Identification of cyberbullying by neural network methods

Ekaterina Sergeevna Momentum, Andrei Viktorovich Filimonov, A. V. Osipov, S. T. Gataullin
{"title":"Identification of cyberbullying by neural network methods","authors":"Ekaterina Sergeevna Momentum, Andrei Viktorovich Filimonov, A. V. Osipov, S. T. Gataullin","doi":"10.25136/2409-7543.2022.3.38488","DOIUrl":null,"url":null,"abstract":"\n The authors consider in detail the identification of cyberbullying, which is carried out by fraudsters with the illegal use of the victim's personal data. Basically, the source of this information is social networks, e-mails. The use of social networks in society is growing exponentially on a daily basis. The use of social networks, in addition to numerous advantages, also has a negative character, namely, users face numerous cyber threats. Such threats include the use of personal data for criminal purposes, cyberbullying, cybercrime, phishing and cyberbullying. In this article, we will focus on the task of identifying trolls. Identifying trolls on social networks is a difficult task because they are dynamic in nature and are collected in several billion records. One of the possible solutions to identify trolls is the use of machine learning algorithms. The main contribution of the authors to the study of the topic is the use of the method of identifying trolls in social networks, which is based on the analysis of the emotional state of network users and behavioral activity. In this article, in order to identify trolls, users are grouped together, this association is carried out by identifying a similar way of communication. The distribution of users is carried out automatically through the use of a special type of neural networks, namely self-organizing Kohonen maps. The group number is also determined automatically. To determine the characteristics of users, on the basis of which the distribution into groups takes place, the number of comments, the average length of the comment and the indicator responsible for the emotional state of the user are used.\n","PeriodicalId":150406,"journal":{"name":"Вопросы безопасности","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Вопросы безопасности","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25136/2409-7543.2022.3.38488","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The authors consider in detail the identification of cyberbullying, which is carried out by fraudsters with the illegal use of the victim's personal data. Basically, the source of this information is social networks, e-mails. The use of social networks in society is growing exponentially on a daily basis. The use of social networks, in addition to numerous advantages, also has a negative character, namely, users face numerous cyber threats. Such threats include the use of personal data for criminal purposes, cyberbullying, cybercrime, phishing and cyberbullying. In this article, we will focus on the task of identifying trolls. Identifying trolls on social networks is a difficult task because they are dynamic in nature and are collected in several billion records. One of the possible solutions to identify trolls is the use of machine learning algorithms. The main contribution of the authors to the study of the topic is the use of the method of identifying trolls in social networks, which is based on the analysis of the emotional state of network users and behavioral activity. In this article, in order to identify trolls, users are grouped together, this association is carried out by identifying a similar way of communication. The distribution of users is carried out automatically through the use of a special type of neural networks, namely self-organizing Kohonen maps. The group number is also determined automatically. To determine the characteristics of users, on the basis of which the distribution into groups takes place, the number of comments, the average length of the comment and the indicator responsible for the emotional state of the user are used.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于神经网络方法的网络欺凌识别
作者详细考虑了网络欺凌的识别,这是由欺诈者非法使用受害者的个人数据进行的。基本上,这些信息的来源是社交网络,电子邮件。社交网络在社会中的使用每天都呈指数级增长。使用社交网络,除了众多的优势,也有一个负面的特点,即用户面临众多的网络威胁。此类威胁包括将个人数据用于犯罪目的、网络欺凌、网络犯罪、网络钓鱼和网络欺凌。在本文中,我们将重点关注识别喷子的任务。识别社交网络上的喷子是一项艰巨的任务,因为它们本质上是动态的,并且收集了数十亿条记录。识别巨魔的一个可能的解决方案是使用机器学习算法。作者对该主题研究的主要贡献是使用了识别社交网络中的喷子的方法,该方法基于对网络用户的情绪状态和行为活动的分析。在本文中,为了识别喷子,将用户分组在一起,这种关联是通过识别类似的通信方式来实现的。用户的分布是通过使用一种特殊类型的神经网络自动进行的,即自组织Kohonen地图。群组号码也会自动确定。为了确定用户的特征,在此基础上进行分组分布,使用了评论数,评论的平均长度和负责用户情绪状态的指标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Some ways of countering fraud committed using digital payments according to the legislation of Russia and China Forms and methods of preventing crimes in the field of drug trafficking Criminological characteristics of thefts committed with illegal entry into a dwelling in the Republic of Tyva Actual aspects of the application of psychophysiological research methods using a polygraph in the implementation of state protection measures against participants in criminal proceedings On the issue of mobilizing citizens to preserve traditional values
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1