Phishing Attacks in Social Media: [Essay Example], 609 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Phishing Attacks in Social Media

Print Download now

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

Many application system are been created and many research have been done to detect suspicious words messages, chat, profile, email spam, URL malicious web content also to detect phishing attacks in social media. The social approach to detect spam or malicious on Facebook, Twitter, Myspace was based on information found in social media by identifying or detecting malicious URL link, email with spam content, suspicious words from image and video text.

There’s few application that detect suspicious words embedded in images or video with help of image processing, image retrieval techniques. Previous study monitoring messages sent through social networking sites and instant messages. The designed framework that prevent, predicts, provide evidence of cyber-attacks profile when suspicious messages sent between users, but fail to detect suspicious messages in short form and coded words form sent via IM and SNM in real time. They also fail to detect suspicious words in all kind of long and short words form and coded words embedded in image contents.

Mohd Mahmood Ali, Khaja Moizuddin Mohd and Lakshmi Rajamani are researchers that found out SMD framework to detect suspicious word from messages stored in database after users made communication via social media{Ali2014}. This paper was not focus on coded words and short form chat messages. It was to prevent, predict and provide evidence of suspicious words and tracing the profile of individual or group committing crime and report to E-crime department. However the approaches used such as data mining, ontology structure divided the websites texts semantically with the assistance of Word Net database into different attributes of threats categories for example: murder, kidnap and sexual{Ali2014}. But ontology wasn’t refreshed frequently with new code words that are discovered utilizing data mining approach.

Rajamani, Lakshmi Ali, Mohammed Mahmood Rasheed, Mohammed Abdul presented a system designed with a thought of text secure framework that recognizes suspicious messages which prompts unlawful movements by criminals. A framework was not concentrated on securing messages by utilizing encryption approaches and furthermore does not focus on short form messages. This paper gives different thoughts regarding stemming calculation and priority algorithm{Rajamani2013}.

Murugesan, Devi, Deepthi, Lavanya and Annie Princy. They proposed the system monitoring suspicious discussions automatically on online forum, they used text analysis to detect suspicious post in online forums. They focus on automated classification to identify more important suspicious discussion{Murugesan2016}. Thivya Shilpa. Gv proposed a framework which provide security, predicts, detect coded words and short form of suspicious words with the help of association rule mining techniques and ontology concept that provide security for the stored chat messages by using encryption technique. But this paper doesn’t detect suspicious word attached in image contents {Thivya2015}.

Salim Almi Omar Beqqali, a researcher discovered automatic system for detecting suspicious profile in social media through identifying suspicious performance and concern of users. The techniques presented is mainly based on the calculation of similarity distance to differentiate suspicious posts using text analysis. The limitations found executing time, development automated classifications and using techniques. John Resig Ankur Teredesai [11] in their paper explore framework for IM and various data mining issues and how they relate to Instant Messaging and current Counter-Terrorism efforts. And this paper does not tend to fully detect suspicious messages, not even detection of topics and social network analysis.

Those above articles explains approaches and limitations of capture suspicious word. Currently, clients are using different tricks of sending short form or coded words which is not so easy to recognise by crime departments or admin. Our proposed algorithms is to detect suspicious word in short form or coded words attached in images that are sent by users {Vijayarajan2016}.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Cite this Essay

To export a reference to this article please select a referencing style below:

GradesFixer. (2018, November, 15) Phishing Attacks in Social Media. Retrived February 19, 2020, from https://gradesfixer.com/free-essay-examples/phishing-attacks-in-social-media/
"Phishing Attacks in Social Media." GradesFixer, 15 Nov. 2018, https://gradesfixer.com/free-essay-examples/phishing-attacks-in-social-media/. Accessed 19 February 2020.
GradesFixer. 2018. Phishing Attacks in Social Media., viewed 19 February 2020, <https://gradesfixer.com/free-essay-examples/phishing-attacks-in-social-media/>
GradesFixer. Phishing Attacks in Social Media. [Internet]. November 2018. [Accessed February 19, 2020]. Available from: https://gradesfixer.com/free-essay-examples/phishing-attacks-in-social-media/
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

close

Thanks!

Your essay sample has been sent.

Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

thanks-icon Order now
boy

Hi there!

Are you interested in getting a customized paper?

Check it out!
Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.