Skip to main content
Top

2020 | OriginalPaper | Chapter

Detection of Malicious URLs on Twitter

Authors : Nureni Ayofe Azeez, Oluwadamilola Atiku, Sanjay Misra, Adewole Adewumi, Ravin Ahuja, Robertas Damasevicius

Published in: Advances in Electrical and Computer Technologies

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Twitter is an online social network that is popular for its use of 140-character messages called tweets to exchange information, news and connects the global world. Due to the large audience of people that make use of twitter, malicious users from time to time try to find ways to attack it. This is because the usages of URLs in tweets expose them and make them prone to attacks such as malware distribution, phishing, spam and scam. In this project, a system is developed that detected suspicious URLs on twitter, and the proposed system investigates the correlation of URL redirect chains extracted from various tweets on twitter. Therefore, after a large number of tweets are collected from twitter public timeline, a classifier by naive Bayes machine learning algorithm is built using the data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Stone-Gross B, Cova M, Cavallarol (2009) Your Botnet is my Botnet: analysis of a Botnet takeover. In: ACM conference computer and communications security (CCS) Stone-Gross B, Cova M, Cavallarol (2009) Your Botnet is my Botnet: analysis of a Botnet takeover. In: ACM conference computer and communications security (CCS)
2.
go back to reference Canali D, Cova M (2011) Prophiler: a fast filter for the large-scale detection of malicious webpages. In. International world wide web conference (WWW) Canali D, Cova M (2011) Prophiler: a fast filter for the large-scale detection of malicious webpages. In. International world wide web conference (WWW)
3.
go back to reference Benevenuto F, Magno G (2010) Detecting spammers on Twitter. In. Collaboration electronic messaging anti-abuse and spam conference (CEAS) Benevenuto F, Magno G (2010) Detecting spammers on Twitter. In. Collaboration electronic messaging anti-abuse and spam conference (CEAS)
4.
go back to reference Azeez NA, Asuzu OJ, Misra S, Adewumi A, Ahuja R, Maskeliunas R (2018) Comparative evaluation of machine learning algorithms for network intrusion detection using Weka. In: Towards extensible and adaptable methods in computing. Springer, pp 195–208 Azeez NA, Asuzu OJ, Misra S, Adewumi A, Ahuja R, Maskeliunas R (2018) Comparative evaluation of machine learning algorithms for network intrusion detection using Weka. In: Towards extensible and adaptable methods in computing. Springer, pp 195–208
5.
go back to reference Ibikunle F, Eweniyi O (2013) Approach to cyber security issues in Nigeria: challenges and solution. Int J Cogn Res Sci Eng Educ (IJCRSEE), 100–110 Ibikunle F, Eweniyi O (2013) Approach to cyber security issues in Nigeria: challenges and solution. Int J Cogn Res Sci Eng Educ (IJCRSEE), 100–110
6.
go back to reference Kim J, Lee S (2013) WarningBird: detecting suspicious URLs in Twitter stream. IEEE Trans Depend Secur Comput 10(3):183–195 Kim J, Lee S (2013) WarningBird: detecting suspicious URLs in Twitter stream. IEEE Trans Depend Secur Comput 10(3):183–195
7.
go back to reference Nureni AA, Irwin B (2010) Cyber security: challenges and the way forward. GESJ: Comput Sci Telecommun, 1512–1232 Nureni AA, Irwin B (2010) Cyber security: challenges and the way forward. GESJ: Comput Sci Telecommun, 1512–1232
8.
go back to reference Stringhini G, Kruegel C (2010) Detecting spammers on social networks. In: Annual computer security applications conference (ACSAC) Stringhini G, Kruegel C (2010) Detecting spammers on social networks. In: Annual computer security applications conference (ACSAC)
9.
go back to reference Azeez NA, Iliyas HD (2016) Implementation of a 4-tier cloud-based architecture for collaborative health care delivery. Niger J Technol Dev 13(1):17–25CrossRef Azeez NA, Iliyas HD (2016) Implementation of a 4-tier cloud-based architecture for collaborative health care delivery. Niger J Technol Dev 13(1):17–25CrossRef
10.
go back to reference Ayofe AN, Adebayo SB, Ajetola AR, Abdulwahab AF (2010) A framework for computer aided investigation of ATM fraud in Nigeria. Int J Soft Comput 5(3):78–82CrossRef Ayofe AN, Adebayo SB, Ajetola AR, Abdulwahab AF (2010) A framework for computer aided investigation of ATM fraud in Nigeria. Int J Soft Comput 5(3):78–82CrossRef
11.
go back to reference Thomas K, Grier C (2011) Suspended accounts in retrospect: an analysis of twitter spam. In. internet measurement conference (IMC) Thomas K, Grier C (2011) Suspended accounts in retrospect: an analysis of twitter spam. In. internet measurement conference (IMC)
12.
go back to reference Wang A (2010) Don’t follow me, spam detecting in Twitter. In. International conference security and cryptography (SECRYPT) Wang A (2010) Don’t follow me, spam detecting in Twitter. In. International conference security and cryptography (SECRYPT)
13.
go back to reference Denning ED (1987) An Intrusion-detection model. IEEE Trans Softw Eng, 222–232 Denning ED (1987) An Intrusion-detection model. IEEE Trans Softw Eng, 222–232
14.
go back to reference Azeez NA, Venter IM (2013) Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment. Saiee Africa Res 104(2):54–68 Azeez NA, Venter IM (2013) Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment. Saiee Africa Res 104(2):54–68
15.
go back to reference Azeez NA, Ademolu O (2016) CyberProtector: identifying compromised URLs in electronic mails with Bayesian classification. In: International conference computational science and computational intelligence, pp 959–965 Azeez NA, Ademolu O (2016) CyberProtector: identifying compromised URLs in electronic mails with Bayesian classification. In: International conference computational science and computational intelligence, pp 959–965
16.
go back to reference Grier C, Thomas K (2010) @Spam: the underground on 140 characters or less. In: Proceedings 17th ACM conference computer and communications security (CCS) Grier C, Thomas K (2010) @Spam: the underground on 140 characters or less. In: Proceedings 17th ACM conference computer and communications security (CCS)
17.
go back to reference Deering S (1998) Internet protocol, version 6(IPv6) specification RFC 2460 Deering S (1998) Internet protocol, version 6(IPv6) specification RFC 2460
19.
go back to reference Kwak H, Lee C (2010) What is Twitter, a social network or a news media? In. International world wide web conference (WWW) Kwak H, Lee C (2010) What is Twitter, a social network or a news media? In. International world wide web conference (WWW)
20.
go back to reference Azeez NA, Olayinka AF, Fasina EP, Venter IM (2015) Evaluation of a flexible column-based access control security model for medical-based information. J Comput Sci Appl 22(1):14–25 Azeez NA, Olayinka AF, Fasina EP, Venter IM (2015) Evaluation of a flexible column-based access control security model for medical-based information. J Comput Sci Appl 22(1):14–25
22.
go back to reference Azeez NA, Babatope AB (2016) AANtID: an alternative approach to network intrusion detection. J Comput Sci Appl 23(1) Azeez NA, Babatope AB (2016) AANtID: an alternative approach to network intrusion detection. J Comput Sci Appl 23(1)
23.
go back to reference Lin Y-W Chen J (2006) Combining SVMs with various feature selection strategies. In: Feature extraction, vol 207 of studies in fuzziness and soft computing, pp 315–324 Lin Y-W Chen J (2006) Combining SVMs with various feature selection strategies. In: Feature extraction, vol 207 of studies in fuzziness and soft computing, pp 315–324
24.
go back to reference (1981) Internet Protocol: DARPA internet program protocol specification. USC Information Science Institute (1981) Internet Protocol: DARPA internet program protocol specification. USC Information Science Institute
25.
go back to reference Ma J, Saul LK (2009) Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In. ACM SIGKDD international conference knowledge discovery and data mining (KDD) Ma J, Saul LK (2009) Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In. ACM SIGKDD international conference knowledge discovery and data mining (KDD)
26.
go back to reference El-Buhaisi AN (2013) Detection model for pharming attack based on IP-address check and website predictability. Islamic University of Gaza, pp 1–67 El-Buhaisi AN (2013) Detection model for pharming attack based on IP-address check and website predictability. Islamic University of Gaza, pp 1–67
27.
go back to reference Song J, Lee S (2011) Spam filtering in Twitter using sender-receiver relationship. In. International symposium recent advances in intrusion detection (RAID) Song J, Lee S (2011) Spam filtering in Twitter using sender-receiver relationship. In. International symposium recent advances in intrusion detection (RAID)
28.
go back to reference Fan R-E, Chang K-W, Hsieh C-J, Wang XR (2008). LIBLINEAR: a library for large linear classification. J Mach Learn Res 9:1871–1874 Fan R-E, Chang K-W, Hsieh C-J, Wang XR (2008). LIBLINEAR: a library for large linear classification. J Mach Learn Res 9:1871–1874
Metadata
Title
Detection of Malicious URLs on Twitter
Authors
Nureni Ayofe Azeez
Oluwadamilola Atiku
Sanjay Misra
Adewole Adewumi
Ravin Ahuja
Robertas Damasevicius
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5558-9_29

Premium Partner