Influential Node Tracking Using Greedy Approach Algorithm for Secure Social Media
Keywords:
Social network, Influence maximization, Greedy algorithm, Malicious AttackAbstract
A social network sites plays very important role for spreading the information and influence in the form
of whole world in hand. There is a basic thing to find small set of influential people in a social network such that
targeting them initially. It will increase the spread of the influence but the problem is that to finding the most
influential nodes in network. There is one Algorithm called as Greedy algorithm used for mining top-K influential
nodes. It has two components: dividing the post of social network into several communities by taking into account
information diffusion and selecting communities to find influential nodes by a dynamic programming. Using Location
Based community Greedy algorithm is used to find the influence node based on Location of the user and we can sort
out the influence for particular Area.
There is one more Serious problem in social network is that there are so many malicious attacks spread by the
people and that malicious contents are hidden behind some attractive posts. i.e viral marketing techniques in the
promotion of new products or posts like how much luckiest today or what does your name meant or post which states
the giving you iphone in lesser prize or giving them free samples of the product etc. such posts in social network may
be harmful to users which has the negative intention of stealing the personal information user. So the takes the
advantage of such usage history of ads i.e. rating of such posts the system analyses the that products impact on social
media users and predicts the positive or negative category for that posts which is beneficial for future users on social
media. So we need to find out that post and block them.