CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

A Survey on Data Security in Social Networking Sites

by Pragya Pradhan, Santanu Misra, Tawal Koirala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 7
Year of Publication: 2016
Authors: Pragya Pradhan, Santanu Misra, Tawal Koirala

Pragya Pradhan, Santanu Misra, Tawal Koirala . A Survey on Data Security in Social Networking Sites. International Journal of Computer Applications. 155, 7 ( Dec 2016), 31-34. DOI=10.5120/ijca2016912325

@article{ 10.5120/ijca2016912325,
author = { Pragya Pradhan, Santanu Misra, Tawal Koirala },
title = { A Survey on Data Security in Social Networking Sites },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 7 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 31-34 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016912325 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:00:39.520308+05:30
%A Pragya Pradhan
%A Santanu Misra
%A Tawal Koirala
%T A Survey on Data Security in Social Networking Sites
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 7
%P 31-34
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

The popular communication Social Networking Sites (SNS) like Facebook, Twitter, LinkedIn etc have become in style and well-liked during the past few years and are utilized by billions of individuals irrespective of their age groups for communicating either with old friends, relatives from far places or total strangers. As they allow users to both articulate their eccentricity and meet people with similar interests. Risks posed by SNS are becoming harder to conquer due to publication of social network data by user which may contain personal or confidential information. There is a high possibility of this information to be misused by people with harmful motives like stalking, identity theft, online victimization etc. Therefore there arises an urgent need to safeguard users from attacks occurring in SNS, as users are still unaware of these threats. Moreover, a user does not have control about what others reveal about them. The attackers of SNS mainly use social engineering attack to victimize the user through malicious URL links, applications, Spam messages etc. URL has an important role in detecting phishing websites. So, this focuses on the detection and prevention of malicious URLs as they are used to mount various attacks like spamming, phishing, malware etc.

  1. Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker, “Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs”, In Proc. 15th ACM SIGKDD Int. Conf. Mining, pp. 1245–1254, 2009.
  2. Dwen-Ren Tsai, Allen Y. Chang, Sheng-Chieh Chung, You Sheng Li, “A Proxy-based Real-time Protection Mechanism for Social Networking Sites”, In Security Technology (ICCST), IEEE International Carnahan Conference, pp. 30-34, 5 Oct 2010.
  3. Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna, “Detecting spammers on social networks”, In Proceedings of the 26th Annual Computer Security Applications Conference pp. 1-9, ACM, 6 Dec 2010.
  4. Hyunsang Choi, Bin B. Zhu, Heejo Lee, “Detecting Malicious Web Links and Identifying Their Attack Types”, InWebApps, June 2011.
  5. Lubos Takac, Michal Zabovsky, “Data Analysis in Public Social Networks”, International Scientific Conference & International Workshop Present Day Trends of Innovations, 28th – 29th May 2012.
  6. Awad WA., “Machine Learning Algorithms In Web Page Classification”, International Journal of Computer Science & Information Technology (IJCSIT), Vol 4, No 5, Oct. 2012.
  7. Nahier Aldhafferi, Charles Watson, A.S.M Sajeev, “Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices”, International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 2, No. 2, April 2013.
  8. Abhishek Kumar, Subham Kumar Gupta, Animesh Kumar Rai, Sapna Sinha, “Social Networking Sites and Their Security Issues”, International Journal of Scientific and Research Publications, Vol 3, Issue 4, ISSN 2250-3153, April 2013.
  9. Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen, “Multiparty Access Control for Online Social Networks: Model and Mechanisms”, IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 7, July 2013.
  10. Michael Fire, Roy Goldschmidt, Yuval Elovici, “Online Social Networks: Threats and Solutions”, IEEE Communication Surveys & Tutorials, Vol. 16, No. 4, Fourth Quarter 2014.
  11. Amardeep Singh, Divya Bansal, Sanjeev Sofat, “Preserving Techniques in Social Networks Data Publishing- A Review”, International Journal of Computer Applications (0975 -8887), Vol. 87-No.15, February 2014.
  12. Manjeet Chaudhary, H.A Hingoliwala, “Warning Tweet: A Detection System for suspicious URLs in Twitter Stream”, International Journal for Research in Applied Science and Engineering Technology (IJRASET), Vol. 2, Issue VII, ISSN: 2321-9653, pp. 297-305, July 2014.
  13. Huang D, Xu K, Pei J., “Malicious URL detection by dynamically mining patterns without pre-defined elements”, World Wide 9, 1375-94, Nov. 2014.
  14. Jyoti D.Halwar, Sandeep Kadam, Vrushali Desale, “Detection of Suspicious URL in Social Networking Site Twitter: Survey Paper”, International Journal of Computer Applications (0975-8887), Vol. 110-No. 8, January 2015.
  15. Neeraja M, John Prakash, “Detecting Malicious Posts in Social Networks Using Text Analysis”, International Journal of Science and Research (IJSR) ISS (Online): 2319-7064 Index Copernicus Value (2013): 6.14, Impact Factor (2015): 6.391.
  16. Shital B. Mandhane, Ismail Mohammed, “A Survey on a FRAppE: Detecting Malicious FacebookApplications”, International Journal of Advance Research in Computer Science and Management Studies, ISSN: 232 7782 1 (Online), Volume 3, Issue 11, November 2015.
  17. Nemi Chandra Rathore, Prashant Shaw and Somanath Tripathy, “Collaborative Access Control Mechanism for Online Social Networks”, Springer International Publishing Switzerland, 2016.
  18. Saurabh Muthal, Ameya Pawar, Saurabh Harne, “A Hybrid Approach to Detect Suspicious URLs”, IJARIIE-ISSN (O)-2395-4396, Vol-2 Issue-2 2016.
  19. Amol C. Jadhav, A. M. Pawar, “Enhancement in Phishing Detection Using Features Clustering”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 6, ISSN: 2277 128X, June 2016.
Index Terms

Computer Science
Information Sciences


Suspicious URLs cyber criminals cyber threats SNS users approaches etc.