CFP last date
20 May 2024
Reseach Article

Performance Analysis of Classification Techniques for Suspicious URL Detection in Social Networks

by Maharshi Tiwari, Abhishek Mathur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 14
Year of Publication: 2015
Authors: Maharshi Tiwari, Abhishek Mathur
10.5120/ijca2015907178

Maharshi Tiwari, Abhishek Mathur . Performance Analysis of Classification Techniques for Suspicious URL Detection in Social Networks. International Journal of Computer Applications. 130, 14 ( November 2015), 12-19. DOI=10.5120/ijca2015907178

@article{ 10.5120/ijca2015907178,
author = { Maharshi Tiwari, Abhishek Mathur },
title = { Performance Analysis of Classification Techniques for Suspicious URL Detection in Social Networks },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 14 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number14/23276-2015907178/ },
doi = { 10.5120/ijca2015907178 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:32.424061+05:30
%A Maharshi Tiwari
%A Abhishek Mathur
%T Performance Analysis of Classification Techniques for Suspicious URL Detection in Social Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 14
%P 12-19
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Social network services (SNSs) are increasing popular. Now a day’s most of the people in all over the world use Facebook, twitter for sharing their ideas. Though suspicious users collectively use by them to embed to harmful activities that may be tricky in securing user's personal information and data. This is challenge for social networks to rectify this type of security breach. The social networks or community websites must be able to identify phishing and suspicious urls. Machine learning techniques are proved an efficient tool in classifying benign and the suspicious urls from the set of many urls most of the solutions for training the classification models that supported all totally different sorts of feature sets. However, the most of the solutions does not provide good results as we expect from them on the basis of performance, behavior and some other criteria. In this study, a feature set is presented that combines the features of traditional heuristics and social networking. Furthermore, a suspicious URL identification system for use in social network environments is proposed which is based on comparative study of three algorithms named as Bayesian classification, KNN, SVM. The experimental results indicate that the proposed approach achieves a high detection rate.

References
  1. Liu, Bing. Web data mining: exploring hyperlinks, contents, and usage data. Springer Science & Business Media, 2007.
  2. Ahmad, Tauseef, and Mohd Mudasir Shafi. "Privacy and security concerns in SNS: a Saudi Arabian users point of view." (2012).
  3. Wondracek, Gilbert, Thorsten Holz, Engin Kirda, and Christopher Kruegel. "A practical attack to de-anonymize social network users." In Security and Privacy (SP), 2010 IEEE Symposium on, pp. 223-238. IEEE, 2010.
  4. Wilson, Jeffrey T., and Mark H. Goldstein. "History-based tracking of user preference settings." U.S. Patent 8,793,614, issued July 29, 2014.
  5. Zhou, Bin, and Jian Pei. "Preserving privacy in social networks against neighborhood attacks." In Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, pp. 506-515. IEEE, 2008.
  6. Halwar, Jyoti, and Sandip Kadam. "Review on Malicious URL Detection Schemes in Social Networking Site Twitter."
  7. Lee, Sangho, and Jong Kim. "WarningBird: Detecting Suspicious URLs in Twitter Stream." In NDSS. 2012.
  8. Choi, Hyunsang, Bin B. Zhu, and Heejo Lee. "Detecting malicious web links and identifying their attack types." In Proceedings of the 2nd USENIX conference on Web application development, pp. 11-11. USENIX Association, 2011.
  9. Gao, Hongyu, Yan Chen, Kathy Lee, Diana Palsetia, and Alok N. Choudhary. "Towards Online Spam Filtering in Social Networks." In NDSS. 2012.
  10. Prakash, Pawan, Manish Kumar, Ramana Rao Kompella, and Minaxi Gupta. "Phishnet: predictive blacklisting to detect phishing attacks." In INFOCOM, 2010 Proceedings IEEE, pp. 1-5. IEEE, 2010.
  11. Martinez-Romo, Juan, and Lourdes Araujo. "Detecting malicious tweets in trending topics using a statistical analysis of language." Expert Systems with Applications 40, no. 8 (2013): 2992-3000.
  12. Aggarwal, Charu C., and Tarek Abdelzaher. "Integrating sensors and social networks." In Social Network Data Analytics, pp. 379-412. Springer US, 2011.
  13. Zilpelwar, Rashmi A., Rajneeshkaur K. Bedi, and V. M. Wadhai. "An Overview of Privacy and Security in SNS." International Journal of P2P Network Trends and Technology 2, no. 1 (2012).
  14. Marett, Kent, Anna L. McNab, and Ranida B. Harris. "Social networking websites and posting personal information: An evaluation of protection motivation theory." AIS Transactions on Human-Computer Interaction 3, no. 3 (2011): 170-188.
  15. Ellison, Nicole B. "Social network sites: Definition, history, and scholarship."Journal of Computer‐Mediated Communication 13, no. 1 (2007): 210-230.
  16. Irani, Danesh, Marco Balduzzi, Davide Balzarotti, Engin Kirda, and Calton Pu. "Reverse social engineering attacks in online social networks." In Detection of intrusions and malware, and vulnerability assessment, pp. 55-74. Springer Berlin Heidelberg, 2011.
  17. Krishnamurthy, Balachander, and Craig E. Wills. "Characterizing privacy in online social networks." In Proceedings of the first workshop on Online social networks, pp. 37-42. ACM, 2008.
  18. Lenhart, Amanda. "Adults and Social Network Websites. Pew Internet and American Life Project." The Pew Center, Washington DC (2009).
  19. Gilbert, Eric, and Karrie Karahalios. "Predicting tie strength with social media." In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 211-220. ACM, 2009.
  20. Lampe, Cliff, Nicole B. Ellison, and Charles Steinfield. "Changes in use and perception of Facebook." In Proceedings of the 2008 ACM conference on Computer supported cooperative work, pp. 721-730. ACM, 2008.
  21. Joinson, Adam N. "Looking at, looking up or keeping up with people?: motives and use of facebook." In Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 1027-1036. ACM, 2008.
  22. Honey, Courtenay, and Susan C. Herring. "Beyond microblogging: Conversation and collaboration via Twitter." In System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, pp. 1-10. IEEE, 2009.
  23. DiMicco, Joan, David R. Millen, Werner Geyer, Casey Dugan, Beth Brownholtz, and Michael Muller. "Motivations for social networking at work." In Proceedings of the 2008 ACM conference on Computer supported cooperative work, pp. 711-720. ACM, 2008.
  24. Lee, Sangho, and Jong Kim. "WarningBird: Detecting Suspicious URLs in Twitter Stream." In NDSS. 2012.
  25. Chhabra, Sidharth, Anupama Aggarwal, Fabricio Benevenuto, and Ponnurangam Kumaraguru. "Phi. sh/$ oCiaL: the phishing landscape through short URLs." In Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, pp. 92-101. ACM, 2011.
  26. Halwar, Jyoti, and Sandip Kadam. "Review on Malicious URL Detection Schemes in Social Networking Site Twitter.
  27. Dataset URL, “https://archive.ics.uci.edu/ml/datasets/Phishing+Websites”.
Index Terms

Computer Science
Information Sciences

Keywords

ON-Line Social Networks Suspicious URLS Naive Bayesian Classification KNN SVM Machine Learning