Spam Management in Social Networks by Content Rating

Author

Master's degree, Information Technology, Technical and Engineering Faculty of Tarbiat Modares University

Abstract

The high-speed growth of social networks has led to publication of inappropriate contents and spams.
Spam posts fill out user’s home pages and cause time wasting and also traffic load, by phishing, attackers
attempt to acquire sensitive information from a victim in SNs. The other problem in these networks is Adults
only posts that users face in their profiles. Inappropriate contents posted by the SN user’s friends or
spammers would be shown in their home pages or spammers walls. In this paper a new method based on
content rating (CR) to identify and manage spam in social networks, is presented. The method is applied for
post rating including spam, phishing and Adults only (+18) contents in order to manage home page posts
(labeled with spam logo, hide or show) according to users feedbacks. The proposed method has been implemented
on open source social network software. Data has been gathered during about two months operation
of this SN platform and has been rated and applied in post section of home pages/walls of each SN
users. The proposed content rating method has shown significant identification of spam and phishing in this
social network.

Keywords


[1] Ch. Zhang, J. Sun, , X. Zhu and Y. Fang, “Privacy and
Security for Online Social networks: Challenges and
Opportunities,” IEEE Network, vol. 24, no.4, pp. 13-18,
Jul/Aug 2010, doi: 10.1109/MNET.2010.5510913.
[2] G. Ahn, M, Shehab and A. Squicciarin, “Security and
Privacy in Social Networks,” IEEE Internet computing,
vol. 15, no. 3, pp. 10-12, available at http://
i e e exp lo r e. i e e e .o rg/ s t amp / s t amp . j sp ? tp=&a rn -
umber=5755600, May/June 2011, doi: 10.1109/
MIC.2011.66.
[3] D. Irani, S. Webb, C. Pu and K. Li, “Modeling Unintended
Personal-Information Leakage from Multiple Online
Social Networks,” IEEE Internet computing, vol. 15, no.3,
pp. 13-19, May/June 2011, doi: 10.1109/MIC.2011.25.
[4] M. Huber, M. Mulazzani, G. Kitzler, S. Goluch and E.
Weippl, “Friend-in-the-middle Attacks: Exploiting Social
Networking Sites for Spam,” IEEE Internet computing,
vol. 15, no.3, pp. 28 – 34, May/June 2011, doi: 10.1109/
MIC.2011.24.
[5] M.L. Lobina, D. Giusto, D. Mula and E. Maggio, “Antispam
laws at the times of social networks: the European
approach” http://www.dimt.it/File/Giusto_Lobina_
Maggio_Mula%20-%20Spam.pdf. 2010.
[6] Data Protection and Freedom of Information Commissioner
of the State of Berlin (Germany), “Resolution on Privacy
Protection in Social Network Services,” 30th International
Conference of Data Protection and Privacy Commissioners
Strasbourg. http://www.ed- ps.europa.eu/
EDPSWEB/webdav/shared/Documents/Cooperation/
Conference_int/08-10-17_Strasbourg _social_network_
EN.pdf. 2008.
[7] Y. Liu., G. Zhao, and T. Wang, “Architecture Research
and Design for the Internet Content Rating Implementation
System,” Proc. 2nd IEEE workshop. Education Technology
and Computer Science (ETCS), pp. 369-401,
March. 2010, doi: 10.1109/ETCS.2010.419.
[8] L Yan, and W. Tai, “Technical Standard System
Development for the Internet Content Rating Service,”
Proc. 3rd IEEE workshop. Intelligent Systems and Applications
(ISA), pp. 1-5, May. 2011, doi: 10.1109/
ISA.2011.5873326.
[9] P. Hayati, V. Potdar, A.Talevski, N.Firoozeh, S. Sarenche,
and E.A. Yeganeh, “Definition of Spam 2.0: New
Spamming Boom” 4th IEEE International Conference on
Digital Ecosystems and Technologies (DEST), pp. 580-
584, April 2010.
[10] Y. Li, B. Fang, L. Guo, and S. Wang, “Research of a
novel anti-spam technique based on users feedback and
improved naive Bayesian approach” International conference
on Networking and Services, 2006. ICNS ’06.,
pp. 86–86, July2006.
[11] T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer,
“Social Phishing“ http://efiko.org/material/Social%
20Phishing%20by%20Tom%20Jagat ic%20et .%
20al.pdf . 2005
[12] K. Coronges, R.Dodge, C. Mukina, Z. Radwick, J.
Shevchik, and E. Rovira, “The Influences of Social
Networks on Phishing Vulnerability” 45th Hawaii
International Conference on System Science (HICSS),
pp. 2366- 2373, Jan. 2012.
[13] N. Bilton, “Researcher Releases Facebook Profile Data”
http://bits.blogs.nytimes.com/2010/07/28/100-millionfacebook-
ids-compiled-online. 2010.
[14] S. Abu Nimeh, T. Chen and O. Alzubi, “Malicious and
Spam Posts in Online Social Networks,” IEEE computer,
vol. 44, no. 9, pp. 23–28, Sep. 2011, doi: 10.1109/
MC.2011.222.
[15] Ch. Liang, Y. Chen, G. Liao and B. Cheng, “Anti-spam
Email System in Facebook,” Proc. IEEE Symp.
Computer, pp. 183-186, Dec. 2010, doi: 10.1109/
COMPSYM. 2010.5685522.
[16] A. H. Wang, “Don’t follow me: Spam Detection in
Twitter,” Proc. Conf. Security and Cryptography
(SECRYPT), pp. 1-10. July. 2010.
[17] Sophos, “Sophos Security Threat Report reveals increase
in social networking security threats,” http://
www. s o p h o s . c om/ e n - u s / p r e s s - o f f i c e / p r e s s -
releases/2011/01/threat-report-2011.aspx. 2011.
[18] G. Stringhini, Ch. Kruegel and G. Vigna, “Detecting
Spammers on Social Networks,” iseclab.org/papers/
acsac10-socialnets.pdf. 2010.
[19] Security parks, “Do not falling victim of social
networking spam,” http://www.securitypark.co.uk/
security _article 262665.html. 2009.
[20] L. Munson, “5 Types Of Social Networking Scam – #5
Spam,” http://www.security-faqs.com/5-types-of-socialnetworking-
scam-5-spam.html. 2008.
[21] W. Luo, J. Liu, J. Liu, and Ch. Fan, “An Analysis of
Security in Social Networks,” Proc. Eighth Conf.
Dependable Autonomic and Secure Computing, pp. 648-
651, Dec. 2009, doi: 10.1109/DASC.20-09.100.
[22] S. Liss and S. S. Columnist, “As Facebook and Twitter
grow, so do opportunities to rip people off,” http://
articles.sun-sentinel.com/2010-07-31/news/fl-slcolsocial-
media-scams-201007-31_1_social-media-scamfacebook.
2010.
[23] H. Y. Lam and D. Y. Yeung, “A Learning Approach to
Spam Detection based on Social Networks,”
w w w . c s e . u s t . h k / ~ d y y - e u n g / p a p e r / p d f /
yeung.ceas2007.pdf. 2007.
Volume 2, Issue 2 - Serial Number 2
November 2020
Pages 53-62
  • Receive Date: 10 November 2014
  • Revise Date: 04 July 2023
  • Accept Date: 19 September 2018
  • Publish Date: 23 July 2014