close
test_template

Phishing Attacks in Social Media

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 609 |

Page: 1|

4 min read

Published: Nov 16, 2018

Words: 609|Page: 1|4 min read

Published: Nov 16, 2018

Many application system are been created and many research have been done to detect suspicious words messages, chat, profile, email spam, URL malicious web content also to detect phishing attacks in social media. The social approach to detect spam or malicious on Facebook, Twitter, Myspace was based on information found in social media by identifying or detecting malicious URL link, email with spam content, suspicious words from image and video text.

There’s few application that detect suspicious words embedded in images or video with help of image processing, image retrieval techniques. Previous study monitoring messages sent through social networking sites and instant messages. The designed framework that prevent, predicts, provide evidence of cyber-attacks profile when suspicious messages sent between users, but fail to detect suspicious messages in short form and coded words form sent via IM and SNM in real time. They also fail to detect suspicious words in all kind of long and short words form and coded words embedded in image contents.

Mohd Mahmood Ali, Khaja Moizuddin Mohd and Lakshmi Rajamani are researchers that found out SMD framework to detect suspicious word from messages stored in database after users made communication via social media{Ali2014}. This paper was not focus on coded words and short form chat messages. It was to prevent, predict and provide evidence of suspicious words and tracing the profile of individual or group committing crime and report to E-crime department. However the approaches used such as data mining, ontology structure divided the websites texts semantically with the assistance of Word Net database into different attributes of threats categories for example: murder, kidnap and sexual . But ontology wasn't refreshed frequently with new code words that are discovered utilizing data mining approach.

Rajamani, Lakshmi Ali, Mohammed Mahmood Rasheed, Mohammed Abdul presented a system designed with a thought of text secure framework that recognizes suspicious messages which prompts unlawful movements by criminals. A framework was not concentrated on securing messages by utilizing encryption approaches and furthermore does not focus on short form messages. This paper gives different thoughts regarding stemming calculation and priority algorithm .

Murugesan, Devi, Deepthi, Lavanya and Annie Princy. They proposed the system monitoring suspicious discussions automatically on online forum, they used text analysis to detect suspicious post in online forums. They focus on automated classification to identify more important suspicious discussion{Murugesan2016}. Thivya Shilpa. Gv proposed a framework which provide security, predicts, detect coded words and short form of suspicious words with the help of association rule mining techniques and ontology concept that provide security for the stored chat messages by using encryption technique. But this paper doesn’t detect suspicious word attached in image contents .

Salim Almi Omar Beqqali, a researcher discovered automatic system for detecting suspicious profile in social media through identifying suspicious performance and concern of users. The techniques presented is mainly based on the calculation of similarity distance to differentiate suspicious posts using text analysis. The limitations found executing time, development automated classifications and using techniques. John Resig Ankur Teredesai  in their paper explore framework for IM and various data mining issues and how they relate to Instant Messaging and current Counter-Terrorism efforts. And this paper does not tend to fully detect suspicious messages, not even detection of topics and social network analysis.

Get a custom paper now from our expert writers.

Those above articles explains approaches and limitations of capture suspicious word. Currently, clients are using different tricks of sending short form or coded words which is not so easy to recognise by crime departments or admin. Our proposed algorithms is to detect suspicious word in short form or coded words attached in images that are sent by users .

Image of Dr. Oliver Johnson
This essay was reviewed by
Dr. Oliver Johnson

Cite this Essay

Phishing Attacks in Social Media. (2018, November 15). GradesFixer. Retrieved November 19, 2024, from https://gradesfixer.com/free-essay-examples/phishing-attacks-in-social-media/
“Phishing Attacks in Social Media.” GradesFixer, 15 Nov. 2018, gradesfixer.com/free-essay-examples/phishing-attacks-in-social-media/
Phishing Attacks in Social Media. [online]. Available at: <https://gradesfixer.com/free-essay-examples/phishing-attacks-in-social-media/> [Accessed 19 Nov. 2024].
Phishing Attacks in Social Media [Internet]. GradesFixer. 2018 Nov 15 [cited 2024 Nov 19]. Available from: https://gradesfixer.com/free-essay-examples/phishing-attacks-in-social-media/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now