Survey on Suspicious URL Detection Schemes in Twitter Stream

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
Twitter is a micro-blogging and online social networking service that enables its users to send and read \"Tweets\". Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets which contains URLs for spam, phishing, and malware distribution. At present there are various Twitter spam detection schemes available. Conventional Twitter spam detection schemes make use of account features like the account activation date, the ratio of tweets that contain URLs and the relation features present in the Twitter graph. Conventional suspicious URL detection schemes make use of features like lexical features in URLs, dynamic behavior, URL redirection, and HTML content.
Download Now

Find By Topic