Skip to main content
Log in

A Feature Selection Approach to Detect Spam in the Facebook Social Network

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

The widespread adoption of social networks and their enormous facilities and growing opportunities has attracted many users and audience. But along with attractive and interesting messages and topics, inappropriate and sometimes criminal contents, such as spam, are also released on these networks. Malicious spammers intend to send inaccurate or irrelevant contents to distribute malformed information on online social networks. This paper is about the spam comments detection on the Facebook social network. By reviewing the posts and comments, and studying their features, an online spam filtering system has been designed in this paper. The proposed filtering system is able to exploit various exploration methods and optimization algorithms such as simulated annealing, particle swarm optimization, ant colony optimization, and differential evolution to detect and filter malicious contents and to prevent publishing spam comments to provide a secure environment for users of this popular social network. Furthermore, supervised machine learning methods, clustering techniques, and decision trees have been exploited to provide an accurate performance and appropriate speed for the proposed filtering system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Heydari, A.; Tavakoli, M.A.; Salim, N.; Heydari, Z.: Detection of review spam: a survey. Computer 42, 3634–3642 (2015)

    Google Scholar 

  2. Zheng, X.; Zeng, Z.; Chen, Z.; Yu, Y.; Rong, C.: Detecting spammers on social networks. Neurocomputing 159, 27–34 (2015)

    Article  Google Scholar 

  3. Sohrabi, M.K.; Akbari, S.: A comprehensive study on the effects of using data mining techniques to predict tie strength. Comput. Hum. Behav. 60, 534–541 (2016)

    Article  Google Scholar 

  4. Sohrabi, M.K.; Barforoush, A.A.: Efficient colossal pattern mining in high dimensional datasets. Knowl. Based Syst. 33, 41–52 (2012)

    Article  Google Scholar 

  5. Sohrabi, M.K.; Barforoush, A.A.: Parallel frequent itemset mining using systolic arrays. Knowl. Based Syst. 37, 462–471 (2013)

    Article  Google Scholar 

  6. Sohrabi, M.K.; Ghods, V.: Top-down vertical itemset mining. In: Sixth International Conference on Graphic and Image Processing (ICGIP 2014), pp. 94431V–94431V7 (2014)

  7. Sohrabi, M.K.; Ghods, V.: CUSE: a novel cube-based approach for sequential pattern mining. In: 4th International Symposium on Computational and Business Intelligence (ISCBI), pp. 186–190 (2016)

  8. Sohrabi, M.K.; Marzooni, H.H.: Association rule mining using new FP-linked list algorithm. J. Adv. Comput. Res. 7(1), 23–34 (2016)

    Google Scholar 

  9. Sohrabi, M.K.; Roshani, R.: Frequent itemset mining using cellular learning automata. Comput. Hum. Behav. 68, 244–253 (2017)

    Article  Google Scholar 

  10. Sohrabi, M.K.; Ghods, V.: Materialized view selection for a data warehouse using frequent itemset mining. JCP 11(2), 140–148 (2016)

    Article  Google Scholar 

  11. Sohrabi, M.K.; Azgomi, H.: TSGV: a table-like structure based greedy method for materialized view selection in data warehouse. Turk. J. Electr. Eng. Comput. Sci. 25(4), 3175–3187 (2017)

    Article  Google Scholar 

  12. Sohrabi, M.K.; Azgomi, H.: Parallel set similarity join on big data based on locality-sensitive hashing. Sci. Comput. Program. 145, 1–12 (2017)

    Article  Google Scholar 

  13. Sohrabi, M.K.; Tajik, A.: Multi-objective feature selection for warfarin dose prediction. Comput. Biol. Chem. 69, 126–133 (2017)

    Article  Google Scholar 

  14. Arab, M.; Sohrabi, M.K.: Proposing a new clustering method to detect phishing websites. Turk. J. Electr. Eng. Comput. Sci. (2017). doi:10.3906/elk-1612-279

    Google Scholar 

  15. Huber, M.; Mulazzani, M.; Kitzler, G.; Goluch, S.; Weippl, E.: Friend-in-the-middle attacks. Exploiting social networking sites for spam. IEEE Internet Comput. 15(3), 28–34 (2011)

  16. Abu-Nimeh, S.; Chen, T.M.; Alzubi, O.: Malicious and spam posts in online social networks. IEEE Comput. 44(9), 23–28 (2011)

    Article  Google Scholar 

  17. Yu, D.; Chen, N.; Jiang, F.; Fu, B.; Qin, A.: Constrained NMF-based semi-supervised learning for social media spammer detection. Knowl. Based Syst. 125, 64–73 (2017)

    Article  Google Scholar 

  18. Yong, Z.; Wei, G.; Wan-qiu, Z.: Feature selection of unreliable data using an improved multi-objective PSO algorithm. Neurocomputing 171, 1281–1290 (2016)

    Article  Google Scholar 

  19. Roberto, H.W.; George, D.C.; Renato, F.C.: A global-ranking local feature selection method for text categorization. Expert Syst. Appl. 39(17), 12851–12857 (2012)

    Article  Google Scholar 

  20. Esseghir, M.A.; Goncalves, G.; Slimani, Y.: Adaptive particle swarm optimizer for feature selection. In: Proceedings of the 11th International Conference on Intelligent Data Engineering and Automated Learning, LNCS 6283, pp. 226–233 (2011)

  21. Oh, I.S.; Lee, J.S.; Moon, B.R.: Hybrid genetic algorithms for feature selection. IEEE Trans. Pattern Anal. Mach. Intell. 26(1), 1424–1437 (2004)

    Google Scholar 

  22. Lin, S.W.; Lee, Z.J.; Chen, S.C.; Tseng, T.Y.: Parameter determination of support vector machine and feature selection using simulated annealing approach. Appl. Soft Comput. 8(4), 1505–1512 (2008)

    Article  Google Scholar 

  23. Toolan, F.; Carthy, J.; Feature selection for spam and phishing detection. In: eCrime Researchers Summit (eCrime). IEEE (2010)

  24. Diale, M.; Walt, C.V.D.; Celik, T.; Modup, A.: Feature selection and support vector machine hyper-parameter optimization for spam detection. In: Pattern Recognition Association of South Africa and Robotics and Mechateronics International Conference. IEEE (2016)

  25. Lee, S.M.; Kim, D.S.; Kim, J.H.; Park, J.S.: Spam detection using feature selection and parameters optimization. In: International IEEE Conference on Complex, Intelligent and Software Intensive Systems (CISIS), pp. 883–888 (2010)

  26. Zheng, X.; Zeng, Z.; Yu, Y.; Kechadi, T.; Rong, C.: ELM-based spammer detection in social networks. Supercomputing 72(8), 2991–3005 (2016)

    Article  Google Scholar 

  27. Zhang, Y.; Wang, S.; Phillips, P.; Ji, G.: Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl. Based Syst. 64, 22–31 (2014)

    Article  Google Scholar 

  28. Adewole, K.S.; Anuar, N.B.; Kamsin, A.; Varathan, K.D.; Razak, S.A.: Malicious accounts: dark of social networks. Netw. Comput. Appl. 79, 41–67 (2017)

    Article  Google Scholar 

  29. Ahmad, F.; Abulaish, M.: A generic statistical approach for spam detection in online social networks. Comput. Commun. 36(10), 1120–1129 (2013)

    Article  Google Scholar 

  30. Sohrabi, M.K.; Karimi, F.: A clustering based feature selection approach to detect spam in social networks. Int. J. Inf. Commun. Technol. Res. 7(4), 27–33 (2015)

  31. Gupta, A.; Kaushal, R.: Improving Spam Detection in Online Social Networks. Indira Gandhi Delhi Technical University for Woman, Delhi (2015)

    Book  Google Scholar 

  32. Yu, X.; Achan, F.; Panigrahy, K.; Hulten, R.; Andosipkov, G.: Spamming botnets: signatures and characteristics. In: Proceeding of SIGCOMM (2008)

  33. Gao, H.; Chen, Y.; Lee, K.: Towards online spam filtering in social networks. In: 19th Annual Network & Distributed System Security Symposium (2012)

  34. Forsati, R.; Keikha, A.; Shamsfard, M.: An improved bee colony optimization algorithm with an application to document clustering. Neurocomputing 159, 9–26 (2015)

    Article  Google Scholar 

  35. Leung, Y.; Zhang, J.; Xu, Z.: Clustering by scale-space filtering. IEEE Trans. Pattern Anal. Mach. Intell. 22(12), 1396–1410 (2000)

    Article  Google Scholar 

  36. Halkidi, M.; Vazirgiannis, M.: Clustering validity assessment: finding the optimal partitioning of a dataset. In: Proceedings of IEEE ICDM, San Jose, CA, pp. 187–194 (2001)

  37. Das, S.; Abraham, A.; Konar, A.: Automatic clustering using an improved differential evolution algorithm. IEEE Trans. Syst. Man Cybern. Part Syst. Hum. 38(1), 218–237 (2008)

    Article  Google Scholar 

  38. Liu, S.; Zhang, J.; Xiang, Y.: Statistical detection of online drifting twitter spam. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (2016)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Karim Sohrabi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sohrabi, M.K., Karimi, F. A Feature Selection Approach to Detect Spam in the Facebook Social Network. Arab J Sci Eng 43, 949–958 (2018). https://doi.org/10.1007/s13369-017-2855-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-017-2855-x

Keywords

Navigation