Published May 26, 2021 | Version v1
Journal article Open

Misreport Detection

  • 1. Student, Computer Engineering, Xavier Institute of Engineering, Mumbai, India
  • 2. Professor, Computer Engineering, Xavier Institute of Engineering, Mumbai, India

Description

Phishing activities on the web are increasing day by day. It’s a bootleg try created by the attackers to steal personal info such as bank account details, login id, passwords, etc. several of the researchers projected to find phishing URLs by extracting options from the content of the net pages. However, variant time and the house are needed for this. This paper presents an associate approach to find phishing computer addresses in associate economical approach supported URL options solely. The projected approach is that classifies URLs mechanically by mistreatment Machine-Learning algorithmic program referred to as logistic regression that's accustomed binary classification. The classifiers achieve 98% accuracy by learning phishing URLs. Recently, malicious news has been acquisition several issues to our society. As a result, several researchers are functioning on characteristic pretend news. Most of the phishing news detection systems utilize the feature of linguistic of the news. However, they need issue in sensing extremely ambiguous pretend news which might be detected solely when characteristic which means and latest connected data. During this paper, to resolve this drawback, we tend to new malicious news detection system mistreatment truth decibel that is constructed and updated by human's direct judgement when assembling obvious facts. Our system receives a proposition and searches the semantically connected articles from truth decibel so as to verify whether or not the given proposition is true or not, by comparison, the proposition with the connected articles indeed decibel.

Files

MisinformationDetection -Formatted Paper.pdf

Files (456.3 kB)

Name Size Download all
md5:79916c2fcfed98eab547ddbb53a7a5c3
456.3 kB Preview Download

Additional details

References

  • Gurajala, S., White, J. S., Hudson, B., Voter, B. R., & Matthews, J. N. (2016). Profile characteristics of fake Twitter accounts. Big Data & Society, 3(2), 2053951716674236.
  • Xiao, C., Freeman, D. M., & Hwa, T. (2015, October). Detecting clusters of fake accounts in online social networks. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security (pp. 91-101).
  • Mainwaring, S. (2011). We first: How brands and consumers use social media to build a better world. St. Martin's Press.
  • Subrahmanian, V. S., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., ... & Menczer, F. (2016). The DARPA Twitter bot challenge. Computer, 49(6), 38-46.
  • Li, Y., Martinez, O., Chen, X., Li, Y., & Hopcroft, J. E. (2016, April). In a world that counts: Clustering and detecting fake social engagement at scale. In Proceedings of the 25th International Conference on World Wide Web (pp. 111-120).
  • Thomas, K., Grier, C., Song, D., & Paxson, V. (2011, November). Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (pp. 243-258).
  • Tuna, T., Akbas, E., Aksoy, A., Canbaz, M. A., Karabiyik, U., Gonen, B., & Aygun, R. (2016). User characterization for online social networks. Social Network Analysis and Mining, 6(1), 1-28.
  • Galán-García, P., Puerta, J. G. D. L., Gómez, C. L., Santos, I., & Bringas, P. G. (2016). Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying. Logic Journal of the IGPL, 24(1), 42-53.
  • Crammer, K., Dredze, M., & Kulesza, A. (2009, August). Multi-class confidence weighted algorithms. In Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing (pp. 496-504).
  • Patil, D. R., & Patil, J. B. (2016). Malicious web pages detection using static analysis of URLs. International Journal of Information Security and Cybercrime, 5(2), 31-50.