Abstract
The popularity of Social Networks during the last several years have attracted attention of cyber-criminals for spreading of spam and malicious contents. In order to send spam messages to lured users, spammers creating fake profiles, leading to fraud and/or malware campaigns. Sometimes to send malicious messages, cyber-criminals use stolen accounts of legitimate users. Nowadays they are creating short URLs by the short URL service provider and post it on friend’s board. Lured users unknowingly clicking on these links, are redirected to malicious websites. To control such type of activities over Twitter we have calculated a trust score for each user. Based on the trust score, one can decide whether a user is trustable or not. With usage of trust score, we have achieved accuracy of 92.6 % and F-measure of 81 % with our proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms. pp. 48–60. ACM (1998)
Agarwal, M., Zhou, B.: Detecting malicious activities using backward propagation of trustworthiness over heterogeneous social graph. In: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT). pp. 290–291. IEEE (2013)
De Meo, P., Messina, F., Rosaci, D., Sarné, G.M.: Recommending users in social networks by integrating local and global reputation. In: Internet and Distributed Computing Systems, pp. 437–446. Springer (2014)
Fire, M., Kagan, D., Elyashar, A., Elovici, Y.: Friend or foe? fake profile identification in online social networks. Social Network Analysis and Mining 4(1), 1–23 (2014)
Gupta, N., Aggarwal, A., Kumaraguru, P.: bit. ly/malicious: Deep dive into short url based e-crime detection. In: Electronic Crime Research (eCrime), 2014 APWG Symposium on. pp. 14–24. IEEE (2014)
Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future generation computer systems 31, 48–58 (2014)
Lee, K., Caverlee, J., Webb, S.: The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on World wide web. pp. 1139–1140. ACM (2010)
Lee, S., Kim, J.: Warningbird: Detecting suspicious urls in twitter stream. In: NDSS (2012)
Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing. pp. 1589–1599. Association for Computational Linguistics (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer India
About this paper
Cite this paper
Venkatesh, R., Rout, J.K., Jena, S.K. (2017). Malicious Account Detection Based on Short URLs in Twitter. In: Lobiyal, D., Mohapatra, D., Nagar, A., Sahoo, M. (eds) Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering, vol 395. Springer, New Delhi. https://doi.org/10.1007/978-81-322-3592-7_24
Download citation
DOI: https://doi.org/10.1007/978-81-322-3592-7_24
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-3590-3
Online ISBN: 978-81-322-3592-7
eBook Packages: EngineeringEngineering (R0)