Detecting malicious short URLs on Twitter

被引:0
作者
Nepali, Raj Kumar [1 ]
Wang, Yong [1 ]
Alshboul, Yazan [1 ]
机构
[1] Dakota State Univ, Madison, SD 57042 USA
来源
AMCIS 2015 PROCEEDINGS | 2015年
关键词
Online Social Networks; twitter; short URLs; malicious URLs; machine Learning; classification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Short URLs (Uniform Resource Locators) have gained immense popularity especially in Online Social Networks (OSNs), blogs, and messages. Short URLs are used to avoid sharing overly long URLs and save limited text space in messages or tweets. Significant numbers of URLs shared in the Online Social Networks are shortened URLs. Despite of its potential benefits from genuine usage, attackers use shortened URLs to hide the malicious URLs, which direct users to malicious pages. Although, OSN service providers and URL shortening services utilize certain detection mechanisms to prevent malicious URLs from being shortened, research has found that they fail to do so effectively. These malicious URLs are found to propagate through OSNs. In this paper, we propose a mechanism to develop a machine learning classifier to detect malicious short URLs with visible content features, tweet context, and social features from one popular Online Social Network Twitter.
引用
收藏
页数:7
相关论文
共 50 条
[41]   Automatic Detection of Malicious URLs using Fine Tuned Classification Model [J].
Ding, Chiyu .
2020 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, COMPUTER TECHNOLOGY AND TRANSPORTATION (ISCTT 2020), 2020, :302-320
[42]   REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery [J].
Charles, Perez ;
Babiga, Birregah ;
Robert, Layton ;
Marc, Lemercier ;
Paul, Watters .
AI COMMUNICATIONS, 2016, 29 (01) :107-122
[43]   MalReG: Detecting and Analyzing Malicious Retweeter Groups [J].
Gupta, Sonu ;
Kumaraguru, Ponnurangam ;
Chakraborty, Tanmoy .
PROCEEDINGS OF THE 6TH ACM IKDD CODS AND 24TH COMAD, 2019, :61-69
[44]   Detecting Bots on Russian Political Twitter [J].
Stukal, Denis ;
Sanovich, Sergey ;
Bonneau, Richard ;
Tucker, Joshua A. .
BIG DATA, 2017, 5 (04) :310-324
[45]   Detecting Violent Radical Accounts on Twitter [J].
Abd-Elaal, Ahmed I. A. ;
Badr, Ahmed Z. ;
Mandi, Hani M. K. .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) :516-522
[46]   Malicious URLs Detection Using Decision Tree Classifiers and Majority Voting Technique [J].
Patil, Dharmaraj R. ;
Patil, J. B. .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2018, 18 (01) :11-29
[47]   A hybrid DNN–LSTM model for detecting phishing URLs [J].
Alper Ozcan ;
Cagatay Catal ;
Emrah Donmez ;
Behcet Senturk .
Neural Computing and Applications, 2023, 35 :4957-4973
[48]   Detecting Malicious Facebook Applications [J].
Rahman, Sazzadur ;
Huang, Ting-Kai ;
Madhyastha, Harsha V. ;
Faloutsos, Michalis .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) :773-787
[49]   Is this URL Safe: Detection of Malicious URLs Using Global Vector for Word Representation [J].
Bharadwaj, Rohit ;
Bhatia, Ashutosh ;
Chhibbar, Laxmi Divya ;
Tiwari, Kamlesh ;
Agrawal, Ankit .
36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, :486-491
[50]   Intelligent System to Detect Malicious URLs Using Machine-Learning Algorithms [J].
Jeyavadhanam, B. Rebecca ;
Bhuvanan, Mahesh ;
Sihan, Haroon ;
Ahmadzadeh, Sahar ;
Karthick, Gayathri .
PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2, ICICT 2024, 2024, 1012 :349-358