Survey on Suspicious URL Detection Schemes in Twitter Stream

Abstract

Twitter is a micro-blogging and online social networking service that enables its users to send and read "tweets”. Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets which contains URLs for spam, phishing, and malware distribution. At present there are various Twitter spam detection schemes available. Conventional Twitter spam detection schemes make use of account features like the account activation date, the ratio of tweets that contain URLs and the relation features present in the Twitter graph. Conventional suspicious URL detection schemes make use of features like lexical features in URLs, dynamic behavior, URL redirection, and HTML content. At present evading techniques such as time-based evasion and crawler evasion also exist. This paper presents a survey of various Twitter spam detection schemes. The paper here discusses about various suspicious URL detection mechanisms and their efficiency. Also this paper presents an overview of the best detection mechanism for Suspicious URLs in Twitter stream.

Authors and Affiliations

Asha Prasad G, Suchithra M S

Keywords

Related Articles

Low-Power Digital Signal Processor Architecture for Wireless Sensor Nodes

Radio communication exhibits the highest energy consumption in wireless sensor nodes. The sensor networks are intended to support a variety of applications . Providing sensor network with flexible nodes design will...

Multiple View Point on Cluster Analysis

The clustering methods have to assume some cluster relationship among the data objects that they are applies on. Similarity between a pair of objects can be defines either explicitly or implicitly. In this paper we i...

An Optimal and Secure Ranking Search Over out Sourced Cloud Databases

Considering top k multi keywords from the out sourced information files is still an intriguing examination issue in light of the fact that out sourced information over cloud can be scrambled for secrecy .In this pape...

Matrix Subtraction Of Image Pixels Based on ARM9 And Embedded Linux For Motion Detection System

In this paper ,Proposed a Matrix Subtraction of image pixels for motion detection by using friendly ARM9 Board Supported Package S3C2440 supported by embedded linux. By using this technology, it is possible to monitor...

A Novel Technique for Creative Problem-Solving by using Q-learning and Association algorithm

for a single problem there are multiple solutions or multiple ideas from different users. Means every one gave an idea (solution) for solving the given problem if we distribute that particular problem to the different...

Download PDF file
  • EP ID EP27872
  • DOI -
  • Views 258
  • Downloads 0

How To Cite

Asha Prasad G, Suchithra M S (2014). Survey on Suspicious URL Detection Schemes in Twitter Stream. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27872