Detection of Fake Social Media Profiles Using Machine Learning Techniques

  • K. Nitalaksheswara Rao Andhra University, Visakhapatnam.
  • Dr. Uma Devi D Gayatri Vidya Parishad College of Engineering (Autonomous), Visakhapatnam, Andhra Pradesh, India
  • Dr. Sreekanth P GITAM University Visakhapatnam Andhra Pradesh , India.
  • Dr. Soujanya D GITAM University Visakhapatnam Andhra Pradesh , India.
Keywords: Social media, Fake profiles, Machine learning, Light GBM, SVM-NN

Abstract

Social media' sex plosive growth and the vast amounts of user-provided personal information have drawn attackers who steal data, spread fake news, and engage in other criminal activity. Some harmful accounts are employed to advance agendas and spread false information. An important step is the detection of malicious profiles. The system consists of a binary classifier which takes profile information as input and outputs whether the profile is genuine or fake. It uses the classification algorithms like SVM-NN, Light GBM and compares them to the existing system algorithms to give a final model with better results.

Author Biographies

K. Nitalaksheswara Rao, Andhra University, Visakhapatnam.

Department of Computer Science and Systems Engineering

 

Dr. Uma Devi D, Gayatri Vidya Parishad College of Engineering (Autonomous), Visakhapatnam, Andhra Pradesh, India

Associate Professor, Department of computer science and Engineering, 

Dr. Sreekanth P, GITAM University Visakhapatnam Andhra Pradesh , India.

Assistant Professor Department of Computer science and Engineering GST, 

Dr. Soujanya D, GITAM University Visakhapatnam Andhra Pradesh , India.

Assistant Professor Department of Computer science and Engineering GST, 

References

(1) A.T.Kabakus and R.Kara,“A survey of spam detection methods on twitter”, International Journal Of Advanced Computer Science And Applications, vol. 8, no. 3, pp.29–38,2017.
(2) A.-Z. Ala’M, H. Faris et al., “Spam profile detection in social networks based on public features”, in Information and Communication Systems (ICICS), 20178th International Conference on.IEEE,2017,pp.130–135.
(3) R. Kaur and S. Singh, “A survey of data mining and social network analysis based a nomaly detection techniques,” Egyptian informatics journal, vol. 17, no. 2, pp. 199–216,2016.
(4) A.K.Ameen and B.Kaya,“Detecting spammers in twitter network,” International Journal of Applied Mathematics, Electronics and Computers,vol.5,no.4,pp.71–75,2017.
(5) S. D. Jadhav and H. Channe, “Comparative study of K- NN, naive bayes and decision tree classification techniques,” International Journal of Science and Research,vol.5,no.
Published
2023-05-31