CFP last date
20 May 2024
Reseach Article

Detection of Suspicious URL in Social Networking Site Twitter: Survey Paper

by Jyoti D.halwar, Sandeep Kadam, Vrushali Desale
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 8
Year of Publication: 2015
Authors: Jyoti D.halwar, Sandeep Kadam, Vrushali Desale
10.5120/19334-0688

Jyoti D.halwar, Sandeep Kadam, Vrushali Desale . Detection of Suspicious URL in Social Networking Site Twitter: Survey Paper. International Journal of Computer Applications. 110, 8 ( January 2015), 6-8. DOI=10.5120/19334-0688

@article{ 10.5120/19334-0688,
author = { Jyoti D.halwar, Sandeep Kadam, Vrushali Desale },
title = { Detection of Suspicious URL in Social Networking Site Twitter: Survey Paper },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 8 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number8/19334-0688/ },
doi = { 10.5120/19334-0688 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:45:48.067879+05:30
%A Jyoti D.halwar
%A Sandeep Kadam
%A Vrushali Desale
%T Detection of Suspicious URL in Social Networking Site Twitter: Survey Paper
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 8
%P 6-8
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Twitter is very popular social networking site used by billions of people to share the information with each other. To communicate with each other over the long distance. But it also attracts the attackers in carrying out different attacks or get the information being shared by the twitter users. Twitter users can send the messages to each other in the form of tweets, that tweets have the size limitation of maximum 140 characters. So to share the web pages URL shorting is used. Attackers send the suspicious URLs in tweets and move the users to malicious pages. This paper presents a survey of different methods used to detect the suspicious URL (sites) in twitter stream. This paper also presents a WARNING BIRD APPLICATION. It is a near real time system to detect the suspicious URLs by classifying them.

References
  1. S. Lee and J. Kim, "WarningBird: Detecting suspicious URLs in Twitter stream," in Proc. NDSS, 2012.
  2. H. Kwak, C. Lee, H. Park, and S. Moon, "What is Twitter, a socialnetwork or a news media?" in Proc. WWW, 2010.
  3. Antoniades, I. Polakis, G. Kontaxis, E. Athanasopoulos, S. Ioannidis, E. P. Markatos, and T. Karagiannis, "we. b: The web of short URLs," in Proc. WWW, 2011.
  4. Klien and M. Strohmaier, "Short links under attack: geographical analysis of spam in a URL shortener network," in Proc. ACM HT, 2012.
  5. K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, "Design andevaluation of a real-time URL spam filtering service," in Proc. IEEE S&P, 2011.
  6. Whittaker, B. Ryner, and M. Nazif, "Large-scale automatic classification of phising pages," in Proc. NDSS, 2010.
  7. M. Cova, C. Kruegel, and G. Vigna, "Detection and analysis of drive-by-download attacks and malicious JavaScript code," in Proc. WWW, 2010.
  8. J. Zhang, C. Seifert, J. W. Stokes, and W. Lee, "ARROW: Generatingsignatures to detect drive-by downloads," in Proc. WWW, 2011.
  9. J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists: Learning to detect malicious web sites from suspicious URLs," in Proc. ACM KDD, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Suspicious URL Twitter URL redirection conditional redirection classification.