Skip to main content

Spam Fighting in Social Tagging Systems

  • Conference paper
Social Informatics (SocInfo 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7710))

Included in the following conference series:

Abstract

Tagging in online social networks is very popular these days, as it facilitates search and retrieval of diverse resources available online. However, noisy and spam annotations often make it difficult to perform an efficient search. Users may make mistakes in tagging and irrelevant tags and resources may be maliciously added for advertisement or self-promotion. Since filtering spam annotations and spammers is time-consuming if it is done manually, machine learning approaches can be employed to facilitate this process. In this paper, we propose and analyze a set of distinct features based on user behavior in tagging and tags popularity to distinguish between legitimate users and spammers. The effectiveness of the proposed features is demonstrated through a set of experiments on a dataset of social bookmarks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xirong, L., Snoek, C., Worring, M.: Learning tag relevance by neighbor voting for social image retrieval. In: Proc. ACM MIR, pp. 180–187 (2008)

    Google Scholar 

  2. Benz, D.K., Hotho, A., Jäschke, R., Krause, B., Mitzlaff, F., Schmitz, C., Stumme, G.: The social bookmark and publication management system BibSonomy. VLDB Journal 19(6), 849–875 (2010)

    Article  Google Scholar 

  3. Bogers, T., Van den Bosch, A.: Using Language Models for Spam Detection in Social Bookmarking. In: Proc. ECML/PKDD Discovery Challenge, pp. 1–12 (2008)

    Google Scholar 

  4. Duda, R., Hart, P.: Pattern classification and scene analysis. Wiley (1973)

    Google Scholar 

  5. Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Computing 11(6), 36–45 (2007)

    Article  Google Scholar 

  6. Hotho, A., Benz, D., Jäschke, R., Krause, B.: ECML PKDD Discovery Challenge (2008), http://www.kde.cs.uni-kassel.de/ws/rsdc08

  7. Ivanov, I., Vajda, P., Jong-Seok, L., Goldmann, L., Ebrahimi, T.: Geotag propagation in social networks based on user trust model. MTAP 56(1), 155–177 (2012)

    Google Scholar 

  8. Ivanov, I., Vajda, P., Jong-Seok, L., Ebrahimi, T.: In tags we trust: Trust modeling in social tagging of multimedia content. IEEE SPM 29(2), 98–107 (2012)

    Article  Google Scholar 

  9. Liu, H., Setiono, R.: Chi2: Feature selection and discretization of numeric attributes. In: Proc. ICTAI, pp. 338–391 (1995)

    Google Scholar 

  10. Rogers, I.: The Google PageRank algorithm and how it works (2002)

    Google Scholar 

  11. Jäschke, R., Marinho, L., Hotho, A., Schmidt-Thieme, L., Stumme, G.: Tag Recommendations in Folksonomies. In: Kok, J.N., Koronacki, J., Lopez de Mantaras, R., Matwin, S., Mladenič, D., Skowron, A. (eds.) PKDD 2007. LNCS (LNAI), vol. 4702, pp. 506–514. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Koutrika, G., Effendi, F.A., Gyöngyi, Z., Heymann, P., Garcia-Molina, H.: Combating spam in tagging systems. In: Proc. ACM AIRWeb, pp. 57–64 (2007)

    Google Scholar 

  13. Krause, B., Schmitz, C., Hotho, A., Stumme, G.: The anti-social tagger: Detecting spam in social bookmarking systems. In: Proc. ACM AIRWeb, pp. 61–68 (2008)

    Google Scholar 

  14. Markines, B., Cattuto, C., Menczer, F.: Social spam detection. In: Proc. ACM AIRWeb, pp. 41–48 (2009)

    Google Scholar 

  15. Matthews, B.W.: Comparison of the predicted and observed secondary structure of t4 phage lysozyme. Biochimica et Biophysica Acta 405(2), 442–451 (1975)

    Article  Google Scholar 

  16. Von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-based character recognition via web security measures. Science 321(5895), 1465–1468 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  18. Witten, I.H., Frank, E.: Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann (2005), http://www.cs.waikato.ac.nz/ml/weka

  19. Xu, Z., Fu, Y., Mao, J., Su, D.: Towards the semantic web: Collaborative tag suggestions. In: Proc. ACM WWW, pp. 1–8 (2006)

    Google Scholar 

  20. Gyongyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with TrustRank. In: Proc. VLDB, pp. 576–587 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yazdani, S., Ivanov, I., AnaLoui, M., Berangi, R., Ebrahimi, T. (2012). Spam Fighting in Social Tagging Systems. In: Aberer, K., Flache, A., Jager, W., Liu, L., Tang, J., Guéret, C. (eds) Social Informatics. SocInfo 2012. Lecture Notes in Computer Science, vol 7710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35386-4_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35386-4_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35385-7

  • Online ISBN: 978-3-642-35386-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics