Volume 6 , Issue 1 , PP: 08-18, 2023 | Cite this article as | XML | Html | PDF | Full Length Article
Amel Ali Alhussan 1 * , Hassan K. Ibrahim Al-Mahdawi 2 , Ammar Kadi 3
Doi: https://doi.org/10.54216/IJWAC.060101
Although there are many networks security tools, both wire and wireless connected networks are still suffering from many types of attacks. YouTube's meteoric rise to prominence as a social platform speaks for itself. The sheer volume of comments on YouTube has made it an ideal medium for spammers to spread their malicious software. Phishing attacks, in which anyone who clicks on a bad link might be a victim, have contributed to this problem. Classification systems may be used to examine spam for its unique characteristics and identify it. This is why it is suggested that YouTube already has built-in mechanisms for identifying spam. A YouTube Spam detection framework was designed with the five stages of data collection, pre-processing, features extraction, classification, and detection, allowing for the execution of the tests. To analyze and validate each stage of the YouTube detection methodology presented in this study, two metaheuristic optimization methods are employed to optimize the parameters of a new voting ensemble classifier. These methods are the particle swarm optimization (PSO) and the Genetic Algorithm (GA). The ensemble model is based on three classifiers: neural. Results indicate that the proposed approach is accurate. In addition, statistical analysis is performed to emphasize the superiority and effectiveness of the proposed methodology.
Connected Networks , Spam detection , Voting ensemble , Neural network , Support vector machine , Decision tree.
[1] Y. Yusof and O. H. Sadoon, “Detecting Video Spammers In Youtube Social Media,” no. 082, pp. 228–234, 2017.
[2] U. K. Sah and N. Parmar, “An approach for Malicious Spam Detection In Email with comparison of different classifiers,” IRJET, vol 4, i.8, pp. 2238–2242, 2017.
[3] I. Daugher and R. Antoun, “Ham- Spam Filtering Using Different PCA Scenarios,” IEEE Int. Conf. Comput. Sci. Eng. IEEE Int. Conf. Embed. Ubiquitous Comput. Int. Symp. Distrib. Comput. Appl. to Business, Eng. Sci., pp. 542–545, 2016.
[4] S. Gandra, “Implementation Of Prototype To Detect Spam In YouTube Using The Application TubeKit And Naïve Bayes Algorithm,” 2014.
[5] M. Esmaeili, et al., “An Anti-Spam System using Naive Bayes Method and Feature Selection Methods,” International Journal of Computer Applications, vol. 165, no. 4, pp. 1–5, 2017.
[6] K. Tran et al., “Towards a Feature Rich Model for Predicting Spam Emails containing Malicious Attachments and URLs,” in Proceedings of the 11-th Australasian Data Mining Conference, 2013, pp. 161–171.
[7] T. Stone, “Parameterization of Na ¨ ıve Bayes for Spam Filtering,” 2003.
[8] M. Shafie et al., “A Review on Mobile SMS Spam Filtering Techniques,” vol. 5, 2017.
[9] H. Garcia-molina, “Web Spam Taxonomy,” pp. 1–9.
[10] J. Zhang and G. Gu, “Neighbor Watcher : A Content-Agnostic Comment Spam Inference System,” no. 2.
[11] T. C. Alberto, J. V. Lochter, and T. A. Almeida, “TubeSpam: Comment spam filtering on YouTube,” Proc. - 2015 IEEE 14th Int. Conf. Mach. Learn. Appl. ICMLA 2015, no. 2012, pp. 138–143, 2016.
[12] P. S. Kiran, “Detecting spammers in YouTube : A study to find spam content in a video platform.,” IOSR Journal of Engineering (IOSRJEN), vol. 05, no. 07, pp. 26–30, 2015.
[13] R. Chowdury, N. M. Adnan, G. A. N. Mahmud, and R. M. Rahman, “A Data Mining Based Spam Detection System for YouTube,” pp. 373–378, 2013.
[14] M. Alsaleh and A. Alarifi, “Combating Comment Spam with Machine Learning Approaches,” 2015.
[15] N. Abdel Samee, E. M. El-Kenawy, G. Atteia, M. M. Jamjoom, A. Ibrahim et al., "Metaheuristic optimization through deep learning classification of covid-19 in chest x-ray images," Computers, Materials & Continua, vol. 73, no.2, pp. 4193–4210, 2022.
[16] A. A. Abdelhamid and S. R. Alotaibi, "Optimized two-level ensemble model for predicting the parameters of metamaterial antenna," Computers, Materials & Continua, vol. 73, no.1, pp. 917–933, 2022.
[17] A. K. Uysal, S. Gunal, S. Ergin, and E. S. Gunal, “The Impact of Feature Extraction and Selection on SMS Spam Filtering,” Elektronika Ir Elektrotechnika, pp. 67–72, 2013.
[18] N. Perveen, “Sentiment Based Twitter Spam Detection,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 7, pp. 568–573, 2016.
[19] A. Patwari, “Identifying Undesireble Behaviour in Social Media : Towards Automated Fact-Checking and YouTube Meta-Data Spam Detection,” Purdue University, 2017.
[20] S. R. Gomes, S. G. Saroar, M. A. Telot, B. N. Khan, A. Chakrabarty, and M. Mostakim, “A Comparative Approach to Email Classification Using Naive Bayes Classifier and Hidden Markov Model,” in Proceedings of the 2017 4th International Conference on Advances in Electrical Engineering (ICAEE), 2017, pp. 28–30.
[21] T. Verma, “Tokenization and Filtering Process in RapidMiner,” International Journal of Applieed Information Systems, vol. 7, no. 2, pp. 16–18, 2014.
[22] T. Yang and K. Qian, “Spam Filtering using Association Rules and NaIve Bayes Classifier,” pp. 638–642, 2015.
[23] W. Hijawi, H. Faris, J. Alqatawna, A. M. Al-zoubi, and I. Aljarah, “Improving Email Spam Detection Using Content Based Feature Engineering Approach,” 2016.
[24] R. Cristina, “Identification of Spam Comments using Natural Language Processing Techniques,” pp. 29–35, 2014.
[25] R. E. Mercer, R. Shams, and R. E. Mercer, “Classifying Spam Emails Using Text and Readability Features Classifying Spam Emails using Text and Readability Features,” no. December, 2013.
[26] S. Raschka, “Introduction and Theory,” pp. 1–20, 2014.
[27] J. Badresiya, Ashok; Vohra, Saifee; Teraiya, “Performanc Analysis of Supervised Techniques for Review Spam Detection,” Int. J. Adv. Netw. Appl., pp. 21–24, 2014.
[28] C. Visani and N. Jadeja, “A Study on Different Machine Learning Techniques for Spam Review Detection,” no. August, 2017.
[29] K. Zainal, N. F. Sulaiman, and M. Z. Jali, “An Analysis of Various Algorithms For Text Spam Classification and Clustering Using RapidMiner and Weka,” Int. J. Comput. Sci. Inf. Secur., vol. 13, no. 3, pp. 66–74, 2015.
[30] Lichman, M., “UCI Machine Learning Repository”, [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California, School of Information and Computer Science, 2013.
[31] Salleh, S. N. M., Din, R., Zakaria, N. H., & Mustapha, A., “A Review on Structured Scheme Representation on Data Security Application,”. Indonesian Journal of Electrical Engineering and Computer Science, 11(2), pp. 733-739, 2018.
[32] Umapathy, K., & Khare, N., “An Efficient & Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization & Content Visualization Algorithm,” “Indonesian Journal of Electrical Engineering and Computer Science, 10(2), pp.807-816, 2018.
[33] Abdelhamid, A.A.; El-Kenawy, E.-S.M.; Khodadadi, N.;Mirjalili, S.; Khafaga, D.S.; et al., Classification of Monkeypox Images Based on Transfer Learning and the Al-Biruni Earth Radius Optimization Algorithm. Mathematics 2022, 10, 3614.
[34] Eid, M.M.; El-Kenawy, E.-S.M.; Khodadadi, N.; Mirjalili, S.; Khodadadi, et al., Meta-Heuristic Optimization of LSTM-Based Deep Network for Boosting the Prediction of Monkeypox Cases. Mathematics 2022, 10, 3845.