Graph Based Digital Spammer Identification by User Click Behavior
Rupali Vishwakarma1, Pratima Gautam2
1Rupali Vishwakarma*, Phd Scholar, Department of Computer Science &Engineering, AISECT University Bhopal, MP, India.
2Dr. Pratima Gautam, Department of Computer Science & Engineering, AISECT University Bhopal, MP, India.

Manuscript received on January 05, 2020. | Revised Manuscript received on January 25, 2020. | Manuscript published on January 30, 2020. | PP: 5301-5305 | Volume-8 Issue-5, January 2020. | Retrieval Number: C5824098319/2020©BEIESP | DOI: 10.35940/ijrte.C5824.018520

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As social media network popularity increases day by day, content writer are spamming on these platform for potential benefits of some organizations. Some of blogs are fabricate which invite users to external phishing sites or malware downloads huge security issue online and undermined the user experience. This work has proposed an un-supervised technique for identifying the real users from the social network spammers. Here graph based clustering algorithm was proposed to develop a binary cluster on the basis of serial or sequential action perform by the user. As per series of action social network graph is reduce into spanning tree where highly distance nodes are identified as abnormal behavior. So group of highly distance nodes are consider as the social spammers while other are real users. Experiment was perform on real social sequential dataset of twitter. Results were compared on various evaluation parameters and it was obtained that proposed approach has improved all such parameter values as compared to previous approach adopt by researcher.
Keywords: Online Social Networks (OSNs), Twitter, Spammers, Legitimate users.
Scope of the Article: Optical Phase Lock Loop.