A Framework for the Detection of Suspicious Discussion on Online Forums using Integrated approach of Support Vector Machine and Particle Swarm Optimization

Main Article Content

Harsh Arora
Govind Murari Upadhyay

Abstract

With the advancements of technology, human has become more efficient to share the information via internet. It has more often observed that the news stories are initially broken up on social media sites like Twitter, Facebook, etc. and later have taken up by the other channels like printing media or electronic media channels. Any social media based message board where information and user opinion can be discussed is considered as online forums. Most of the data of online forums are stored in text format, hence the present work make use of only text format of suspected postings as evidence for investigation. But there are many suspicious users such as spammers, fraudsters, and other types of attackers that use the latest technology for the criminal activities. So, there is the need to develop tools for the recognition of suspicious activities. There is the existence of tools and methods for the recognition of suspicious information available on internet in the form of user comments or views. In this research paper, we are presenting the existing research work for the detection of suspicious information. The key features and drawbacks of existing concepts have also presented. To improve the autonomous approach, we have also presented a framework using integrated approach of Support Vector Machine (SVM) and Particle Swarm Optimization (PSO). SVM is a statistical learning based data mining approach and PSO is swarm intelligence based concept considered to optimize the parameters of SVM.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

. DeSanctis, Gerardine, Anne-Laure Fayard, Michael Roach, and Lu Jiang. "Learning in online forums." European Management Journal 21, no. 5 (2003): 565-577.

. Li, Nan, and Desheng Dash Wu. "Using text mining and sentiment analysis for online forums hotspot detection and forecast." Decision support systems48, no. 2 (2010): 354-368.

. Johnson, David R., and David Post. "Law and borders: The rise of law in cyberspace." Stanford Law Review (1996): 1367-1402.

. Edwards, Matthew, Awais Rashid, and Paul Rayson. "A systematic survey of online data mining technology intended for law enforcement." ACM Computing Surveys (CSUR) 48, no. 1 (2015): 15.

. Jiang, Meng, Alex Beutel, Peng Cui, Bryan Hooi, Shiqiang Yang, and Christos Faloutsos. "Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms." IEEE Transactions on Knowledge and Data Engineering 28, no. 8 (2016): 2187-2200.

. Jain, Suchita, Vanya Sharma, and Rishabh Kaushal. "Towards automated real-time detection of misinformation on Twitter." In Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on, pp. 2015-2020. IEEE, 2016.

. Murugesan, M. Suruthi, R. Pavitha Devi, S. Deepthi, V. Sri Lavanya, and Annie Princy. "Automated Monitoring Suspicious Discussions on Online Forums Using Data Mining Statistical Corpus Based Approach." Imperial Journal of Interdisciplinary Research 2, no. 5 (2016).

. Tayal, Devendra Kumar, Arti Jain, Surbhi Arora, Surbhi Agarwal, Tushar Gupta, and Nikhil Tyagi. "Crime detection and criminal identification in India using data mining techniques." AI & society 30, no. 1 (2015): 117-127.

. Alami, Salim, and Omar EL Beqqali. "Detecting Suspicious Profiles Using Text Analysis Within Social Media." Journal of Theoretical & Applied Information Technology 73, no. 3 (2015).

. Hosseinkhani, Javad, Mohammad Koochakzaei, Solmaz Keikhaee, and Javid Hosseinkhani Naniz. "Detecting suspicion information on the Web using crime data mining techniques." International Journal of Advanced Computer Science and Information Technology 3, no. 1 (2014): 32-41.

. Ali, Mohammed Mahmood, Khaja Moizuddin Mohammed, and Lakshmi Rajamani. "Framework for surveillance of instant messages in instant messengers and social neworking sites using data mining and ontology." In Students' Technology Symposium (TechSym), 2014 IEEE, pp. 297-302. IEEE, 2014.

. Kumar, A. Sharath, and Sanjay Singh. "Detection of User Cluster with Suspicious Activity in Online Social Networking Sites." In Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on, pp. 220-225. IEEE, 2013.

. Suykens, Johan AK, and Joos Vandewalle. "Least squares support vector machine classifiers." Neural processing letters 9, no. 3 (1999): 293-300.

. Tong, Simon, and Daphne Koller. "Support vector machine active learning with applications to text classification." Journal of machine learning research2, no. Nov (2001): 45-66.

. Amari, Shun-ichi, and Si Wu. "Improving support vector machine classifiers by modifying kernel functions." Neural Networks 12, no. 6 (1999): 783-789.

. Kennedy, James. "Particle swarm optimization." In Encyclopedia of machine learning, pp. 760-766. Springer US, 2011.

. Clerc, Maurice. Particle swarm optimization. Vol. 93. John Wiley & Sons, 2010.

. Poli, Riccardo, James Kennedy, and Tim Blackwell. "Particle swarm optimization." Swarm intelligence 1, no. 1 (2007): 33-57.