Social cyber-criminal, towards automatic real time recognition of malicious posts on Twitter
Abstract
Easy access to the internet throughout the world has fully reformed the usage of social communication such as Facebook, Twitter, Linked In which are becoming a part of our life. Accordingly, cybercrime has become a vital problem, especially in developing countries. The dissemination of information with no risk of being discovered and fetched leads to an increase in cyber-criminal. Meanwhile, the huge amount of data continuously produced from Twitter made the discovery process of cyber-criminals is a tough assignment. This research will contribute in determined on the build the comparable vectors for (positive and negative classes) and then the classify incoming tweets to predicate his class (positive or negative). The proposed routines staring with the construct super comparable vectors (SCV) (positive and negative vectors), and the construct vector for the incoming tweet, and then calculate similarities with both SCV and compare calculated similarities to predicate class of incoming tweet. In this research, we used some common techniques for calculating the weight of terms in tweets to construct SCV. To ensure the successful operation of the proposed system, we performed a pilot analysis on a real example of an examination. Research Improves precision, recall, and F1 values by 87%, 59%, 69.99%, respectively.
Keywords
Cyber-criminal; Dominant meaning; Frequency; Malicious posts on Twitter; Term frequency; TF inverse document;
Full Text:
PDFDOI: http://doi.org/10.11591/ijeecs.v25.i2.pp1199-1207
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).