Survey on Suspicious URL Detection Schemes in Twitter Stream

Abstract

Twitter is a micro-blogging and online social networking service that enables its users to send and read "tweets”. Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets which contains URLs for spam, phishing, and malware distribution. At present there are various Twitter spam detection schemes available. Conventional Twitter spam detection schemes make use of account features like the account activation date, the ratio of tweets that contain URLs and the relation features present in the Twitter graph. Conventional suspicious URL detection schemes make use of features like lexical features in URLs, dynamic behavior, URL redirection, and HTML content. At present evading techniques such as time-based evasion and crawler evasion also exist. This paper presents a survey of various Twitter spam detection schemes. The paper here discusses about various suspicious URL detection mechanisms and their efficiency. Also this paper presents an overview of the best detection mechanism for Suspicious URLs in Twitter stream.

Authors and Affiliations

Asha Prasad G, Suchithra M S

Keywords

Related Articles

Load Shedding in Mobile Systems with MobiQual

In location-based, mobile continual query (CQ) systems, two key measures of quality-of-service (QoS) are: freshness and accuracy. To achieve freshness, the CQ server must perform frequent query reevaluations. To atta...

Digital Video Frame Rate Up-Conversion Based on Modified Block Matching Technique

This paper presents a novel digital video frame rate up-conversion technique based on modified block matching algorithm. The primary target is to achieve an observable improvement in the test video playback quality (in...

mplementation of HMI-Guided Tracked Wheel Wireless Network Surveillance of a Weapon Robot

As one of the major steps toward fully intelligent autonomous robotic weapon, this paper works have accomplished in three major areas: (1) design of the surveillance system by DM3730 processor (Beagleboard-xM), (2) i...

A Novel AHB Based SDRAM Memory Controller

This paper describes design of the memory controller which is compatible with Advanced High-performance Bus (AHB), which is a new generation of AMBA bus. The AHB is mainly meant for high-performance and high clock f...

A Study of Efforts Done by Computing Industries for Green Computing

Green computing is one of the biggest concepts these days. The first thing that may come to mind when we think of “Green Computing” is simply using less electricity, but there’s a lot more to that. The challenge of g...

Download PDF file
  • EP ID EP27872
  • DOI -
  • Views 253
  • Downloads 0

How To Cite

Asha Prasad G, Suchithra M S (2014). Survey on Suspicious URL Detection Schemes in Twitter Stream. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27872