Title: Prevention of cyber attacks and real-time social media spam detection and sentiment analysis using recurrent self-adaptive windowing approach

Authors: Shankar M. Patil; Sonali Mhatre; Bhawana Dakhare; Gurunath T. Chavan

Addresses: Smt Indira Gandhi College of Engineering, Navi-Mumbai, India ' Bharati Vidyapeeth College of Engineering, Sector 7, CBD Belapur, Navi Mumbai, Maharashtra 400614, India ' Bharati Vidyapeeth College of Engineering, Sector 7, CBD Belapur, Navi Mumbai, Maharashtra 400614, India ' Vishwakarma Institute of Information Technology, 666, Kapil Nagar, Kondhwa Budruk, Pune, Maharashtra 411048, India

Abstract: Social media platforms, with billions of users, have become an integral part of our lives. The projected exploration tackles the long-standing issue of spam detection on social media platforms by developing a novel approach that combines pre-processing, recurrent neural networks (RNNs), and optimisation techniques. The exploration makes four key contributions, namely, the development of an efficient pre-processing pipeline for preparing e-mail data, the application of an RNN with a soft attention mechanism for accurate spam classification, the integration of self-adaptive windowing to address concept drift, and the optimisation of the RNN using weighted chimp optimisation. The latter two innovations enable the model to adapt to changes in spamming tactics over time and improve its overall performance. As a result, the research achieves a high accuracy rate of 99.3% and outperforms traditional methods in terms of precision, recall, and F1-score. While these results are impressive, the limitations of relying solely on accuracy are acknowledged, and the model's performance on imbalanced datasets will be further explored in subsequent sections to provide a more comprehensive understanding of its effectiveness.

Keywords: cyber attacks; spam detection; recurrent neural network; RNN; content-based spam; self-adaptive windowing approach.

DOI: 10.1504/IJICS.2025.146881

International Journal of Information and Computer Security, 2025 Vol.27 No.2, pp.261 - 284

Received: 26 Apr 2024
Accepted: 16 Oct 2024

Published online: 24 Jun 2025 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article