Loading...
Please wait, while we are loading the content...
Similar Documents
Twitter Scanner To Search Malicious URLs for Twitter Users
| Content Provider | Semantic Scholar |
|---|---|
| Author | Nikumbhe, Nilesh B. Nayak, Chhaya Joshi, Vaibhav |
| Copyright Year | 2015 |
| Abstract | Over the last few years, there is tremendous use of online social networking sites. It’s also providing opportunities for hackers to enter easily in network and do their unauthorized activities. There are many notable social networking websites like Twitter, Facebook and Google+ etc. These are popularly practiced by numerous people to become linked up with each other and partake their daily happenings through it. Here we focus on twitter for an experiment which is more popular for micro-blogging and its community interact through publishing text-based posts of 140 characters known as tweets. By considering this popularity of tweeter hacker’s use of short Uniform Resource Locator (URL), as a result it disseminates viruses on user accounts. Our study is based on examining the malicious content or their short URLs and protect the user from unauthorized activities. We introduce such a system which provides the security to multiple users of twitter. Besides, they get some alert mails. Our goal is to download URLs in real time from multiple accounts. Then we get entry points of correlated URLs. Crawler browser marks the suspicious URL. This system finds such malicious URLs by using five features like initial URL, similar text, friend follower ratio and relative URLs. Then alert mail is sent to users, which is added to the host. |
| File Format | PDF HTM / HTML |
| Volume Number | 2 |
| Alternate Webpage(s) | http://ijett.in/index.php/IJETT/article/download/48/39 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |