Open Access   Article Go Back

Reaction Based Approach to find Malicious Posts in Online Social Networks

Rubina Khan1 , Anshul Khurana2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-10 , Page no. 144-148, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si10.144148

Online published on May 05, 2019

Copyright © Rubina Khan, Anshul Khurana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rubina Khan, Anshul Khurana, “Reaction Based Approach to find Malicious Posts in Online Social Networks,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.144-148, 2019.

MLA Style Citation: Rubina Khan, Anshul Khurana "Reaction Based Approach to find Malicious Posts in Online Social Networks." International Journal of Computer Sciences and Engineering 07.10 (2019): 144-148.

APA Style Citation: Rubina Khan, Anshul Khurana, (2019). Reaction Based Approach to find Malicious Posts in Online Social Networks. International Journal of Computer Sciences and Engineering, 07(10), 144-148.

BibTex Style Citation:
@article{Khan_2019,
author = {Rubina Khan, Anshul Khurana},
title = {Reaction Based Approach to find Malicious Posts in Online Social Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {10},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {144-148},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=991},
doi = {https://doi.org/10.26438/ijcse/v7i10.144148}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.144148}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=991
TI - Reaction Based Approach to find Malicious Posts in Online Social Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Rubina Khan, Anshul Khurana
PY - 2019
DA - 2019/05/05
PB - IJCSE, Indore, INDIA
SP - 144-148
IS - 10
VL - 07
SN - 2347-2693
ER -

           

Abstract

Social network is a platform of connected peoples where peoples share relation, emotions, activities etc. Second generation social network come in existence with lots of emerging applications, which also support service oriented environment, during all kind of activities massive information is generated. These all information are in the form of post. Hence it is necessary to find category of post. A post may be legitimate or malicious. In this dissertation we are trying to find malicious post on the basis of reaction and share on particular post. All the post collected by facebook through app known as Netvizz. Entire concept implemented in R studio which is an IDE of R programming. Dissertation also contain statistical analysis of page network with the help of well known tool gephi, It is based on predefine parameter such as Eigen vector centrality,closeness ,betweenness etc.

Key-Words / Index Term

Facebook,Netvizz,Gephi,Visualization

References

[1]. Broder, A., Glassman, S., Manasse, S., and Zweig, G. "Syntactic clustering of the web." (WWW6’97) (Santa Clara, CA., April). PP 391–404, 1997.
[2]. Shivakumar, N. And Garica-Molina, H. "Finding near-duplicates of documents on the web." Web Databases (WebDB’98) (Valencia, Spain, March). PP 204–212,1998.
[3]. Heintze, N. "Scalable document fingerprinting." USENIX Electronic Commerce Workshop (Oakland, CA., November). PP 191–200,1996.
[4]. Sanderson, M. "Duplicate detection in the Reuters collection." Technical Report of the Department of Computing Science at the University of Glasgow, Glasgow G12 8QQ, UK,1997.
[5]. McCain, M., and William C. "Integrating Quality Assurance into the GIS Project Life Cycle", ESRI Users Conference 1998.
[6]. Goodchild, M., and Gopal, S. (Eds.), "Accuracy of Spatial Databases", Taylor & Francis, London, ISBN: 0-85066-847-6, 1989.
[7]. Scott L., "Identification of GIS Attribute Error Using Exploratory Data Analysis," Professional Geographer 46(3), PP 378.386. 23 FEB 2005.
[8]. FGDC Federal Geographic Data Committee, FGDC-STD- 001-1998. "Content standard for digital geospatial metadata (revised June 1998)," Federal Geographic Data Committee, Washington, D.C., 1998.
[9]. C. Policroniades and I. Pratt, “Alternatives for Detecting Redundancy in Storage Systems Data,” USENIX Annual Technical Conference, Boston, MA, USA, June 2004.
[10]. A. Muthitacharoen, B. Chen, and D. Mazieres, “A Low-bandwidth Network File System,” ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, PP 174-187, Oct. 2001.
[11]. P. Kulkarni, F. Douglis, J. LaVoie, J. M. Tracey, “Redundancy Elimination Within Large Collections of Files”, USENIX Annual Technical Conference, Boston, MA, USA, June 2004.
[12]. Cooper, James W., Coden, Anni R., Brown, Eric W., "A Novel Method for Detecting Similar Documents", Hawaii International Conference on System Sciences,2004.