Reaction Based Approach to find Malicious Posts in Online Social Networks

Authors

  • khan R Dept. of Computer Science, Shri Ram college of Institute & Technology, RGPV University, Jabalpur, India
  • khurana A Dept. of Computer Science, Shri Ram college of Institute & Technology, RGPV University, Jabalpur, India

Keywords:

Facebook, Netvizz, Gephi, Visualization

Abstract

Social network is a platform of connected peoples where peoples share relation, emotions, activities etc. Second generation social network come in existence with lots of emerging applications, which also support service oriented environment, during all kind of activities massive information is generated. These all information are in the form of post. Hence it is necessary to find category of post. A post may be legitimate or malicious. In this dissertation we are trying to find malicious post on the basis of reaction and share on particular post. All the post collected by facebook through app known as Netvizz. Entire concept implemented in R studio which is an IDE of R programming. Dissertation also contain statistical analysis of page network with the help of well known tool gephi, It is based on predefine parameter such as Eigen vector centrality,closeness ,betweenness etc

References

[1] Broder, A., Glassman, S., Manasse, S., and Zweig, G. "Syntactic clustering of the web." (WWW6’97) (Santa Clara, CA., April). PP 391–404, 1997.

[2] Shivakumar, N. And Garica-Molina, H. "Finding near-duplicates of documents on the web." Web Databases (WebDB’98) (Valencia, Spain, March). PP 204–212,1998.

[3] Heintze, N. "Scalable document fingerprinting." USENIX Electronic Commerce Workshop (Oakland, CA., November). PP 191–200,1996.

[4] Sanderson, M. "Duplicate detection in the Reuters collection." Technical Report of the Department of Computing Science at the University of Glasgow, Glasgow G12 8QQ, UK,1997.

[5] McCain, M., and William C. "Integrating Quality Assurance into the GIS Project Life Cycle", ESRI Users Conference 1998.

[6] Goodchild, M., and Gopal, S. (Eds.), "Accuracy of Spatial Databases", Taylor & Francis, London, ISBN: 0-85066-847-6, 1989.

[7] Scott L., "Identification of GIS Attribute Error Using Exploratory Data Analysis," Professional Geographer 46(3), PP 378.386. 23 FEB 2005.

[8] FGDC Federal Geographic Data Committee, FGDC-STD- 001-1998. "Content standard for digital geospatial metadata (revised June 1998)," Federal Geographic Data Committee, Washington, D.C., 1998.

[9] C. Policroniades and I. Pratt, “Alternatives for Detecting Redundancy in Storage Systems Data,” USENIX Annual Technical Conference, Boston, MA, USA, June 2004.

[10] A. Muthitacharoen, B. Chen, and D. Mazieres, “A Low-bandwidth Network File System,” ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, PP 174-187, Oct. 2001.

[11] P. Kulkarni, F. Douglis, J. LaVoie, J. M. Tracey, “Redundancy Elimination Within Large Collections of Files”, USENIX Annual Technical Conference, Boston, MA, USA, June 2004.

[12] Cooper, James W., Coden, Anni R., Brown, Eric W., "A Novel Method for Detecting Similar Documents", Hawaii International Conference on System Sciences,2004.

Downloads

Published

2025-11-25

How to Cite

[1]
R. khan and A. khurana, “Reaction Based Approach to find Malicious Posts in Online Social Networks”, Int. J. Comp. Sci. Eng., vol. 7, no. 10, pp. 144–148, Nov. 2025.