Detection of Forwarding-Based Malicious URLs in Online Social Networks

被引:0
作者
Jian Cao
Qiang Li
Yuede Ji
Yukun He
Dong Guo
机构
[1] Jilin University,College of Computer Science and Technology
[2] Jilin University,Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education
来源
International Journal of Parallel Programming | 2016年 / 44卷
关键词
Online social network; Forwarding-based; Machine learning; Malicious URL;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, online social networks (OSNs), such as Facebook, Twitter and Sina Weibo, have become extremely popular among Internet users. Unfortunately, attackers also utilize them to hide malicious attacks. Due to the significance of detecting malicious URLs in OSNs, multiple solutions have been offered by OSN operators, security companies, and academic researchers. Most of these solutions use machine-learning methods to train classification models based on different kinds of feature sets. However, most are ineffective because their selected features are conventional. In this paper, we focus on forwarding-based features because of the special connections between forwarding behavior and the propagation of malicious URLs. First, we conduct a comprehensive analysis of conventional URL feature sets. Then, we design some forwarding-based features and choose several graph-based features to combine with them in order to train a detection model. We evaluate the system using about 100,000 original messages collected from Sina Weibo, which is the largest OSN website in China. The high accuracy rate and low false positive rate show that forwarding-based features are much more effective in detecting malicious URLs in OSNs than are other more conventional features. To the best of our knowledge, this work is the first to analyze forwarding-based features in OSNs and offers a valuable contribution to this area of research.
引用
收藏
页码:163 / 180
页数:17
相关论文
共 6 条
[1]  
Yang C(2013)Empirical evaluation and new design for fighting evolving Twitter spammers IEEE Trans. Inf. Forensics Secur. 8 1280-1293
[2]  
Harkreader R(2011)Learning to detect malicious urls ACM Trans. Intell. Syst. Technol (TIST) 2 30-undefined
[3]  
Ma J(undefined)undefined undefined undefined undefined-undefined
[4]  
Saul LK(undefined)undefined undefined undefined undefined-undefined
[5]  
Savage S(undefined)undefined undefined undefined undefined-undefined
[6]  
Voelker GM(undefined)undefined undefined undefined undefined-undefined