Open Access Open Access  Restricted Access Subscription Access

Misreport Detection

Swarali Gaonkar, Vailantina Fernandes, Vijay Jumb

Abstract


Phishing activities on the web are increasing day by day. It’s a bootleg try created by the attackers to steal personal info such as bank account details, login id, passwords, etc. several of the researchers projected to find phishing URLs by extracting options from the content of the net pages. However, variant time and the house are needed for this. This paper presents an associate approach to find phishing computer addresses in associate economical approach supported URL options solely. The projected approach is that classifies URLs mechanically by mistreatment Machine-Learning algorithmic program referred to as logistic regression that's accustomed binary classification. The classifiers achieve 98% accuracy by learning phishing URLs. Recently, malicious news has been acquisition several issues to our society. As a result, several researchers are functioning on characteristic pretend news. Most of the phishing news detection systems utilize the feature of linguistic of the news. However, they need issue in sensing extremely ambiguous pretend news which might be detected solely when characteristic which means and latest connected data. During this paper, to resolve this drawback, we tend to new malicious news detection system mistreatment truth decibel that is constructed and updated by human's direct judgement when assembling obvious facts. Our system receives a proposition and searches the semantically connected articles from truth decibel so as to verify whether or not the given proposition is true or not, by comparison, the proposition with the connected articles indeed decibel.

Full Text:

PDF

References


Gurajala, S., White, J. S., Hudson, B., Voter, B. R., & Matthews, J. N. (2016). Profile characteristics of fake Twitter accounts. Big Data & Society, 3(2), 2053951716674236.

Xiao, C., Freeman, D. M., & Hwa, T. (2015, October). Detecting clusters of fake accounts in online social networks. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security (pp. 91-101).

Mainwaring, S. (2011). We first: How brands and consumers use social media to build a better world. St. Martin's Press.

Subrahmanian, V. S., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., ... & Menczer, F. (2016). The DARPA Twitter bot challenge. Computer, 49(6), 38-46.

Li, Y., Martinez, O., Chen, X., Li, Y., & Hopcroft, J. E. (2016, April). In a world that counts: Clustering and detecting fake social engagement at scale. In Proceedings of the 25th International Conference on World Wide Web (pp. 111-120).

Thomas, K., Grier, C., Song, D., & Paxson, V. (2011, November). Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (pp. 243-258).

Tuna, T., Akbas, E., Aksoy, A., Canbaz, M. A., Karabiyik, U., Gonen, B., & Aygun, R. (2016). User characterization for online social networks. Social Network Analysis and Mining, 6(1), 1-28.

Galán-García, P., Puerta, J. G. D. L., Gómez, C. L., Santos, I., & Bringas, P. G. (2016). Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying. Logic Journal of the IGPL, 24(1), 42-53.

Crammer, K., Dredze, M., & Kulesza, A. (2009, August). Multi-class confidence weighted algorithms. In Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing (pp. 496-504).

Patil, D. R., & Patil, J. B. (2016). Malicious web pages detection using static analysis of URLs. International Journal of Information Security and Cybercrime, 5(2), 31-50.


Refbacks

  • There are currently no refbacks.