobile reviews (GSMARENA) also provided. d. Communication: M. B h a v i s h S a n t h o s h K u m a r e t a l Page 126

This is facilitated by blogs, social networking services, and events. By this way many people can communicate each other. Technical queries can be shared through technical blogs. Microblogs: Twitter, Pownce Events: Evite Social Networking Services: Google+, Facebook, LinkedIn, MySpace Social networks are used to make new relationships and to maintain relationships more effectively. Earlier no one is ready to share their views but now even a small thing can be shared to their friends. The usage of users made these social networks as powerful such that the importance of support facilitated by the online social networks to the users also increased a lot. Since the usage of online social networks is more and it should play a vital role in users context but they failed to provide direct control to users over the messages posted on their walls. A little support is provided to online social network users to control the messages posted on their user walls. In order to provide support, a filtering mechanism could help. The filtering can be done is many ways but content based filtering is more efficient. Since to provide support over messages, depending on the content of the messages will give good results. The filtering can be done based on content of the messages as earlier mentioned but the filtering is explained in the next chapters. 2. Related Work: The main goal is already mentioned in the introduction section, filtering can help to design a new algorithm which could improve the user support by preventing spams on their walls. The filtering could be either content based or policy based. Content based filtering is used to work with the words or phrases present in each individual message posted by every user, is a spam or not. Content based filtering can be defined as a Machine Learning (ML Filtering) process which learns from user s interest and recommend familiar suggestions to the user. [4] User recommendations can be shown as per the rating given by the user for particular item. The user interest might be weighted than other preferences. But here comes the challenge how to learn user interest.[2] A word-based filtering can be the basic in Content-based filtering. Set of repeated or suspicious words can be used to compare, in the prevention of spams. In general spammers knowingly misspell the words to avoid this filtering. So there is a necessity of updating these black-words in filter by the IT people. [2] Rule-based filters are little effective than the word-based filters, rather than using a suspicious word, multiple terms can be considered. When a message is scanned the vulgar terms can be weighted high, whenever the score reaches maximum message can be treated as spam. Large scope is there to find spams using it[2]. 3. Blacklist Maintenance: Blacklist maintenance is nothing but maintaining list of words which are used to make users to avoid the spams from their walls. The general spams on online social networks can be collected and maintained as blacklist. The list can be maintained at database but it won't be in a single list, it would be in multiple lists or tables. This blacklist can be maintained by the administrator. The administrator has the privilege to add a blacklist word i.e. spam word. Blacklist is the collection of spam words. In the database a_table to z_table tables are maintained and in "a_table" the words start with "a" can be inserted, in "b_table" the words start with "b" can be inserted. To do like this the adding spam word first character can be checked. char c=spam.charat(0); insert into "+c+"_table values ('"+spam+"'); M. B h a v i s h S a n t h o s h K u m a r e t a l Page 127

a_table contains words start with character a. In the similar way every table contain the words. In this way the blacklist can be maintained. 4. Spam Filter Algorithm: To design a spam filter algorithm the major thing used is text classification. When user posts any message that may be small message or big message but it needs to be split into words and then only the comparison can be done so easily. Step 1: User message can be split into words. Here the user message can be split into words using java- String split() method. String[] m=msg.split(" "); Step 2: For every word first character can be checked char c= m.charat(0); Step 3: The words can be compared with spam words listed in the blacklist table starts with same character. ResultSet rs = stmt.executequery("select * from "+c+"_table"); while(rs.next()) { String em =rs.getstring(1); System.out.println(em ); if(m.equalsignorecase(em)){} } Step 4: If any word matches with the black list table it can be replaced with ------, otherwise it won t be replaced. if(spm.check(m[i])) { } s+="---- "; Step 5: After all words have been checked, the words can be merged and the message can be posted. s+=m[i]+" "; 5. Test results: Coming to test results we tested this algorithm implementation. To test this here we just took stupid as spam word. The word was inserted into the database. The screenshot of user posting spam message is as follows. M. B h a v i s h S a n t h o s h K u m a r e t a l Page 128

Figure: Posting a spam After posting spam message the spam part can be replaced by "-----" and not spam part can be shown as normal no replacement is needed. The result is as follows- 6. Conclusion and future scope: Figure: Spam filtered The flexibility of a system can be enhanced through refining rules and blacklist management. In this context, the underlying domain is dynamic and the collection of pre-classified data provided for training purpose may not be valid for a longer time. A preliminary work in this direction has been done in the context of trust values used for social network access control purposes. However, we would like to remark that, the system proposed in this paper represents just the core set of functions needed to provide a sophisticated tool for social network message refining. Even if we have complemented our system with an online assistant to set refining rule thresholds, the development of a complete system easily usable by average social network users is a wide topic which is out of the scope of the current paper. As such, the face book applications to be meant as a proof-of-concepts of the system core functions, rather than a fully developed system. Finally I conclude that with the content based filtering, spam filter has been designed and by that way user can avoid spam messages posted on their user walls. Future scope is to design it for messages posted in other languages, image spam and video spam filtering. M. B h a v i s h S a n t h o s h K u m a r e t a l Page 129

Acknowledgement: This work is sustained and done under the esteemed guidelines of Dr. G. Venkat Rami Reddy garu, who is a lecturer and head of the department of Software Engineering at School of IT, Jawaharlal Nehru Technological University, Hyderabad. REFERENCES: [1] "A System to Filter Unwanted Messages from OSN User Walls" Marco Vanetti, Elisabetta Binaghi, Elena Ferrari, Barbara Carminati, Moreno Carullo Department of Computer Science and Communication University of Insubria 21100 Varese, Italy. [2] "A Survey on Spam Filtering for Online Social Networks", IJCSMC, Vol. 3, Issue. 4, April 2014, pg.1130 1135. [3] Internet Live Stats (elaboration of data by International Telecommunication Union (ITU) and United Nations Population Division) go to http://www.internetlivestats.com/internet-users/ [4] http://www.chinainternetwatch.com/3378/china-internet-users-online-time/ [5] http://www.process.com/psc/fileadmin/user_upload/whitepapers/pmas/intro_bayesian_filtering.pdf [6] "A Framework to Refine Awful Tweets from e-networks"ratna Kailashnadh Singamsetty et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1), 2014, 740- A Brief Author Biography M Bhavish Santhosh Kumar is pursuing his post graduation from School of Information Technology, JNTU Hyderabad. He did his B.Tech from ADAM s engineering college. His research area interests include information security, computer networks. G V R Reddy is presently Associate Professor in Computer Science and Engineering at school of Information Technology. He is more than 11 years of experience in Teaching, and Software Development. His areas of interests are: image Processing, Computer Networks, and Analysis of Algorithms, Data mining, Operating Systems and Web technologies. M. B h a v i s h S a n t h o s h K u m a r e t a l Page 130