Seminar f0

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

Bharat Institute of Engineering

and Technology
Mangalpally(V), Ibrahimpatnam(M), R.R.Dist-501510
Department of Computer Science and Engineering

Seminar On
Identifying Spammers And
Fake Users On Social Media
Under the Guidance of:
U. Narasimhulu Presented By:
Professor in CSE Department K. Sadha Reddy 20E11A05F0
BIET, Hyderabad
CONTENT
 Introduction
 Architecture
 Purpose
 System Analysis
 Testing methodologies
 Advantages
 Output
 Conclusion
Introduction
 Social networking sites engage millions of users around
the world. The users interaction with these social sites,
such as Twitter and Facebook have tremendous impact.
 The prominent social networking sites have turned into
a target platform for the spammers to disperse huge
amount of irrelevant and deleterious information.
 The detection of spammers and identification of fake
users on Twitter has become a common area of research
in contemporary online social Networks (OSN).
Architecture
Purpose
 In this the system elaborates a classification of spammer
detection techniques.The proposed taxonomy is categorized
into four main classes,
1. Fake Content
2. URL Based Spam Detection
3. Detecting spam in Trending Topics
4. Fake User Identification
System Analysis

. Feasibility
Study
The feasibility of the project is analyzed inthis
phase and business proposal is put forth with a
very genral plan for the project and some cost
estimates.
The three considerations involved in the feasibility
analysis are:
1. Economical Feasibility
2. Technical Feasibility
3. Social Feasibility
System Testing
 The purpose of testing is to discover errors.Testing
is a process of trying to discover every fault or
weakness in a work product.
 It provides a way to check the functionality of
components and a finished product.
 It is the process of excersing software with the
intent of ensuring that the Software system meets
its requirements and user expectations and does not
fail.
Testing Methodologies
 Unit Testing
 Integration Testing

 User Acceptance Testing

 Output Testing

 Validation Testing
Advantages
 This study includes the comparision of various previous
methodogies proposed using different datasets and with
different characteristics,
 The fake content propagation was identified through the
metrics that include :
1. Social Reputation
2. Global Engagement
3. Likability
4. Credibility
 The authors utilized regression prediction model to ensure the
overall impact of people.
Screenshots
Output
Output
Conclusion
 In this paper, we performed a review of
techniques used for detecting spammers on
Twitter. In addition, we also presented a
taxonomy of Twitter spam detection
approaches and categorized them as fake
content detection, URL based spam detection,
spam detection in trending topics, and fake
user detection techniques.Moreover, the
techniques were also compared in terms of
their specified goals and datasets used.
References

1. B. Erçahin, Ö. Akta³, D. Kilinç, and C. Akyol, ``Twitter fake account

detection,'' in Proc. Int. Conf. Comput. Sci. Eng. (UBMK), Oct.

2017,pp. 388392.

2 F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, ``Detecting


 spammers on Twitter,'' in Proc. Collaboration, Electron. Messaging, Anti-

Abuse Spam Conf. (CEAS), vol. 6, Jul. 2010, p. 12.

S. Gharge, and M. Chavan, ``An integrated approach for malicious tweets


3

detection using NLP,'' in Proc. Int. Conf. Inventive Commun. Comput.

Technol. (ICICCT), Mar. 2017, pp. 435438.


Thankyou

You might also like