SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Detection of Spam
Tipping Behaviour on
Foursquare
Anupama Aggarwal¶, Prof P. Kumaraguru “PK”¶ ,
Prof J. Almeida*
¶

Indraprastha Institute of Information Technology (IIIT-Delhi, India)
* Universidade Federal de Minas Gerais (UFMG, Brazil)

1
Foursquare 101
‣ Location Based Social Network
‣ 33 Million Users *
‣ 3.5 Billion checkins *
‣ 31% of mobile social media users use Foursquare *

* As of January 2013

2
Location
Sharing
OSN

Foursquare 101

Friends Activity

Your Last
Checkin

Venue

Friends
Suggestions

Venue
Suggestions
Tip : Suggested Activity
for a Venue
Tip can be Liked or Saved
Spam Tips
Advertising / Marketing

‣ Tips unrelated to Venue

Scam / Phishing

4
Spam
according to

Foursquare ToS
‣ Tips with links to websites selling software, realtor contact
info, a listing for your business, or other promotion
‣ Tips with inappropriate language or negativity directed at
another person
‣ Unauthorized or unsolicited advertising, junk
5
Contributions
‣ Characterizing irregular user behaviour
‣

We observed different categories of spam users

‣

We characterize features distinguishing these spam users

‣ Automatic detection of spammers
‣

Distinguish between spam and legitimate Foursquare users

‣

Cluster spam users into different categories according to their behaviour

6
Data Crawling

2,400,594 tips
613,298 users

7
Observed Categories of
Spam Users
‣ Marketing : These users post tips to promote and
advertise a specific product/ brand / venue / external URL
‣ Malicious : Such Foursquare users post external  URLs in
Tips which direct to spam / phishing / malware websites
‣ Abusive / Derogatory: These users try to deface or
bad-mouth another person
‣ Self Promotion: These users try to draw attention to
themselves
8
Ground Truth Data
Annotation Portal

2,000 Legitimate users
1,900 Spammers
9
Features used to
detect Spammers
‣ User Attributes
‣

Properties of the Foursquare user profile and his checkins

‣ Social Attributes
‣

Friends network of the Foursquare user under inspection

‣ Content Attributes
‣

Details about Tips posted by the Foursquare user
10
Features used
Category

χ2 rank

Feature

User
Attributes

1
3
4
5
11
12
15

Number of Tips
Ratio of Check-ins and Tips
Number of Check-ins
Number of Badges
Number of Mayorships
Ratio of Check-ins and Badges
Number of Photos posted

Social
Attributes

6

Number of Friends

2

Similarity score of Tips

7
8
9
10
13
14

Number of URLs posted
Average number of words in Tips
Average number of characters in Tips
Ratio of number of likes and number of Tips
Average number of spam words in Tips
Average number of phone-numbers posted in Tips

Content
Attributes

11
Few Observations
‣ Spammers post same/similar Tips on multiple venues
‣ A large fraction of spam Tips contain URLs
‣ Spam Tips may also have phone numbers
‣ Legitimate users have more Friends
‣ Spammers have very few Friends but large number of Tips

12
Relation b/w Tips and
Checkins
Tips

Irregular User Behaviour

Check-ins
Tips Distribution

Legitimate users

Spammers

14
Classification Results
Classification
Algorithm

Precision
(Spam)

Precision
(Safe)

Recall
(Spam)

Recall
(Safe)

Accuracy

KNN

83.2%

86.6%

86.3%

83.5%

84.89%

Decision
Tree

88.1%

89.2%

88.3%

85.8%

89.53%

Random
Forest

89.3%

90.2%

88.3%

90.3%

89.76%

15
Detection of Spam Classes
‣ Expectation-Maximization (EM) clustering
‣ Spammers Categories ‣

Advertising / Marketing

‣

Self Promotion

‣

Abusive

‣

Malicious

16
Detection of Spam Classes
‣ Clustering Accuracy for spammer categories -

Advertising

88.23%

Self-Promotion

87.23%

Abusive

78.88%

Malicious

0%

17
Conclusion
‣ Analyzed spammers behaviour on Foursquare
‣ We obtained an accuracy of 89.76% with Random Forest
classifier to distinguish spammers from legitimate users
‣ We classified the spammers into four broad categories
‣ We were able to to detect users belonging to Advertising,
Self-promotion and Abusive categories with an accuracy of
88.23%, 87.23% and 78.88%
18
Future Work
‣ Refine our methodology by use of other classification
algorithms
‣ Use multiclass classification to detect users in any of the
spam categories
‣ Correlation of content and the URLs posted by different
users can help us in identifying several spam campaigns on
Foursquare

19
Thank You!
Questions ?

20
For any further information, please write to
pk@iiitd.ac.in
precog.iiitd.edu.in

21

Weitere ähnliche Inhalte

Ähnlich wie Detection of Spam Tipping Behaviour on Foursquare

You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
Priyanka Aash
 
MKTG521 Circle Tie Marketing Research
MKTG521 Circle Tie   Marketing ResearchMKTG521 Circle Tie   Marketing Research
MKTG521 Circle Tie Marketing Research
Rehab Wahsh
 
Converting Free Users to Paid Users - Fowa Miami 2009
Converting Free Users to Paid Users - Fowa Miami 2009Converting Free Users to Paid Users - Fowa Miami 2009
Converting Free Users to Paid Users - Fowa Miami 2009
Carsonified Team
 
E marketer traveler_reviews-online_communities_reshape_marketing_strategies
E marketer traveler_reviews-online_communities_reshape_marketing_strategiesE marketer traveler_reviews-online_communities_reshape_marketing_strategies
E marketer traveler_reviews-online_communities_reshape_marketing_strategies
AdCMO
 

Ähnlich wie Detection of Spam Tipping Behaviour on Foursquare (20)

Learn how personas can shape your optimization program
Learn how personas can shape your optimization programLearn how personas can shape your optimization program
Learn how personas can shape your optimization program
 
Data Science and Online Dating.pptx
Data Science and Online Dating.pptxData Science and Online Dating.pptx
Data Science and Online Dating.pptx
 
Introduction to Online Dating 2flirts.pptx
Introduction to Online Dating  2flirts.pptxIntroduction to Online Dating  2flirts.pptx
Introduction to Online Dating 2flirts.pptx
 
Collective Opinion Spam Detection Bridging Review Networks and Metadata
Collective Opinion Spam Detection Bridging Review Networks and MetadataCollective Opinion Spam Detection Bridging Review Networks and Metadata
Collective Opinion Spam Detection Bridging Review Networks and Metadata
 
How to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlineHow to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating Online
 
When should we ask, when should be measure?
When should we ask, when should be measure?When should we ask, when should be measure?
When should we ask, when should be measure?
 
Tinder clone app tinder business model & how it works!
Tinder clone app tinder business model  & how it works!Tinder clone app tinder business model  & how it works!
Tinder clone app tinder business model & how it works!
 
Dating App Guide 2022: Increasing The Dating App Downloads In Just 2 Months
Dating App Guide 2022: Increasing The Dating App Downloads In Just 2 MonthsDating App Guide 2022: Increasing The Dating App Downloads In Just 2 Months
Dating App Guide 2022: Increasing The Dating App Downloads In Just 2 Months
 
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial...
 
#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...
#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...
#FIRMday London 27 Nov 2014 James Bywater Talent Q " Making the right impact ...
 
MKTG521 Circle Tie Marketing Research
MKTG521 Circle Tie   Marketing ResearchMKTG521 Circle Tie   Marketing Research
MKTG521 Circle Tie Marketing Research
 
Deb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing Summit
Deb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing SummitDeb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing Summit
Deb O'Sullivan's (Microsoft) presentation at Mumbrella's Travel Marketing Summit
 
Quality In Action #7: Going Beyond Background Check
Quality In Action #7: Going Beyond Background CheckQuality In Action #7: Going Beyond Background Check
Quality In Action #7: Going Beyond Background Check
 
Converting Free Users to Paid Users - Fowa Miami 2009
Converting Free Users to Paid Users - Fowa Miami 2009Converting Free Users to Paid Users - Fowa Miami 2009
Converting Free Users to Paid Users - Fowa Miami 2009
 
best dating apps chicago
best dating apps chicagobest dating apps chicago
best dating apps chicago
 
Connecting with Microsoft Travellers
Connecting with Microsoft Travellers Connecting with Microsoft Travellers
Connecting with Microsoft Travellers
 
E marketer traveler_reviews-online_communities_reshape_marketing_strategies
E marketer traveler_reviews-online_communities_reshape_marketing_strategiesE marketer traveler_reviews-online_communities_reshape_marketing_strategies
E marketer traveler_reviews-online_communities_reshape_marketing_strategies
 
Fact-Checking Workshop by API & PolitiFact
Fact-Checking Workshop by API & PolitiFactFact-Checking Workshop by API & PolitiFact
Fact-Checking Workshop by API & PolitiFact
 
The Fact Checking Project from the American Press Institute
The Fact Checking Project from the American Press InstituteThe Fact Checking Project from the American Press Institute
The Fact Checking Project from the American Press Institute
 
InstaFind Power Point Presentation
InstaFind Power Point PresentationInstaFind Power Point Presentation
InstaFind Power Point Presentation
 

Mehr von IIIT Hyderabad

Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad
 

Mehr von IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Detection of Spam Tipping Behaviour on Foursquare

  • 1. Detection of Spam Tipping Behaviour on Foursquare Anupama Aggarwal¶, Prof P. Kumaraguru “PK”¶ , Prof J. Almeida* ¶ Indraprastha Institute of Information Technology (IIIT-Delhi, India) * Universidade Federal de Minas Gerais (UFMG, Brazil) 1
  • 2. Foursquare 101 ‣ Location Based Social Network ‣ 33 Million Users * ‣ 3.5 Billion checkins * ‣ 31% of mobile social media users use Foursquare * * As of January 2013 2
  • 3. Location Sharing OSN Foursquare 101 Friends Activity Your Last Checkin Venue Friends Suggestions Venue Suggestions Tip : Suggested Activity for a Venue Tip can be Liked or Saved
  • 4. Spam Tips Advertising / Marketing ‣ Tips unrelated to Venue Scam / Phishing 4
  • 5. Spam according to Foursquare ToS ‣ Tips with links to websites selling software, realtor contact info, a listing for your business, or other promotion ‣ Tips with inappropriate language or negativity directed at another person ‣ Unauthorized or unsolicited advertising, junk 5
  • 6. Contributions ‣ Characterizing irregular user behaviour ‣ We observed different categories of spam users ‣ We characterize features distinguishing these spam users ‣ Automatic detection of spammers ‣ Distinguish between spam and legitimate Foursquare users ‣ Cluster spam users into different categories according to their behaviour 6
  • 8. Observed Categories of Spam Users ‣ Marketing : These users post tips to promote and advertise a specific product/ brand / venue / external URL ‣ Malicious : Such Foursquare users post external  URLs in Tips which direct to spam / phishing / malware websites ‣ Abusive / Derogatory: These users try to deface or bad-mouth another person ‣ Self Promotion: These users try to draw attention to themselves 8
  • 9. Ground Truth Data Annotation Portal 2,000 Legitimate users 1,900 Spammers 9
  • 10. Features used to detect Spammers ‣ User Attributes ‣ Properties of the Foursquare user profile and his checkins ‣ Social Attributes ‣ Friends network of the Foursquare user under inspection ‣ Content Attributes ‣ Details about Tips posted by the Foursquare user 10
  • 11. Features used Category χ2 rank Feature User Attributes 1 3 4 5 11 12 15 Number of Tips Ratio of Check-ins and Tips Number of Check-ins Number of Badges Number of Mayorships Ratio of Check-ins and Badges Number of Photos posted Social Attributes 6 Number of Friends 2 Similarity score of Tips 7 8 9 10 13 14 Number of URLs posted Average number of words in Tips Average number of characters in Tips Ratio of number of likes and number of Tips Average number of spam words in Tips Average number of phone-numbers posted in Tips Content Attributes 11
  • 12. Few Observations ‣ Spammers post same/similar Tips on multiple venues ‣ A large fraction of spam Tips contain URLs ‣ Spam Tips may also have phone numbers ‣ Legitimate users have more Friends ‣ Spammers have very few Friends but large number of Tips 12
  • 13. Relation b/w Tips and Checkins Tips Irregular User Behaviour Check-ins
  • 16. Detection of Spam Classes ‣ Expectation-Maximization (EM) clustering ‣ Spammers Categories ‣ Advertising / Marketing ‣ Self Promotion ‣ Abusive ‣ Malicious 16
  • 17. Detection of Spam Classes ‣ Clustering Accuracy for spammer categories - Advertising 88.23% Self-Promotion 87.23% Abusive 78.88% Malicious 0% 17
  • 18. Conclusion ‣ Analyzed spammers behaviour on Foursquare ‣ We obtained an accuracy of 89.76% with Random Forest classifier to distinguish spammers from legitimate users ‣ We classified the spammers into four broad categories ‣ We were able to to detect users belonging to Advertising, Self-promotion and Abusive categories with an accuracy of 88.23%, 87.23% and 78.88% 18
  • 19. Future Work ‣ Refine our methodology by use of other classification algorithms ‣ Use multiclass classification to detect users in any of the spam categories ‣ Correlation of content and the URLs posted by different users can help us in identifying several spam campaigns on Foursquare 19
  • 21. For any further information, please write to pk@iiitd.ac.in precog.iiitd.edu.in 21