Abstract:The accelerated development of social media websites has posed intricate security issues in cyberspace, where these sites have increasingly become victims of criminal activities including attempts to intrude into them, abnormal traffic patterns, and organized attacks. The conventional rule-based security systems are not always scalable and dynamic to meet such a threat. This paper introduces a threat detection framework based on machine learning that can be used to classify malicious behavior in the social media network environment based on the nature of network traffic. Exploiting a rich network traffic dataset, the massive preprocessing and exploratory data analysis is conducted to overcome the problem of data imbalance, feature…
Abstract:The accelerated development of social media websites has posed intricate security issues in cyberspace, where these sites have increasingly become victims of criminal activities including attempts to intrude into them, abnormal traffic patterns, and organized attacks. The conventional rule-based security systems are not always scalable and dynamic to meet such a threat. This paper introduces a threat detection framework based on machine learning that can be used to classify malicious behavior in the social media network environment based on the nature of network traffic. Exploiting a rich network traffic dataset, the massive preprocessing and exploratory data analysis is conducted to overcome the problem of data imbalance, feature inconsistency, and noise. A model of artificial neural network (ANN) is then created to acquire intricate, non-linear tendencies of malicious actions. The proposed model is tested on conventional performance metrics, such as accuracy, accuracy, recall, F1-score, and ROC-AUC, and shows good detection and high levels of strength. The findings suggest that neural network-based solutions have the potential to be used effectively to identify the latent threat dynamics within the context of a large-scale social media network and that they can be employed to complement the existing intrusion detection system and better to conduct proactive cybersecurity operations.
| Comments: | 11 Pages, 6 figures |
| Subjects: | Machine Learning (cs.LG) |
| MSC classes: | 68T05, 68M12, 68U35 |
| ACM classes: | C.2.0; I.2.6; K.6.5 |
| Cite as: | arXiv:2601.02581 [cs.LG] |
| (or arXiv:2601.02581v1 [cs.LG] for this version) | |
| https://doi.org/10.48550/arXiv.2601.02581 arXiv-issued DOI via DataCite (pending registration) | |
| Journal reference: | The Journal of Computational Science and Engineering Vol. 3, Number 12, December 2025, pp. 15 25 |
Submission history
From: Aditi Agrawal [view email] [v1] Mon, 5 Jan 2026 22:14:41 UTC (622 KB)