4.7 Review

Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches

Journal

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume 112, Issue -, Pages 53-88

Publisher

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2018.03.015

Keywords

Social networks; Security; Malicious activities; Spam; Spain campaigns; Compromised accounts; Classification; Clustering

Funding

  1. Ministry of Electronics and Information Technology (MeitY) under Ministry of communications and IT, Government of India

Ask authors/readers for more resources

Ever increasing fame and obsession for social networks has also coxswained a dramatic increase in the presence of malicious activities. As a result, various researchers have proposed different features and techniques to detect and reduce this menace. This paper presents an expository study of various state-of-the-art techniques to detect two most interlinked apprehensive problems on social networks namely, spam detection and detection-cum-analysis of compromised accounts. It is evident from the ongoing statistics that despite profuse awareness and some anti-spam policies and techniques being developed, to everyone's surprise, the severity of spam has only increased. Moreover, with the growing smartness of spammers, existing techniques get bypassed and new features and techniques continuously keep on evolving. Therefore, in continuation to the ongoing research, a study comprising of a comprehensive analysis of different works is also required from time to time. The growing inclination of spammers to compromise the legitimate accounts has evolved as an evasive and more beneficial way to spread spam. Therefore, it has become highly relevant to review the techniques related to the detection of compromised accounts so as to track the spammers adhering to this behavior. In this work, we have performed a qualitative analysis of each paper discussing its pros and cons. In both the domains, the detection approaches have been placed under different categories and have been thoroughly reviewed stating their applicability. In conclusion, the paper carries a discussion of various gaps prevalent in the existing approaches and the corresponding actions to be taken to address them, providing a strong foundation for future researches to be carried out in this domain.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available