Survey on Suspicious URL Detection Schemes in Twitter Stream

Abstract

Twitter is a micro-blogging and online social networking service that enables its users to send and read "tweets”. Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets which contains URLs for spam, phishing, and malware distribution. At present there are various Twitter spam detection schemes available. Conventional Twitter spam detection schemes make use of account features like the account activation date, the ratio of tweets that contain URLs and the relation features present in the Twitter graph. Conventional suspicious URL detection schemes make use of features like lexical features in URLs, dynamic behavior, URL redirection, and HTML content. At present evading techniques such as time-based evasion and crawler evasion also exist. This paper presents a survey of various Twitter spam detection schemes. The paper here discusses about various suspicious URL detection mechanisms and their efficiency. Also this paper presents an overview of the best detection mechanism for Suspicious URLs in Twitter stream.

Authors and Affiliations

Asha Prasad G, Suchithra M S

Keywords

Related Articles

Personalized Mobile Search Engine

We propose a personalized mobile search engine, PMSE, that captures the users’ preferences in the form of concepts by mining their click through data. Due to the importance of location information in mobile search, P...

Performance Analysis of Improved ODMRP with Motion Detection (IOMD) in Mobile Ad Hoc Network

Multicast transmission is a more effective mechanism when more effective mechanism to unicasts for group communication based applications and of due importance to future network development. Multicasting in ad hoc ne...

http://www.ijrcct.org/index.php/ojs/article/download/1190/pdf

In recent years, cloud computing has been adopted by large sphere of public and private organizations due to its streamline processes, reduced capital, improved flexibility and accessibility, and resource sharing abi...

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication

Cooperative communications enables efficient utilization of system communication resources, thereby allowing nodes or terminals participating in a communication network to collaborate with each other during informatio...

A Novel Protocol To Implement The Solution On Mobile And Desktop Machine For Location Based Queries

We put into practice an answer on a desktop machine and a mobile device to measure the competence of our protocol. We also bring in a safety replica and examine the safety in the circumstance of our protocol. At leng...

Download PDF file
  • EP ID EP27872
  • DOI -
  • Views 240
  • Downloads 0

How To Cite

Asha Prasad G, Suchithra M S (2014). Survey on Suspicious URL Detection Schemes in Twitter Stream. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27872