Survey on Suspicious URL Detection Schemes in Twitter Stream
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Twitter is a micro-blogging and online social networking service that enables its users to send and read "tweets”. Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets which contains URLs for spam, phishing, and malware distribution. At present there are various Twitter spam detection schemes available. Conventional Twitter spam detection schemes make use of account features like the account activation date, the ratio of tweets that contain URLs and the relation features present in the Twitter graph. Conventional suspicious URL detection schemes make use of features like lexical features in URLs, dynamic behavior, URL redirection, and HTML content. At present evading techniques such as time-based evasion and crawler evasion also exist. This paper presents a survey of various Twitter spam detection schemes. The paper here discusses about various suspicious URL detection mechanisms and their efficiency. Also this paper presents an overview of the best detection mechanism for Suspicious URLs in Twitter stream.
Authors and Affiliations
Asha Prasad G, Suchithra M S
Low-Power Digital Signal Processor Architecture for Wireless Sensor Nodes
Radio communication exhibits the highest energy consumption in wireless sensor nodes. The sensor networks are intended to support a variety of applications . Providing sensor network with flexible nodes design will...
Multiple View Point on Cluster Analysis
The clustering methods have to assume some cluster relationship among the data objects that they are applies on. Similarity between a pair of objects can be defines either explicitly or implicitly. In this paper we i...
An Optimal and Secure Ranking Search Over out Sourced Cloud Databases
Considering top k multi keywords from the out sourced information files is still an intriguing examination issue in light of the fact that out sourced information over cloud can be scrambled for secrecy .In this pape...
Matrix Subtraction Of Image Pixels Based on ARM9 And Embedded Linux For Motion Detection System
In this paper ,Proposed a Matrix Subtraction of image pixels for motion detection by using friendly ARM9 Board Supported Package S3C2440 supported by embedded linux. By using this technology, it is possible to monitor...
A Novel Technique for Creative Problem-Solving by using Q-learning and Association algorithm
for a single problem there are multiple solutions or multiple ideas from different users. Means every one gave an idea (solution) for solving the given problem if we distribute that particular problem to the different...