International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 282

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.2 / 10


     

Detecting Malicious Posts in Social Networks Using Text Analysis

Neeraja M, John Prakash


Abstract: We have reached the era of social media networks represented by Facebook, Twitter, Flicker and YouTube. Internet users spend most of their time on social networks than search engines. Public figures and business entities set up social networking pages to promote direct interactions with the online users. Social media systems heavily depend on users for getting content and sharing. Information used is spread across the social networks in quick and effective manner. However, at the same time social media networks become vulnerable to different types of unwanted and malicious hacker or spammer actions. It has been observed that there is a greater participation in Facebook pages regarding malicious content generation. These contents will be in greater amount as compared to legitimate content. In this work we develop a detection mechanism to distinguish between malicious and genuine posts within seconds after the posts are uploaded by user. This work proposes an extensive set based on the textual content and URL features to identify malicious content on Facebook at zero time. The intent is to catch malicious or vulgar content that is currently evading Facebooks detection mechanisms.


Keywords: Social Network, Text Analysis, Similarity, Suspicious Post, Suspicious URL, Cybercriminals


Edition: Volume 5 Issue 6, June 2016


Pages: 345 - 347


DOI: https://www.doi.org/10.21275/NOV164091



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Neeraja M, John Prakash, "Detecting Malicious Posts in Social Networks Using Text Analysis", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 345-347, https://www.ijsr.net/getabstract.php?paperid=NOV164091, DOI: https://www.doi.org/10.21275/NOV164091



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024

Pages: 448 - 453

Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies

Dr. A. Lavanya

Share this Article

Downloads: 117 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Downloads: 130

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 868 - 870

A Network Identification Model on Open Social Network

Amina Beevi S

Share this Article
Top