Warning Tweet: A Detection System for Suspicious URLs in Twitter Stream
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 7
Abstract
Twitter is a social networking site where users can exchange messages to other users particularly their followers. Usually the messages sent over twitter are known as tweets. Users can sent messages or tweets to users who do not follow the sender .Tweets are small messages. Thus malicious users can use twitter to send malicious tweets containing malicious URL’s for spam or phishing etc. Conventional there are twitter spam detection techniques which uses features like ratio of tweets or date of creation of account but these techniques are ineffective against feature fabrications and consume much time and resources. In this paper, WARNINGTWEET a technique for detecting suspicious URL detection for Twitter is proposed. This system find the correlations of URL redirect chains extracted from several tweets. It uses the fact that the malicious users or attackers have limited resources and thus they need to reuse them. URL redirect chains frequently share the same URLs for the attackers or malicious users. Methods to discover correlated URL redirect chains using the frequently shared URLs and to determine their suspiciousness is developed. On the basis of the results of evaluation we find that our classifier worked accurately and efficiently detects suspicious URLs.
Authors and Affiliations
Manjeet Chaudhary, Prof. H. A Hingoliwala
Image Data Categorization Based on Texture Feature and Neural Network Based Classifier
The classification and categorization of digital multi-media data is very challenging task for the storage manager and server. The diversity of multi-media data faced a problem of retrieval over the internet. The retrie...
Experimental Investigation on the Performance of Interlocking Concrete Hollow Block Strengthened With Steel Fibres
The work aims to carry out an investigation on performance of hollow concrete block masonry strengthened with steel fibre. The geometry of the block was so arranged that the, bonding was achieved by interlocking and cem...
Triple-Fault Tolerant Architecture Design for Ripple Carry Adder
in this previously one design having a fault to identify the fault location then correct the design. A system must be fault tolerant to decrease the failure rate and increase the reliability of it. In this fault toleran...
Next Generation Mobile Network in India and Impact on the Indian Entrepreneurship EcoSystem
The year 2016 was perhaps a watershed in the history of the telecommunications industry in India with the launch of the Reliance Jio. Reported to be the largest ever investment for a single brand in the history of the s...
An Efficient File Retrieval from Cloud Servers Using Multi Keyword Sets
A Huge number of information proprietors have moved our information into cloud servers. Cloud information proprietors like to outsource archives in an encoded shape with the end goal of protection safeguarding. Hence it...