Survey on Suspicious URL Detection Schemes in Twitter Stream
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Twitter is a micro-blogging and online social networking service that enables its users to send and read "tweets”. Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets which contains URLs for spam, phishing, and malware distribution. At present there are various Twitter spam detection schemes available. Conventional Twitter spam detection schemes make use of account features like the account activation date, the ratio of tweets that contain URLs and the relation features present in the Twitter graph. Conventional suspicious URL detection schemes make use of features like lexical features in URLs, dynamic behavior, URL redirection, and HTML content. At present evading techniques such as time-based evasion and crawler evasion also exist. This paper presents a survey of various Twitter spam detection schemes. The paper here discusses about various suspicious URL detection mechanisms and their efficiency. Also this paper presents an overview of the best detection mechanism for Suspicious URLs in Twitter stream.
Authors and Affiliations
Asha Prasad G, Suchithra M S
Admittance Loading Of Dielectric Loaded Inclined Slots In The Narrow Wall Of A H-Plane Tee Junction
Slotted waveguide antennas find applications in microwave communication and radar systems requiring narrow beam or shaped beam patterns because of its compactness. They are particularly useful in airborne, space craft...
An approach of Regression testing for Service Oriented Architecture
Service Oriented Architecture (SOA) is an application architecture in which services are described using a description language. It has changed the way business enterprises with technology with a very fast demand of r...
Reduction of Common Mode Leakage Current in Three Phase Transformer less Photovoltaic Grid Connected System
In this project the usage of distributed generation renewable sources such as solar energy, wind energy and fuel energy become more popular because of environment friendly and increasing demand of electric energy. Fo...
Efficient Recovery of Data In Digital Communication Using FPGA
Survey on reduction in error by special encoding and decoding technique using FPGA that is by using convolutional encoding and viterbi decoding. Forward error correction (FEC) is one of the key parts of any digital c...
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks
Low power Wireless sensor network is getting more attention recently by the researchers due to its security issues on denial of communication at the routing or medium access control levels. In this work we discussed...