Twitter is an American social networking and blogging site where users can communicate through messages known as "Tweets. The number of characters is restricted to 280 for all languages except Korean, Chinese and Japanese. Users on social media platforms tend to easily believe the contents of posts related to any random events and some of these events happen to be fake. Twitter spammers may fulfill their malicious objectives, such as spam sending, distributing malware, hosting botnet command and control (C&C) networks, and launching other illicit activities in the underground. Hence, we have proposed a system that will not only help in finding the type of spammers but also eliminate identical tweets. So we have implemented multi-classifier algorithms such as naive Bayes, K-Nearest neighbor, Decision tree and Random forest on a dataset obtained from Twitter and their performance is compared, also the most accurate algorithm is found out. The results of the experiment have been very positive.

1.
S. M.
Bhagavathi
,
A.
Thavasimuthu
,
A.
Murugesan
,
R. C. P.
Latha
,
A.
Vijay
,
R.
Laxmi
, and
R.
Thavasimuthu
, “
Weather forecasting and prediction using hybrid C5.0 machine learning algorithm
,”
International Journal of Communication Systems
34
,
4805
(
2021
).
2.
S.
Balakrishnan
,
M. S. S.
Hameed
,
K.
Venkatesan
, and
G.
Aswin
, “
Interaction of Spatial Computing In Augmented Reality
,” in
International Conference on Advanced Computing and Communication Systems
(
IEEE
,
2021
) p.
1904
3.
P.
Surendra
and
S.
Manimurugan
, “
A New Modified Recurrent Extreme Learning with PSO Machine Based on Feature Fusion with CNN Deep Features for Breast Cancer Detection
,”
Journal of Computational Science and Intelligent Technologies
01
,
15
21
(
2020
).
4.
V.
Arulkumar
, “
A Survey on Multimedia Analytics in Security Systems of Cyber Physical Systems and IoT
,” in
2nd International Conference on Smart Electronics and Communication (ICOSEC)
(
IEEE
,
2021
) pp.
1556
1561
.
5.
S.
Balakrishnan
, V. K., and
M. S. S.
Hameed
, “
An Embarking User Friendly Palmprint Biometric Recognition System with Topnotch Security
,” in
5th International Conference on Intelligent Computing and Control Systems (ICICCS)
(
IEEE
,
2021
) pp.
1028
1032
.
6.
P.
Sadineni
, “
Comparative Study on Query Processing and Indexing Techniques in Big Data
,” in
International Conference on Intelligent Sustainable Systems (ICISS)
(
IEEE
,
2020
) pp.
933
939
.
7.
Arulkumar
, “
An Intelligent Face Detection by Corner Detection using Special Morphological Masking System and Fast Algorithm
,” in
2nd International Conference on Smart Electronics and Communication (ICOSEC)
(
IEEE
,
2021
) pp.
1556
1561
.
8.
A. O.
Baabood
,
P.
Valsalan
, and
T. A. B.
Baomar
, “
IoT Based Health Monitoring System
,”
Journal of Critical Reviews
07
,
739
743
(
2020
).
9.
V.
Arulkumar
and
C.
Selvan
, “
Big Data Analytics in the Healthcare Industry: An Analysis of Healthcare Applications in Machine Learning With Big Data Analytics
,”
IGI Global Big Data Analytics in the Healthcare Industry
07
,
523
624
(
2019
).
10.
K.
Sajay
,
Suvanam
,
S.
Babu
, and
V.
Yellepeddi
, “
Enhancing The Security Of Cloud Data Using Hybrid Encryption Algorithm
,”
Journal of Ambient Intelligence and Humanized Computing
36
,
26
35
(
2019
).
11.
B. K.
Francis
and
S. S.
Babu
, “
Predicting academic performance of students using a hybrid data mining approach
,”
Journal of Medical Systems
43
,
162
173
(
2019
).
12.
M. S. S.
Hameed
,
R. K.
Poluru
,
C. P.
Lora
, and
S.
Balakrishnan
, “
A Non-Invasive Check Alarm Towards Food Safety Against Scruples Using IoT For The Produce
,”
Nat. Volatiles Essent. Oils
8
,
10734
10743
(
2021
).
13.
V.
Arulkumar
and
P.
Vivekanandan
, “
Multi-feature based automatic face identification on kernel eigen spaces (KES) under unstable lighting conditions
,” in
2015 International Conference on Advanced Computing and Communication Systems
(
IEEE
,
2015
) pp.
1233
1239
.
This content is only available via PDF.
You do not currently have access to this content.