Topic Modeling based on Louvain method in Online Social Networks

  • Guilherme Sakaji Kido Universidade Estadual de Londrina
  • Rodrigo Augusto Igawa Universidade Estadual de Londrina
  • Sylvio Barbon Jr. Universidade Estadual de Londrina

Resumo


Online Social Networks (OSNs) are the most used media nowadays, such as Twitter. The OSNs provide valuable information to marketing and competitiveness based on users posts and opinions stored inside huge volume of data from several themes, topics and subjects. In order to mining the topics discussed on an OSN we present a novel application of Louvain method for Topic Modeling based on communities detection in graphs by modularity. The proposed approach succeeded in finding topics in five different datasets composed of textual content from Twitter and Youtube. Another important contribution achieved was about the presence of texts posted by spammers. In this case, a particular behavior observed by graph architecture (density and degree) allows the classification of a topic as natural or artificial, this last created by the spammers on OSNs.

Palavras-chave: Topic Model, Twitter, Youtube, ADVF, Louvain

Referências

ACUNETIX. Acunetix web vulnerability scanner - acunetix, 2012. "http://www.acunetix.com/vulnerability-scanner/.

L. Badger. Cloud computing synopsis and recommendations. nist special publication 800-146, 2012. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.232.3178&rep=rep1&type=pdf.

CAPEC. Common attack pattern enumeration and classification - capec, 2014. http://capec.mitre.org/data/definitions/3000.html.

S. N. Chauhan. An approach to measure security of cloud hosted. IEEE International Conference on Cloud Computing in Emerging Markets(CCEM), pages 1–6, 2013.

S. D. Chaves, C. Westphall, and F. Lamin. Sla perspective in security management for cloud computing. Sixth International Conference Networking and Services, pages 212–217, 2010.

ENISA. Survey and analysis of security parameters in cloud slas across the european public sector, 2011. https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/survey-and-analysis-of-security-parameters-in-cloud-slas-across-the-european-public-sector.

A. Gehani. Accountable clouds. IEEE International Conference on Technologies for Homeland Security (HST), pages 403–407, 2013.

N. Gonzalez, C. Miers, F. Redigolo, T. Carvalho, M. Simplicio, M. Naslund, and M. Pourzandi. A quantitative analysis of current security concerns and solutionsfor cloud computing. IEEE 3rd International Conference on Cloud Computing Technology and Science, pages 231–238, 2011.

T. Grance and W. Jansen. Guidelines on security and privacy in public cloud computing. nist sp-800-144, 2011. http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf.

G. Hogben and M. Dekker. Procure secure: A guide to monitoring of security service levels in cloud contracts.tecnical report, european network and information security agency (enisa). Technical report, 2012. https://www.enisa.europa.eu/media/press-releases/procure-secure-enisa2019s-new-guide-for-monitoring-cloud-computing-contracts.

A. Kiezun, P. J. Guo, K. Jayaraman, and M. D. Ernst. Automatic creation of sql injection and cross-site scripting attacks. In 30th International Conference on Software Engineering (ICSE), 2009.

L. K. R. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and S. B. Lee. Trustcloud: A framework for accountability and trust in cloud computing. hp technical reporthpl-2011-38. Technical report, 2011. http://www.hpl.hp.com/techreports/2011/HPL-2011-38.html.

D. P. Manuel. A trust model of cloud computing based on Quality of Service. Annals of Operations Research, 2013.

D. P. Manuel, A. I. M. Barr, and T. S. Selvi. A novel trust management system for cloud computing - iaas providers. 79:3–22, 2011.

P. Mell and T. Grance. The nist definition of cloud computing. nist sp-800-145, 2011. http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf.

NESSUS. Tenable nessus vulnerability scanner - nessus, 2007. "http://www.software.com.br/p/tenable-nessus-vulnerability-scanner?gclid=CN7d2Jj3pMoCFQ8HkQodG6cKxQ.

NIST. Guide for conducting risk assessments.2012.nistsp-800-30, rev.1, 2012. "http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf.

NMAP. Network mapper - nmap, 1997. "https://nmap.org/.

Y. Pang, Y. Song, J. Kang, and J. K. Yun. Risk assessment and classification of focusing sla requirement in cloud computing. International Journal of Security and Its Applications, 2013.

C. A. Silva and P. L. Geus. Arquitetura de monitoramento para security-sla em nuvem computacional do tipo saas. Simpósio Brasileiro em Segurança da Informa ção e de Sistemas Computacionais (SBSeg), pages 310–313, 2014.

S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 1(34):1–11, 2011.

J. Zhengwei. A meta-synthesis approach for cloud service provider selection based on secsla. International Conference on Computational and Information Sciences (ICCIS), pages 1356–1360, 2013.
Publicado
17/05/2016
Como Citar

Selecione um Formato
KIDO, Guilherme Sakaji; IGAWA, Rodrigo Augusto; BARBON JR., Sylvio. Topic Modeling based on Louvain method in Online Social Networks. In: SIMPÓSIO BRASILEIRO DE SISTEMAS DE INFORMAÇÃO (SBSI), 12. , 2016, Florianópolis. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2016 . p. 353-360. DOI: https://doi.org/10.5753/sbsi.2016.5982.