This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Phishing Attacks in Social Media

downloadDownload printPrint

Many application system are been created and many research have been done to detect suspicious words messages, chat, profile, email spam, URL malicious web content also to detect phishing attacks in social media. The social approach to detect spam or malicious on Facebook, Twitter, Myspace was based on information found in social media by identifying or detecting malicious URL link, email with spam content, suspicious words from image and video text.

Are you Looking For A Custom Essay about “Phishing Attacks in Social Media” NOW? You Found It!

Professional Writers that Guarantee an On-time Delivery


experts online

There’s few application that detect suspicious words embedded in images or video with help of image processing, image retrieval techniques. Previous study monitoring messages sent through social networking sites and instant messages. The designed framework that prevent, predicts, provide evidence of cyber-attacks profile when suspicious messages sent between users, but fail to detect suspicious messages in short form and coded words form sent via IM and SNM in real time. They also fail to detect suspicious words in all kind of long and short words form and coded words embedded in image contents.

Mohd Mahmood Ali, Khaja Moizuddin Mohd and Lakshmi Rajamani are researchers that found out SMD framework to detect suspicious word from messages stored in database after users made communication via social media{Ali2014}. This paper was not focus on coded words and short form chat messages. It was to prevent, predict and provide evidence of suspicious words and tracing the profile of individual or group committing crime and report to E-crime department. However the approaches used such as data mining, ontology structure divided the websites texts semantically with the assistance of Word Net database into different attributes of threats categories for example: murder, kidnap and sexual . But ontology wasn’t refreshed frequently with new code words that are discovered utilizing data mining approach.

Rajamani, Lakshmi Ali, Mohammed Mahmood Rasheed, Mohammed Abdul presented a system designed with a thought of text secure framework that recognizes suspicious messages which prompts unlawful movements by criminals. A framework was not concentrated on securing messages by utilizing encryption approaches and furthermore does not focus on short form messages. This paper gives different thoughts regarding stemming calculation and priority algorithm .

Murugesan, Devi, Deepthi, Lavanya and Annie Princy. They proposed the system monitoring suspicious discussions automatically on online forum, they used text analysis to detect suspicious post in online forums. They focus on automated classification to identify more important suspicious discussion{Murugesan2016}. Thivya Shilpa. Gv proposed a framework which provide security, predicts, detect coded words and short form of suspicious words with the help of association rule mining techniques and ontology concept that provide security for the stored chat messages by using encryption technique. But this paper doesn’t detect suspicious word attached in image contents .

Salim Almi Omar Beqqali, a researcher discovered automatic system for detecting suspicious profile in social media through identifying suspicious performance and concern of users. The techniques presented is mainly based on the calculation of similarity distance to differentiate suspicious posts using text analysis. The limitations found executing time, development automated classifications and using techniques. John Resig Ankur Teredesai  in their paper explore framework for IM and various data mining issues and how they relate to Instant Messaging and current Counter-Terrorism efforts. And this paper does not tend to fully detect suspicious messages, not even detection of topics and social network analysis.

Get a Personal "Phishing Attacks in Social Media" Tailored Essay For You in 3 Hours!

100% Customized to Your Need with Expert Writers


Those above articles explains approaches and limitations of capture suspicious word. Currently, clients are using different tricks of sending short form or coded words which is not so easy to recognise by crime departments or admin. Our proposed algorithms is to detect suspicious word in short form or coded words attached in images that are sent by users .

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

121 writers online


Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Phishing Attacks in Social Media. (2018, November 15). GradesFixer. Retrieved June 3, 2023, from
“Phishing Attacks in Social Media.” GradesFixer, 15 Nov. 2018,
Phishing Attacks in Social Media. [online]. Available at: <> [Accessed 3 Jun. 2023].
Phishing Attacks in Social Media [Internet]. GradesFixer. 2018 Nov 15 [cited 2023 Jun 3]. Available from:
copy to clipboard

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.


    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts


    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.



    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!


    Get Your Personalized Essay in 3 Hours or Less!


    We can help you get a better grade and deliver your task on time!

    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now