Untitled PDF
Untitled PDF
Untitled PDF
A PROJECT REPORT
Submitted by
S.AJITH (511916104003)
D.BOOPALAN (511916104008)
E.DHIWAGAR (511916104011)
R.MEGANATHAN (511916104023)
i
ANNA UNIVERSITY: CHENNAI 600 025
BONAFIDE CERTIFICATE
SIGNATURE SIGNATURE
Prof.A.S.KUMARESAN, M.E., [Ph.D] DR.S.VIJAYARANGAM, M.E., [Ph.D]
HEAD OF THE DEPARTMENT, SUPERVISOR,
Associate Professor, Associate Professor,
Department of CSE, Department of CSE,
Priyadarshini Engineering College, Priyadarshini Engineering College,
Vaniyambadi-635 751, Vaniyambadi-635 751,
Tirupattur District. Tirupattur District.
ii
CERTIFICATE OF EVALUATION
The report of the project work submitted by the above students in partial
fulfillment for the award of Bachelor of Engineering Degree in Computer Science
and Engineering of Anna University were evaluated and confirmed to the report of
the project work done by the above students and then evaluated.
Submitted for the university project viva-voce examination held on
…………………. at Priyadarshini Engineering College, Vaniyambadi-635751.
iii
ACKNOWLEDGEMENT
iv
ABSTRACT
Public networking sites connect millions of users around the world. The users'
communications with these social sites, such as Twitter and Facebook have a
wonderful collision repercussions for existence. The outstanding social networking
sites have turned into a target platform for the spammers to disperse a huge amount
of deleterious information. Twitter, for example, has become one of the most
profligately used platforms of all times and therefore allows an difficult to deal with
amount of spam. Fake users send undesired tweets to users to promote services or
websites that not only affect legitimate users but also interrupt resource spending.
Recently, the detection of spammers and identification of fake users on Twitter has
become a common area of research in up to date online social Networks (OSNs).
Moreover a taxonomy of the Twitter spam detection approaches is presented that
classifies the techniques based on their ability to detect:
i. Spammer Detection based on comment post,
ii. Fake users identification based on URL,
iii. Fake user identification based on user profile, and
iv. View Fake User identification result in bar chat.
Then on hand techniques are also compare based on a variety of features, such
as user skin tone, content features, graph features, structure features, and time
features. We are hopeful that the presented study will be a useful resource for
researchers to find the thing to see of recent developments in Twitter spam detection
on a single platform.
INDEX TERMS:
Classification, fake user detection, online social network, spammer’s
identification.
v
CHAPTER TABLE OF CONTENTS PAGE NO.
ABSTRACT v
LIST OF TABLES ix
LIST OF FIGURES x
1 INTRODUCTION 1
vi
2 DESIGN AND IMPLEMENTATION 10
2.2.1 Description 13
2.5 Coding 29
vii
2.6.2 User login page 40
3 CONCLUSION 57
4 REFERENCES 58
viii
LIST OF TABLES
ix
LIST OF FIGURES
1 Architecture diagram 12
4 Sequence diagram 17
7 Class diagram 21
8 Filter database 22
x
16 Fake user database 27
18 Home page 39
22 User page 43
23 Server page 44
24 Posting page 45
xi
S.NO. LIST OF ABBREVATIONS
xii
CHAPTER 1
INTRODUCTION
Millions of users are engaged with social networking sites around the world. Social
sites like twitter, Facebook have a large impact on rare unwanted consequences
caused in our regular life in user’s interactions. In order to disperse a large amount
of inappropriate and harmful data protruding social networking sites are made as a
target platform for the spammers. Twitter is main example that has become one of
the important platforms for unreasonable amount of spam in all the tomes for fake
users to tweet and promote websites or services that crates a major effect for
legitimate users and also it disturbs resource consumption. By resulting the opening
for unusual and harmful information there is an increase of fake identities that
expands invalid data. Research on current online social networks (OSN) is quit
natural for identifying of spammers and also detection of fake users on twitter. This
paper is a review paper that tells about detecting spammer techniques on twitter.
1
1.1 PROJECT DESCRIPTION
2
1.2 SYSTEM ANALYSIS
1 Title
Improving spam detection in online social networks
Authors
A.Gupta and R.Kaushal,
Description
In this paper, an algorithm, combining three different learning algorithms
(namely Naive Bayes, Clustering and Decision trees) was implemented. This
integrated algorithm categorizes an account as Spammer/Non-Spammer with an
overall accuracy of 87.9%. Finally, this algorithm was compared with all the three
learning algorithm taken alone. It was observed that the combined approach could
give best results in terms of overall accuracy and in detection of non-spammers.
Though, Decision Trees alone perform better in detection of spammers but it is poor
in detecting non-spam accounts, thus it can’t be used solely.
3
2 Title
Twitter fake account detection
Authors
B. Erçahin, Ö. Akta³, D. Kilinç, and C. Akyol
Description
In this paper a new classification algorithm was proposed to improve detecting
fake accounts on social networks, where the SVM trained model decision values
were used to train a NN model, and SVM testing decision values were used to test
the NN model. To reach our goal we used ”MIB” baseline dataset from and run it
into pre-processing phase where four feature reduction techniques were used to
reduce the feature vector.
4
3 Title
Detecting spammers on Twitter
Authors
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida
Description
This paper is the first to examine Twitter memes and spam based on network
and temporal properties. Twitter shares some properties with earlier communication
mediums, but introduces new structural properties. We find that spam accounts are
not significantly newer, they exhibit slightly higher retweet and reply properties,
they have a higher number of followers and friends, and indegree and outdegree may
be associated with legitimacy.
5
1.2.2 EXISTING SYSTEM
Existing concept:-
Existing concept deals with providing filtering the spammer database no specified
category. The method supports the accessible and obtainable information in the
tweet object to recognize spam tweets and the tweets that are handled previously
related to the same topic.
Profile filtering, where each of which uses two-hop sub networks that are centered
at each other. Assemble techniques and cascading filtering are also proposed for
combining the properties of both trade significance profile and social status. To
check whether a user is fake or not, a two-hop social network for each user is focused
to gather social information from social networks.
Disadvantages
1. No URL based Fake User Identification.
2. No specified category for spammer detection.
3. There is no filtering system based on re-tweeted post.
4. There is no filtering system based on a preprocessing schedule and on Naïve
Bayes algorithm to discard the tweets containing inaccurate information,.
5. Less security due No URL Based Spam Detection.
6
1.2.3 PROPOSED SYSTEM
Proposed concept:-
1. The first category (Spammer Detection based on comment post) using relational
database to filtering the unwanted comment.
2. In the second category (Fake users identification based on URL), identified re-
tweeted URL through machine learning algorithms.
3. The third category (Fake user identification based on user profile) is based on
detecting fake users through the existing account or similar account.
4. The last category (View Fake User identification result in bar chat) is based on
view fake user percentage range using the bar chart.
Advantages:
1. The URL based Fake User Identification can be classified.
2. There are different specified category for spammer detection database.
3. There are filtering system based on re-tweeted post.
4. There are bar chart for view the percentage range of fake users.
5. The fake content propagation was identified through the metrics that include:
Social reputation, global engagement, topic engagement, likeability and
credibility.
7
1.3 SYSTEM REQUIREMENT
8
1.3.2 Hardware Requirement
The hardware requirement may serve as the basis for a contract for the
implementation of the system and should therefore be a complete and consistent
specification of the whole system. They are used by software engineers as the
starting point for the system design. It shows what the system does and not how it
should be implemented.
1. Processor - Pentium–IV
2. RAM - 4 GB(min)
3. Hard Disk - 20 GB
4. Keyboard - Standard Windows Keyboard
5. Mouse - Two or Three Button Mouse
6. Monitor - SVGA
9
CHAPTER 2
DESIGN AND IMPLEMENTATION
1. Economical feasibility
This study is carried out to check the economic impact that the system will have
on the organization. The amount of fund that the company can pour into the research
and development of the system is limited.
The expenditures must be justified. Thus the developed system as well within
the budget and this was achieved because most of the technologies used are freely
available. Only the customized products had to be purchased.
10
2. Technical feasibility
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available
technical resources. This will lead to high demands being placed on the client. The
developed system must have a modest requirement, as only minimal or null changes
are required for implementing this system.
3. Social feasibility
The aspect of study is to check the level of acceptance of the system by the user.
This includes the process of training the user to use the system efficiently. The user
must not feel threatened by the system, instead must accept it as a necessity.
The level of acceptance by the users solely depends on the methods that are
employed to educate the user about the system and to make him familiar with it. His
level of confidence must be raised so that he is also able to make some constructive
criticism, which is welcomed, as he is the final user of the system.
11
2.2 ARCHITECTURE DIAGRAM
Tweet Server
View and Authorize Users
,Add and View Spam Filters
,View All User Posted Tweets
,View All User Tweets Based
On URLs
,View Friend Request and
Response
,View All Tweets with Re-
Tweets
Process all ,View All Tweets , Re-Tweets
user queries and Comments
,View All Spammers Detection
,View All Fake User
Store and retrievals Identification
Web , View Fake User Identification
Database Results
Registering
the User , View Fake Tweet
Identification Result
My Profile
, Search Friends
, Create Tweets
, View My Friends
, View Friend Requests Remote User
, Search Tweets and Comment
, View My Tweets and Comments
, View Friend's Retweets and Give
Comments
12
2.2.1 DESCRIPTION
Admin
In this module, the Admin has to login by using valid user name and password. After
login successful he can do some operations such as View and Authorize Users, Add
and View Spam Filters, View All User Posted Tweets, View All User Tweets Based
On URLs, View Friend Request and Response, View All Tweets with Re-Tweets,
View All Tweets, Re-Tweets and Comments, View All Spammers Detection, View
All Fake User Identification, View Fake User Identification Results, View Fake
Tweet Identification Results.
User
In this module, there are n numbers of users are present. User should register before
doing some operations. After registration successful he has to wait for admin to
authorize him and after admin authorized him. He can login by using authorized user
name and password. Login successful he will do some operations like My Profile,
Search Friends ,Create Tweets, View My Friends, View Friend Requests, Search
Tweets and Comment ,View My Tweets and Comments, View Friend's Retweets
and Give Comments.
13
2.3 SYSTEM DESIGN
The DFD is also called as bubble chart. It is a simple graphical formalism that
can be used to represent a system in terms of input data to the system, various
processing carried out on these data and the output data is generated by the system.
Response
Request
Request
Register
and Search
Login friends, Create
Tweets
My Profile, Search
View and Authorize Users,
Friends, Create
Add and View Spam Filters Response Tweets, View My
,View All User Posted
Friends, View
Tweets, View All User
Friend Requests,
Tweets Based On URLs,
Search Tweets and
View Friend Request and
Comment, View
Response, View All Tweets
My Tweets and
with Re-Tweets, View All
End User Comments
Tweets , Re-Tweets and
Comments.
14
2.3.2 UML DIAGRAMS
15
USE CASE:
Register and Login
Create Tweet
User
16
2.3.2.2 SEQUENCE DIAGRAM
List All Users and authorize Register and Login, View User
Profile
List and View all Friends Req and Res Search friends, req and response
comments
View All Spammers Detection View all your tweets and comments
17
2.3.2.3 FLOW CHART DIAGRAM
Flow Chart Diagram displays a special state diagram where most of the states are
action states and most of the transitions are triggered by completion of the actions in
the source states. This diagram focuses on flows driven by internal processing.
FLOW CHART: USER
Start
User Register
Yes No
Login
Create Tweets
Logout
18
FLOW CHART: ADMIN
Start
Admin
Yes No
Login
19
2.3.2.4 CLASS DIAGRAM
Class Diagram models class structure and contents using design elements such as
classes, packages and objects. It also displays relationships such as containment,
inheritance, associations and others. Class diagrams are used in nearly all Object
Oriented software designs. Use them to describe the classes of the system and their
relationships to each other.
The class diagram is the main building block of object oriented modeling. It is used
both for general conceptual modeling of the systematic of the application, and for
detailed modeling translating the models into programming code. Class diagrams
can also be used for modeling. The classes in a class diagram represent both the main
objects, interactions in the application and the classes to be programmed.
In the diagram, classes are represented with boxes which contain three parts
• The upper part holds the name of the class
• The middle part contains the attributes of the class
• The bottom part gives the methods or operations the class can take or
undertake
In the design of a system, a number of classes are identified and grouped together in
a class diagram which helps to determine the static relations between those objects.
With detailed modeling, the classes of the conceptual design are often split into a
number of subclasses.
20
Admin Web Server
Members
User & Author Login Tweet Name, Tweet Description,
Tweet Uses, Select Tweet Image,
Tweet Owner, Tweet Date and Time
21
2.4 MODULE SPLIT UP
22
Here, we can add data with different category.
After scanning the filter database, if the data is matched then it list into spammer
details with different category.
23
Figure 11: Sexual spam detection
24
Figure 13: Hateful spam detection
25
2.4.2 Fake user identification based on URL
This module is identify based on retweeted user. The user post a tweet the
module scanning the previous tweet, if the tweet is similar the URL list asa retweeted
URLs list.
26
2.4.3 Fake user identification based on user profile
In this module the fake user identification is based on user profile details. The
user try to create a existing account or similar account then the user considered has
a fake user. Then block the user and wanted the user that you are try to create a fake
user.
27
2.4.4 View Fake User identification result in bar chat
This module used to view the fake user identification in bar chat with the
highest range value. It is used to view a fake user with the range of the percentage.
28
2.5 CODING
User login:-
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>User Login Page..</title>
<meta name="keywords" content="Holiday, free CSS template, clean, neat, aqua,
white" />
<meta name="description" content="Holiday is a clean and neat free CSS template
using aqua and white colors." />
<link href="templatemo_style.css" rel="stylesheet" type="text/css" />
<script language="javascript" type="text/javascript">
function clearText(field)
{
if (field.defaultValue == field.value) field.value = '';
else if (field.value == '') field.value = field.defaultValue;
}
</script>
<style type="text/css">
<!--
.style4 {
color: #DD1111;
font-size: 25px;
}
.style18 {color: #FF00FF}
29
.style19 {color: #FF0000; font-weight: bold; }
.style20 {color: #FF00FF; font-weight: bold; }
.style21 {color: #0000FF; font-weight: bold; }
-->
</style>
</head>
<body>
<div id="templatemo_top_wrapper">
<div id="templatemo_top">
<div id="templatemo_header">
<div>
<table width="965" border="0" cellspacing="2" cellpadding="2"><tr>
<td width="957"><p><span class="style4">Identification of Fake User and
Spammer Detection on Social Media Sites</span>
</p>
<p align="center"> <span class="style4"></span>
</p>
</td>
</tr>
</table>
</div>
</div> <!-- end of header -->
<div id="templatemo_middle">
<div id="templatemo_menu"><ul>
<li><a href="index.html">Home</a></li>
<li><a href="UserLogin.jsp" class="current">User</a>
</li>
30
<li><a href="ServerLogin.jsp">Tweet Server</a>
</li>
</ul>
<div id="search_box">
<form action="#" method="post">
<input type="text" value="Enter keyword here..." name="q" size="10"
id="searchfield" title="searchfield" onfocus="clearText(this)"
onblur="clearText(this)" />
<input type="submit" name="Search" value="" id="searchbutton" title="Search"/>
</form>
</div>
<div class="cleaner"></div>
</div> <!-- end of templatemo_menu -->
<div id="mid_content">
<h2>Twitter - Online Social Network </h2>
<p>Twitter is a popular online social network service for sharing short messages
(tweets) among friends.</p></div>
</div> <!-- end of middle -->
</div> <!-- end of top -->
</div> <!-- end of top wrapper -->
<div id="templatemo_main">
<div class="col_w600 float_l">
<div class="content_box">
<h2><span class="style18">Welcome To User Login</span>..</h2>
<p>
<img src="images/WrongLogin.jpg" width="308" height="128" />
</p>
31
<div class="image_wrapper image_fl">
<img src="images/templatemo_image_01.jpg" alt="Image" />
</div>
<form id="form1" name="form1" method="post"
action="UserAuthentication.jsp">
<table width="403" border="0" cellspacing="2" cellpadding="2"><tr>
<td width="149" height="62" align="center" bgcolor="#FFFF00"><div
align="center" class="style19">
<div align="left">Name (required)</div>
</div>
</td>
<td width="240"><input id="name" name="userid" class="text" /></td>
</tr>
<tr>
<td height="46" align="center" bgcolor="#FFFF00">
<div align="center" class="style19">
<div align="left">Password (required)</div>
</div>
</td>
<td><input type="password" id="pass" name="pass" class="text" /></td>
</tr>
<tr>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
32
<td><span class="style19">
<input name="imageField" type="submit" class="LOGIN" id="imageField"
value="Login" />
New User?</span><a href="UserRegister.jsp" class="style20"> Register </a>
</td>
</tr>
<tr>
<td height="26"> </td>
<td> </td></tr>
</table>
<p align="right">
<a href="index.html" class="style21"><strong>Back</strong></a></p>
</form></div>
<div class="cleaner"></div></div>
<div class="col_w300 float_r">
<h2>Sidebar Menu </h2>
<p><a href="UserLogin.jsp"><strong>Home</strong></a></p>
<p><a href="index.html"><strong>Index Page</strong></a></p>
<p class="news_box"> </p></div>
<div class="cleaner"></div>
</div> <!-- end of main -->
<div id="templatemo_footer_wrapper_01">
<div id="templatemo_footer_wrapper_02"></div>
<!-- end of footer wrapper -->
</div> <!-- end of footer wrapper 01 -->
</body>
</html>
33
Server login:-
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Tweet Server Login Page..</title>
<meta name="keywords" content="Holiday, free CSS template, clean, neat, aqua,
white" />
<meta name="description" content="Holiday is a clean and neat free CSS template
using aqua and white colors." />
<link href="templatemo_style.css" rel="stylesheet" type="text/css" />
<script language="javascript" type="text/javascript">
function clearText(field)
{
if (field.defaultValue == field.value) field.value = '';
else if (field.value == '') field.value = field.defaultValue;
}
</script>
<style type="text/css">
<!--
.style4 {
color: #DD1111;
font-size: 25px;
}
.style18 {color: #FF00FF}
.style19 {color: #FF0000; font-weight: bold; }
34
.style20 {color: #FF00FF; font-weight: bold; }
.style21 {color: #0000FF; font-weight: bold; }
.style25 {color: #FF00FF;
font-size: 20px;
}
-->
</style>
</head>
<body>
<div id="templatemo_top_wrapper">
<div id="templatemo_top">
<div id="templatemo_header">
<div>
<table width="965" border="0" cellspacing="2" cellpadding="2">
<tr>
<td width="957"><p><span class="style4">Identification of Fake User and
Spammer Detection on Social Media Sites</span></p>
<p align="center"> <span class="style4"></span></p></td>
</tr></table>
</div>
</div> <!-- end of header -->
<div id="templatemo_middle">
<div id="templatemo_menu">
<ul>
<li>
<a href="index.html">Home</a>
</li>
35
<li><a href="UserLogin.jsp">User</a></li>
<li><a href="ServerLogin.jsp" class="current">Tweet Server</a></li>
</ul>
<div id="search_box">
<form action="#" method="post">
<input type="text" value="Enter keyword here..." name="q" size="10"
id="searchfield" title="searchfield" onfocus="clearText(this)"
onblur="clearText(this)" />
<input type="submit" name="Search" value="" id="searchbutton" title="Search"/>
</form>
</div>
<div class="cleaner"></div>
</div> <!-- end of templatemo_menu -->
<div id="mid_content">
<h2>Twitter - Online Social Network </h2>
<p>Twitter is a popular online social network service for sharing short messages
(tweets) among friends.</p>
</div>
</div> <!-- end of middle -->
</div> <!-- end of top -->
</div> <!-- end of top wrapper -->
<div id="templatemo_main">
<div class="col_w600 float_l">
<div class="content_box">
<h2><span class="style25">Welcome to Tweet Server Login Page..</span></h2>
<p><img src="images/WrongLogin.jpg" width="308" height="128" /></p>
<div class="image_wrapper image_fl">
36
<img src="images/templatemo_image_01.jpg" alt="Image" />
</div>
<form id="form1" name="form1" method="post"
action="ServerAuthentication.jsp">
<table width="423" border="0" cellspacing="2" cellpadding="2">
<tr>
<td width="197" height="46" align="center" bgcolor="#FFFF00"><span
class="style19">
<label for="name">Server Name (required)</label>
</span>
</td>
<td width="212"><input id="name" name="userid" class="text" /></td>
</tr>
<tr>
<td height="72" align="center" bgcolor="#FFFF00"><span
class="style19">Password (required)</span></td>
<td>
<input type="password" id="pass" name="pass" class="text" />
</td>
</tr>
<tr>
<td> </td>
<td>
<input name="imageField" type="submit" class="LOGIN" id="imageField"
value="Login" />
</td>
</tr>
37
</table>
<p align="right"><a href="index.html" class="style20">Back</a>
</p>
</form>
</div>
<div class="cleaner"></div>
</div>
<div class="col_w300 float_r">
<h2>Sidebar Menu </h2>
<p>
<a href="ServerLogin.jsp"><strong>Home</strong></a>
</p>
<p><a href="index.html"><strong>Index Page</strong>
</a>
</p>
<p class="news_box"> </p>
</div>
<div class="cleaner">
</div>
</div> <!-- end of main -->
<div id="templatemo_footer_wrapper_01">
<div id="templatemo_footer_wrapper_02">
</div>
<!-- end of footer wrapper -->
</div> <!-- end of footer wrapper 01 -->
</body>
</html>
38
2.6 INTERFACE DESIGN
2.6.1 Home Page
39
2.6.2 User login page
40
2.6.3 Server login page
41
2.6.4 User registration page
42
2.6.5 User page
43
2.6.6 Server page
44
2.6.7 Posting page
45
2.6.8 User profile page
46
2.7 Table Design
47
Server data table
48
Spammer filter data table
49
Friend request data table
50
Fake user data table
51
2.8 SYSTEM TESTING
52
The following are the types of Integration Testing:
1. Top Down Integration
This method is an incremental approach to the construction of program
structure. Modules are integrated by moving downward through the control
hierarchy, beginning with the main program module. The module subordinates to
the main program module are incorporated into the structure in either a depth first
or breadth first manner.
In this method, the software is tested from main module and individual stubs
are replaced when the test proceeds downwards.
2. Bottom-up Integration
This method begins the construction and testing with the modules at the lowest
level in the program structure.
Since the modules are integrated from the bottom up, processing required for
modules subordinate to a given level is always available and the need for stubs is
eliminated.
The bottom up integration strategy may be implemented with the following steps:
The low-level modules are combined into clusters into clusters that perform a
specific Software sub-function.
A driver (i.e.) the control program for testing is written to coordinate test case
input and output.
The cluster is tested.
Drivers are removed and clusters are combined moving upward in the
program structure
The bottom up approaches tests each module individually and then each module is
module is integrated with a main module and tested for functionality.
53
2.8.3 User Acceptance Testing
User Acceptance of a system is the key factor for the success of any system.
The system under consideration is tested for user acceptance by constantly keeping
in touch with the prospective system users at the time of developing and making
changes wherever required.
The system developed provides a friendly user interface that can easily be
understood even by a person who is new to the system.
Text Field:
The text field can contain only the number of characters lesser than or equal
to its size.
The text fields are alphanumeric in some tables and alphabetic in other tables.
Incorrect entry always flashes and error message.
54
Numeric Field:
The numeric field can contain only numbers from 0 to 9. The individual
modules are checked for accuracy and what it has to perform.
Each module is subjected to test run along with sample data. The
individually tested modules are integrated into a single system. Testing involves
executing the real data information is used in the program the existence of any
program defect is inferred from the output. A successful test is one that gives out the
defects for the inappropriate data and produces and output revealing the errors in the
system.
55
And, although it is realistic data that will show how the system will perform
for the typical processing requirement, assuming that the live data entered are in fact
typical, such data generally will not test all combinations or formats that can enter
the system.
This bias toward typical values then does not provide a true systems test and
in fact ignores the cases most likely to cause system failure.
56
CHAPTER 3
CONCLUSION
Despite the development of efficient and effective approaches for the spam
detection and fake user identification on Twitter, there are still certain open areas
that require considerable attention by the researchers. Another associated topic that
is worth investigating is the identification of rumor sources on social media.
Although a few studies based on statistical methods have already been conducted to
detect the sources of rumors, more sophisticated approaches, e.g., social network
based approaches, can be applied because of their proven effectiveness.
Furthermore, we can deploy the Project Management System with the plagiarism
checker, video conference and chat bots.
57
REFERENCES
58
8. [8] N. Eshraqi, M. Jalali, and M. H. Moattar, ``Detecting spam tweets in
Twitter using a data stream clustering algorithm,'' in Proc. Int. Congr.
Technol., Commun. Knowl. (ICTCK), Nov. 2015, pp. 347351.
9. C. Chen, Y. Wang, J. Zhang, Y. Xiang, W. Zhou, and G. Min, ``Statistical
features-based real-time detection of drifted Twitter spam,'' IEEE Trans. Inf.
Forensics Security, vol. 12, no. 4, pp. 914925, Apr. 2017.
10. C. Buntain and J. Golbeck,”Automatically identifying fake news in popular
Twitter threads,'' in Proc. IEEE Int. Conf. Smart Cloud (SmartCloud), Nov.
2017, pp. 208215.
11. C. Chen, J. Zhang, Y. Xie, Y. Xiang,W. Zhou, M. M. Hassan, A. AlElaiwi,
and M. Alrubaian, ``A performance evaluation of machine learning-based
streaming spam tweets detection,'' IEEE Trans. Comput. Social Syst., vol. 2,
no. 3, pp. 6576, Sep. 2015.
12. G. Stafford and L. L. Yu, ``An evaluation of the effect of spam on Twitter
trending topics,'' in Proc. Int. Conf. Social Comput., Sep. 2013,pp. 373378.
13. M. Mateen, M. A. Iqbal, M. Aleem, and M. A. Islam, ``A hybrid approach
for spam detection for Twitter,'' in Proc. 14th Int. Bhurban Conf. Appl. Sci.
Technol. (IBCAST), Jan. 2017, pp. 466471.
14. A. Gupta and R. Kaushal, ``Improving spam detection in online social
networks,'' in Proc. Int. Conf. Cogn. Comput. Inf. Process. (CCIP), Mar.
2015, pp. 16.
15. F. Fathaliani and M. Bouguessa, ``A model-based approach for identifying
spammers in social networks,'' in Proc. IEEE Int. Conf. Data Sci. Adv. Anal.
(DSAA), Oct. 2015, pp. 19.
59