International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 255

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.2 / 10


     

Detecting Malicious Posts in Social Networks Using Text Analysis

Neeraja M, John Prakash


Abstract: We have reached the era of social media networks represented by Facebook, Twitter, Flicker and YouTube. Internet users spend most of their time on social networks than search engines. Public figures and business entities set up social networking pages to promote direct interactions with the online users. Social media systems heavily depend on users for getting content and sharing. Information used is spread across the social networks in quick and effective manner. However, at the same time social media networks become vulnerable to different types of unwanted and malicious hacker or spammer actions. It has been observed that there is a greater participation in Facebook pages regarding malicious content generation. These contents will be in greater amount as compared to legitimate content. In this work we develop a detection mechanism to distinguish between malicious and genuine posts within seconds after the posts are uploaded by user. This work proposes an extensive set based on the textual content and URL features to identify malicious content on Facebook at zero time. The intent is to catch malicious or vulgar content that is currently evading Facebooks detection mechanisms.


Keywords: Social Network, Text Analysis, Similarity, Suspicious Post, Suspicious URL, Cybercriminals


Edition: Volume 5 Issue 6, June 2016


Pages: 345 - 347



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Neeraja M, John Prakash, "Detecting Malicious Posts in Social Networks Using Text Analysis", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 345-347, https://www.ijsr.net/getabstract.php?paperid=NOV164091

Similar Articles

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 3, March 2022

Pages: 1275 - 1279

A Novel Technique for Authorship Verification of Hijacked Online Social Networks User Accounts

Astha Gupta, Mahesh Parmar

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 12, December 2021

Pages: 820 - 822

Research on Public Opinion Security under Blockchain Architecture

Wang Hong-Mei

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 1357 - 1360

An Opinion Mining for Indian Premier League Using Machine Learning Techniques

Rakshith N, Suraj B S, Chethana C

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 158 - 161

MLP and RNN Based Intrusion Detection System Using Machine Learning with Stochastic Optimization

Mithlesh Kumar, Gargishankar Verma

Share this Article
Top