Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3230467.3230475acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicpsprocConference Proceedingsconference-collections
research-article

Recognition Based Mechanism to Detect Malicious Content in Social Networks

Published: 21 May 2018 Publication History

Abstract

In the past six years, tremendous growth in the size and popularity of social networking has fundamentally changed the way to use the Internet. Online social media services like Facebook and Twitter witness an exponential increase in user activity when an event takes place in the real world. This activity is a combination of good quality content like information, personal views, opinions, comments, as well as poor quality content like rumors, spam, and other malicious contents. Although the best quality contents makes online social media a rich source of information, consumption of poor quality content can degrade the user experience and have an inappropriate impact in the real world. In this paper, we propose a new approach to detect malicious content on social networks, while using the module of filtering processes by content, to calculate the frequencies of the content entered into parameter and extract the entire contents which are similar to the chosen content to classify them in two classes {malicious content, legitimate content}. The recognition module will be the subject of performing the phase of spread that is to make the learning of malicious content already inserted in a database, the phase of back propagation is the recognition of content and their similar given by filtering by content.

References

[1]
Cheng Cao and James Caverlee, Detecting Spam URLs in Social Media via Behavioral Analysis, Springer International Publishing Switzerland 2015.
[2]
M. Sai Sri Lakshmi Yellari, M. Manisha, J. Dhanesh, M. Srinivasa Rao, IDENTIFYING MALICIOUS DATA IN SOCIAL MEDIA, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017.
[3]
Pasquale Lops, Marco de Gemmis and Giovanni Semeraro, Content-based Recommender Systems: State of the Art and Trends, F. Ricci et al. (eds.), Recommender Systems Handbook, © Springer Science+Business Media, LLC 2011.
[4]
Prateek Dewan, Ponnurangam Kumaraguru, Detecting Malicious Content on Facebook, Copyright c 2015.
[5]
Divya, 2Dr. Kulvinder Singh, 3Dr. Sanjeev Dhawan, Threshold Based Mechanism to Detect Malicious URL's in Social Networks, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727.
[6]
Vidya Dhamdhere, Sheetal Gund, Tejaswini Zade, Radhika Tiwari, Ashish Salunkhe5, Survey on Malicious.
[7]
Application Detection on Social Network, International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 4, Issue 9, September 2016.
[8]
Saini Jacob Soman and S. Murugappan, A STUDY OF SPAM DETECTION ALGORITHM ON SOCIAL MEDIA NETWORKS, Journal of Computer Science 10 (10): 2135-2140, 2014 ISSN: 1549-3636 © 2014 Science Publications Published Online 10 (10) 2014 (http://www.thescipub.com/jcs.toc)
[9]
Neeraja M, John Prakash, Detecting Malicious Posts in Social Networks Using Text Analysis, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391.
[10]
Qiang Cao, Understanding and Defending against Malicious Identities in Online Social Networks, Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2014.

Index Terms

  1. Recognition Based Mechanism to Detect Malicious Content in Social Networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICEMC '18: Proceedings of the 2018 International Conference on E-business and Mobile Commerce
    May 2018
    71 pages
    ISBN:9781450364300
    DOI:10.1145/3230467
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 May 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Social networks
    2. back propagation
    3. filtering content
    4. malicious content
    5. neural networks
    6. propagation
    7. recognition
    8. spam

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICEMC '18

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 51
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media