Skip to main content

Malicious Account Detection Based on Short URLs in Twitter

  • Conference paper
  • First Online:
Proceedings of the International Conference on Signal, Networks, Computing, and Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 395))

Abstract

The popularity of Social Networks during the last several years have attracted attention of cyber-criminals for spreading of spam and malicious contents. In order to send spam messages to lured users, spammers creating fake profiles, leading to fraud and/or malware campaigns. Sometimes to send malicious messages, cyber-criminals use stolen accounts of legitimate users. Nowadays they are creating short URLs by the short URL service provider and post it on friend’s board. Lured users unknowingly clicking on these links, are redirected to malicious websites. To control such type of activities over Twitter we have calculated a trust score for each user. Based on the trust score, one can decide whether a user is trustable or not. With usage of trust score, we have achieved accuracy of 92.6 % and F-measure of 81 % with our proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms. pp. 48–60. ACM (1998)

    Google Scholar 

  2. Agarwal, M., Zhou, B.: Detecting malicious activities using backward propagation of trustworthiness over heterogeneous social graph. In: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT). pp. 290–291. IEEE (2013)

    Google Scholar 

  3. De Meo, P., Messina, F., Rosaci, D., Sarné, G.M.: Recommending users in social networks by integrating local and global reputation. In: Internet and Distributed Computing Systems, pp. 437–446. Springer (2014)

    Google Scholar 

  4. Fire, M., Kagan, D., Elyashar, A., Elovici, Y.: Friend or foe? fake profile identification in online social networks. Social Network Analysis and Mining 4(1), 1–23 (2014)

    Google Scholar 

  5. Gupta, N., Aggarwal, A., Kumaraguru, P.: bit. ly/malicious: Deep dive into short url based e-crime detection. In: Electronic Crime Research (eCrime), 2014 APWG Symposium on. pp. 14–24. IEEE (2014)

    Google Scholar 

  6. Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future generation computer systems 31, 48–58 (2014)

    Google Scholar 

  7. Lee, K., Caverlee, J., Webb, S.: The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on World wide web. pp. 1139–1140. ACM (2010)

    Google Scholar 

  8. Lee, S., Kim, J.: Warningbird: Detecting suspicious urls in twitter stream. In: NDSS (2012)

    Google Scholar 

  9. Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing. pp. 1589–1599. Association for Computational Linguistics (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jitendra Kumar Rout .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer India

About this paper

Cite this paper

Venkatesh, R., Rout, J.K., Jena, S.K. (2017). Malicious Account Detection Based on Short URLs in Twitter. In: Lobiyal, D., Mohapatra, D., Nagar, A., Sahoo, M. (eds) Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering, vol 395. Springer, New Delhi. https://doi.org/10.1007/978-81-322-3592-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-3592-7_24

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-3590-3

  • Online ISBN: 978-81-322-3592-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics