Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 5

Abstract

In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout in the top list that has nearly 313 million dynamic clients on a monthly basis with a whopping 500 million of tweets each day. The commonly shared information on Twitter varies from current affairs, occasions, superstars in every field to government or political issues. Therefore, there is a need to conduct targeted research on identifying approaches for vulnerable user identification in twitter. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. This research has been proposed with data mining techniques of Tweet Description Logic Rule Generation algorithm for finding and analysis to the vulnerable user and attackers. Such profiles are distinguished by implementing the above algorithm which considers the targeted user followers and the sharing Threshold Limit as its parameters. Trial results assures of following: The suggested technique beats different models in regard of accuracy, efficiency and least time. Also, the assessment reveals that the identification rate of current method is significantly more compared to other methods.

Authors and Affiliations

S. Revathi, Dr. M. Suriakala

Keywords

Related Articles

Analysis of Data Mining Tasks, Techniques, Tools, Applications And Trend

Data mining is a process which finds useful patterns from huge amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It u...

 Digital Image Compression using Hybrid Transform with Kekre  Transform and Other Orthogonal Transforms

 This paper presents image compression technique using hybrid transform. Concept of hybrid wavelet transform can be extended to generate hybrid transform. In hybrid wavelet transform first few rows represent &nbsp...

 lntrusion Detection System Using GA

 Abstract: Intrusion detection has become an essential component of computer security in recent years so many technologies have been developed to protect our system or network from intruders such as antivirus, firew...

 A Statistical Approach to perform Web Based Summarization

Over the past decade more and more users of the Internet rely on the search engines to help them find the information they need. However the information they find depends to a large extent, on the ranking mechanism o...

 Blowfish Algorithm

 Abstract: Blowfish is a popular security algorithm that was developed by Bruce Schneier in the advent of the year 1994. The algorithm works on the same line as DES and it consumes block coding with blocks of a size...

Download PDF file
  • EP ID EP402115
  • DOI 10.9790/0661-2005022735.
  • Views 97
  • Downloads 0

How To Cite

S. Revathi, Dr. M. Suriakala (2018). Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation. IOSR Journals (IOSR Journal of Computer Engineering), 20(5), 27-35. https://europub.co.uk/articles/-A-402115