Skip to main content

2024 | OriginalPaper | Buchkapitel

IntelliTweet: A Multifaceted Feature Approach to Detect Malicious Tweets

verfasst von : Eric Edem Dzeha, Guy-Vincent Jourdan

Erschienen in: Foundations and Practice of Security

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Twitter faces an ongoing issue with malicious tweets from deceptive accounts engaged in phishing, scams, and spam, negatively impacting the overall Twitter user experience. In response to growing security concerns, various machine learning-based methods have been deployed to detect and analyze these malicious activities. However, the evolving nature of the threats and tactics used by malicious actors cast doubts on the effectiveness of previously employed techniques. These methods often encounter challenges in addressing URL obfuscation techniques and managing false positive predictions. In this paper, we present “IntelliTweet”, an innovative solution designed to comprehend tweet content and accurately identify malicious tweets. This is achieved by incorporating a combination of contextual and content-based features, surpassing the use of conventional features alone. IntelliTweet takes a holistic approach that includes URL analysis, sentiment analysis, Twitter user analysis, and TFIDF-based content analysis, all working in tandem to enhance malicious tweet detection. For this system, our evaluation strategy places emphasis on reducing false positives while maintaining high precision. Through comparative experiments, we have demonstrated that IntelliTweet effectively counters URL obfuscation techniques, is robust, and minimizes the false positive rate. The system achieved a 98.38% precision, a 97.54% f-measure, and yielded a false positive rate of 0.14.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Azeez, N.A., Misra, S., Margaret, I.A., Fernandez-Sanz, L., et al.: Adopting automated whitelist approach for detecting phishing attacks. Comput. Sec. 108, 102328 (2021)CrossRef Azeez, N.A., Misra, S., Margaret, I.A., Fernandez-Sanz, L., et al.: Adopting automated whitelist approach for detecting phishing attacks. Comput. Sec. 108, 102328 (2021)CrossRef
4.
Zurück zum Zitat Bell, S., Paterson, K., Cavallaro, L.: Catch me (on time) if you can: understanding the effectiveness of twitter url blacklists. arXiv preprint arXiv:1912.02520 (2019) Bell, S., Paterson, K., Cavallaro, L.: Catch me (on time) if you can: understanding the effectiveness of twitter url blacklists. arXiv preprint arXiv:​1912.​02520 (2019)
6.
Zurück zum Zitat Cao, J., Li, Q., Ji, Y., He, Y., Guo, D.: Detection of forwarding-based malicious urls in online social networks. Int. J. Parallel Prog. 44, 163–180 (2016)CrossRef Cao, J., Li, Q., Ji, Y., He, Y., Guo, D.: Detection of forwarding-based malicious urls in online social networks. Int. J. Parallel Prog. 44, 163–180 (2016)CrossRef
7.
Zurück zum Zitat Casanove, O.d., Sèdes, F.: Malicious human behaviour in information system security: contribution to a threat model for event detection algorithms. In: Foundations and Practice of Security, pp. 208–220. Springer Nature Switzerland, Cham (2023) Casanove, O.d., Sèdes, F.: Malicious human behaviour in information system security: contribution to a threat model for event detection algorithms. In: Foundations and Practice of Security, pp. 208–220. Springer Nature Switzerland, Cham (2023)
11.
Zurück zum Zitat Concone, F., Re, G.L., Morana, M., Ruocco, C.: Assisted labeling for spam account detection on twitter. In: 2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 359–366. IEEE (2019) Concone, F., Re, G.L., Morana, M., Ruocco, C.: Assisted labeling for spam account detection on twitter. In: 2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 359–366. IEEE (2019)
12.
Zurück zum Zitat Djaballah, K.A., Boukhalfa, K., Ghalem, Z., Boukerma, O.: A new approach for the detection and analysis of phishing in social networks: the case of twitter. In: 2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS), pp. 1–8 (2020). https://doi.org/10.1109/SNAMS52053.2020.9336572 Djaballah, K.A., Boukhalfa, K., Ghalem, Z., Boukerma, O.: A new approach for the detection and analysis of phishing in social networks: the case of twitter. In: 2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS), pp. 1–8 (2020). https://​doi.​org/​10.​1109/​SNAMS52053.​2020.​9336572
14.
Zurück zum Zitat Gangwar, S.S., Rathore, S.S., Chouhan, S.S., Soni, S.: Predictive modeling for suspicious content identification on twitter. Soc. Netw. Anal. Min. 12(1), 149 (2022)CrossRef Gangwar, S.S., Rathore, S.S., Chouhan, S.S., Soni, S.: Predictive modeling for suspicious content identification on twitter. Soc. Netw. Anal. Min. 12(1), 149 (2022)CrossRef
16.
Zurück zum Zitat Hong, J., Kim, T., Liu, J., Park, N., Kim, S.W.: Phishing url detection with lexical features and blacklisted domains. Adaptive Autonom. Sec. Cyber Syst. 253–267 (2020) Hong, J., Kim, T., Liu, J., Park, N., Kim, S.W.: Phishing url detection with lexical features and blacklisted domains. Adaptive Autonom. Sec. Cyber Syst. 253–267 (2020)
17.
Zurück zum Zitat Horawalavithana, S., De Silva, R., Nabeel, M., Elvitigala, C., Wijesekara, P., Iamnitchi, A.: Malicious and Low Credibility URLs on Twitter during the AstraZeneca COVID-19 Vaccine Development, arXiv:2102.12223 (Feb 2021), [cs] version: 1 Horawalavithana, S., De Silva, R., Nabeel, M., Elvitigala, C., Wijesekara, P., Iamnitchi, A.: Malicious and Low Credibility URLs on Twitter during the AstraZeneca COVID-19 Vaccine Development, arXiv:​2102.​12223 (Feb 2021), [cs] version: 1
18.
Zurück zum Zitat Inuwa-Dutse, I., Liptrott, M., Korkontzelos, I.: Detection of spam-posting accounts on twitter. Neurocomputing 315, 496–511 (2018)CrossRef Inuwa-Dutse, I., Liptrott, M., Korkontzelos, I.: Detection of spam-posting accounts on twitter. Neurocomputing 315, 496–511 (2018)CrossRef
19.
Zurück zum Zitat Jabardi, M., Hadi, A.S.: Twitter fake account detection and classification using ontological engineering and semantic web rule language. Karbala Inter. J. Mod. Sci. 6(4), 8 (2020)CrossRef Jabardi, M., Hadi, A.S.: Twitter fake account detection and classification using ontological engineering and semantic web rule language. Karbala Inter. J. Mod. Sci. 6(4), 8 (2020)CrossRef
20.
Zurück zum Zitat Jain, A.K., Gupta, B.: A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Inform. Syst. 16(4), 527–565 (2022)CrossRef Jain, A.K., Gupta, B.: A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Inform. Syst. 16(4), 527–565 (2022)CrossRef
21.
Zurück zum Zitat Jain, A.K., Gupta, B.B.: Towards detection of phishing websites on client-side using machine learning based approach. Telecommun. Syst. 68, 687–700 (2018)CrossRef Jain, A.K., Gupta, B.B.: Towards detection of phishing websites on client-side using machine learning based approach. Telecommun. Syst. 68, 687–700 (2018)CrossRef
26.
Zurück zum Zitat Marchal, S., Saari, K., Singh, N., Asokan, N.: Know your phish: novel techniques for detecting phishing sites and their targets. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 323–333 (2016). https://doi.org/10.1109/ICDCS.2016.10 Marchal, S., Saari, K., Singh, N., Asokan, N.: Know your phish: novel techniques for detecting phishing sites and their targets. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 323–333 (2016). https://​doi.​org/​10.​1109/​ICDCS.​2016.​10
28.
Zurück zum Zitat Nakano, H., et al.: Canary in twitter mine: collecting phishing reports from experts and non-experts. arXiv preprint arXiv:2303.15847 (2023) Nakano, H., et al.: Canary in twitter mine: collecting phishing reports from experts and non-experts. arXiv preprint arXiv:​2303.​15847 (2023)
29.
Zurück zum Zitat Nguyen, D.Q., Vu, T., Nguyen, A.T.: Bertweet: a pre-trained language model for english tweets. arXiv preprint arXiv:2005.10200 (2020) Nguyen, D.Q., Vu, T., Nguyen, A.T.: Bertweet: a pre-trained language model for english tweets. arXiv preprint arXiv:​2005.​10200 (2020)
30.
Zurück zum Zitat Rao, R.S., Vaishnavi, T., Pais, A.R.: Catchphish: detection of phishing websites by inspecting urls. J. Ambient. Intell. Humaniz. Comput. 11, 813–825 (2020)CrossRef Rao, R.S., Vaishnavi, T., Pais, A.R.: Catchphish: detection of phishing websites by inspecting urls. J. Ambient. Intell. Humaniz. Comput. 11, 813–825 (2020)CrossRef
31.
Zurück zum Zitat Rodrigues, A.P., Fernandes, R., Shetty, A., Lakshmanna, K., Shafi, R.M., et al.: Real-time twitter spam detection and sentiment analysis using machine learning and deep learning techniques. Comput. Intell. Neurosci. (2022) Rodrigues, A.P., Fernandes, R., Shetty, A., Lakshmanna, K., Shafi, R.M., et al.: Real-time twitter spam detection and sentiment analysis using machine learning and deep learning techniques. Comput. Intell. Neurosci. (2022)
35.
Zurück zum Zitat Sharma, N., Sharma, N., Tiwari, V., Chahar, S., Maheshwari, S., et al.: Real-time detection of phishing tweets. In: Fourth International Conference on Computer Science Engineering Application, pp. 215–27 (2014) Sharma, N., Sharma, N., Tiwari, V., Chahar, S., Maheshwari, S., et al.: Real-time detection of phishing tweets. In: Fourth International Conference on Computer Science Engineering Application, pp. 215–27 (2014)
36.
Zurück zum Zitat Tang, S., Mi, X., Li, Y., Wang, X., Chen, K.: Clues in tweets: twitter-guided discovery and analysis of sms spam. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2751–2764 (2022) Tang, S., Mi, X., Li, Y., Wang, X., Chen, K.: Clues in tweets: twitter-guided discovery and analysis of sms spam. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2751–2764 (2022)
42.
Zurück zum Zitat Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th International Conference on World Wide Web, pp. 639–648 (2007) Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th International Conference on World Wide Web, pp. 639–648 (2007)
Metadaten
Titel
IntelliTweet: A Multifaceted Feature Approach to Detect Malicious Tweets
verfasst von
Eric Edem Dzeha
Guy-Vincent Jourdan
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-57537-2_10

Premium Partner