Skip to main content

2017 | OriginalPaper | Buchkapitel

Malicious Account Detection Based on Short URLs in Twitter

verfasst von : Rasula Venkatesh, Jitendra Kumar Rout, S. K. Jena

Erschienen in: Proceedings of the International Conference on Signal, Networks, Computing, and Systems

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The popularity of Social Networks during the last several years have attracted attention of cyber-criminals for spreading of spam and malicious contents. In order to send spam messages to lured users, spammers creating fake profiles, leading to fraud and/or malware campaigns. Sometimes to send malicious messages, cyber-criminals use stolen accounts of legitimate users. Nowadays they are creating short URLs by the short URL service provider and post it on friend’s board. Lured users unknowingly clicking on these links, are redirected to malicious websites. To control such type of activities over Twitter we have calculated a trust score for each user. Based on the trust score, one can decide whether a user is trustable or not. With usage of trust score, we have achieved accuracy of 92.6 % and F-measure of 81 % with our proposed approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms. pp. 48–60. ACM (1998) Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms. pp. 48–60. ACM (1998)
2.
Zurück zum Zitat Agarwal, M., Zhou, B.: Detecting malicious activities using backward propagation of trustworthiness over heterogeneous social graph. In: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT). pp. 290–291. IEEE (2013) Agarwal, M., Zhou, B.: Detecting malicious activities using backward propagation of trustworthiness over heterogeneous social graph. In: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT). pp. 290–291. IEEE (2013)
3.
Zurück zum Zitat De Meo, P., Messina, F., Rosaci, D., Sarné, G.M.: Recommending users in social networks by integrating local and global reputation. In: Internet and Distributed Computing Systems, pp. 437–446. Springer (2014) De Meo, P., Messina, F., Rosaci, D., Sarné, G.M.: Recommending users in social networks by integrating local and global reputation. In: Internet and Distributed Computing Systems, pp. 437–446. Springer (2014)
4.
Zurück zum Zitat Fire, M., Kagan, D., Elyashar, A., Elovici, Y.: Friend or foe? fake profile identification in online social networks. Social Network Analysis and Mining 4(1), 1–23 (2014) Fire, M., Kagan, D., Elyashar, A., Elovici, Y.: Friend or foe? fake profile identification in online social networks. Social Network Analysis and Mining 4(1), 1–23 (2014)
5.
Zurück zum Zitat Gupta, N., Aggarwal, A., Kumaraguru, P.: bit. ly/malicious: Deep dive into short url based e-crime detection. In: Electronic Crime Research (eCrime), 2014 APWG Symposium on. pp. 14–24. IEEE (2014) Gupta, N., Aggarwal, A., Kumaraguru, P.: bit. ly/malicious: Deep dive into short url based e-crime detection. In: Electronic Crime Research (eCrime), 2014 APWG Symposium on. pp. 14–24. IEEE (2014)
6.
Zurück zum Zitat Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future generation computer systems 31, 48–58 (2014) Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future generation computer systems 31, 48–58 (2014)
7.
Zurück zum Zitat Lee, K., Caverlee, J., Webb, S.: The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on World wide web. pp. 1139–1140. ACM (2010) Lee, K., Caverlee, J., Webb, S.: The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on World wide web. pp. 1139–1140. ACM (2010)
8.
Zurück zum Zitat Lee, S., Kim, J.: Warningbird: Detecting suspicious urls in twitter stream. In: NDSS (2012) Lee, S., Kim, J.: Warningbird: Detecting suspicious urls in twitter stream. In: NDSS (2012)
9.
Zurück zum Zitat Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing. pp. 1589–1599. Association for Computational Linguistics (2011) Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing. pp. 1589–1599. Association for Computational Linguistics (2011)
Metadaten
Titel
Malicious Account Detection Based on Short URLs in Twitter
verfasst von
Rasula Venkatesh
Jitendra Kumar Rout
S. K. Jena
Copyright-Jahr
2017
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-3592-7_24

Neuer Inhalt