Loading

An Application of Big Data in Social Media Anomaly Detection using Weight Based Technique to Compare Performance of PIG and HIVE
Prashant Mishra1, Dheeraj Rane2

1Prashant Mishra, Department of Computer Science & Engineering, Medi-Caps University, Indore, India.
2Dheeraj Rane, Asst. Prof Department of Computer Science & Engineering, Medi-Caps University, Indore, India.

Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2492-2497 | Volume-8 Issue-10, August 2019 | Retrieval Number: J95480881019/2019©BEIESP | DOI: 10.35940/ijitee.J9548.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Social media is become one of the most popular application. Commonly social media is used for communication and social activities. Thus a significant amount of data is produced in these platforms and handling of these data requires advance data handling techniques thus big data is used to deal with such huge data. On the other hand, now in these days attackers and phishers are also active on social media. These attackers create fake profiles and trap the users to still their confidential and sensitive information. In this context the fake profiles are one of the serious problems in these days in social media. In this presented work a new technique for detecting the social media anomaly profile is prepared and their implementation is described in this paper. In addition of that the experimental analysis on real twitter profiles are also performed for 1200 profile features. To process these data two BIG data utilities are used namely PIG and HIVE is used. These profile features are collected from the live twitter data and evaluation of different profiles. The experimental results are compared for both the utilities (i.e. PIG and Hive) to demonstrate the successfully identification of legitimate and anomaly profiles.
Keywords: BIG Data, data mining, fake profile, HIVE, PIG ,profile anomaly, social media, social spamming
Scope of the Article: Big Data Analytics