Survey on Suspicious URL Detection Schemes in Twitter Stream

Abstract

Twitter is a micro-blogging and online social networking service that enables its users to send and read "tweets”. Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets which contains URLs for spam, phishing, and malware distribution. At present there are various Twitter spam detection schemes available. Conventional Twitter spam detection schemes make use of account features like the account activation date, the ratio of tweets that contain URLs and the relation features present in the Twitter graph. Conventional suspicious URL detection schemes make use of features like lexical features in URLs, dynamic behavior, URL redirection, and HTML content. At present evading techniques such as time-based evasion and crawler evasion also exist. This paper presents a survey of various Twitter spam detection schemes. The paper here discusses about various suspicious URL detection mechanisms and their efficiency. Also this paper presents an overview of the best detection mechanism for Suspicious URLs in Twitter stream.

Authors and Affiliations

Asha Prasad G, Suchithra M S

Keywords

Related Articles

Video Frame Retrieval Using Effective Query Processing

Video frame retrieval from a long video sequence is atypical known problem to many of us. In this work we have discussed a graph transformation and matching approach to the problem. We introduce a query algorithm to...

Embedded Automated Vehicle Location System

A GPS tracking unit is a device that uses the Global Positioning System to determine the location of a vehicle, person, or other asset to which it is attached and to record the position of the asset at regular interv...

A Novel Approach for Finding Optimal Overlay Nodes In Routing

In networks to enhance the TCP throughput and postponement Overlay steering procedure is proposed.one of the primary point of interest of this method it doesn't have to change current directing technique. Yet, arrang...

Human Gait Based Gender Classification Using Various Transformation Techniques

Gender classification such as classifying human face is only challenging for computer, but even hard for human in some cases. In our work a new novel approach is proposed to recognize gender from the face image. Cont...

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS

Mobile Ad hoc Network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administ...

Download PDF file
  • EP ID EP27872
  • DOI -
  • Views 265
  • Downloads 0

How To Cite

Asha Prasad G, Suchithra M S (2014). Survey on Suspicious URL Detection Schemes in Twitter Stream. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27872