CPSC-8985-01 FALL 2015TEAM P6 Real-time Detection System for Suspicious URLs Submitted by T.ANUPCHANDRA V.KRANTHI SUDHA CH.KRISHNAPRASAD Under Guidance.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Fast and Precise In-Browser JavaScript Malware Detection
Design and Evaluation of a Real-Time URL Spam Filtering Service
VOCAL System Requirements and Scalability. System Recommendations The recommended hardware system to support the VOCAL system is: 700 MHz, Pentium III.
Design and Evaluation of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song University of California,
On the Node Clone Detection inWireless Sensor Networks.
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Annotating Search Results from Web Databases. Abstract An increasing number of databases have become web accessible through HTML form-based search interfaces.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Personalized QoS-Aware Web Service Recommendation and Visualization.
Abstract Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Discovering Emerging Topics in Social Streams via Link Anomaly Detection.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Crowdsourcing Predictors of Behavioral Outcomes. Abstract Generating models from large data sets—and deter¬mining which subsets of data to mine—is becoming.
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Understanding the External Links of Video Sharing Sites: Measurement and Analysis.
Security Evaluation of Pattern Classifiers under Attack.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
Incentive Based Data Sharing in Delay Tolerant Mobile Networks.
m-Privacy for Collaborative Data Publishing
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development.
EAACK—A Secure Intrusion-Detection System for MANETs
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.
Optimal Client-Server Assignment for Internet Distributed Systems.
Protecting Sensitive Labels in Social Network Data Anonymization.
Identity-Based Secure Distributed Data Storage Schemes.
MOBILITY BILL DEFRAYMENT
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Anonymization of Centralized and Distributed Social Networks by Sequential Clustering.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing.
A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Member 1Member 2Member 3Member 4. Agenda Introduction Current Scenario Proposed Solution Block Diagram Technical Implementation Hardware & Software Requirements.
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia.
Keyword Query Routing.
Facilitating Document Annotation using Content and Querying Value.
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Preventing Private Information Inference Attacks on Social Networks.
DTRAB Combating Against Attacks on Encrypted Protocols through Traffic- Feature Analysis.
Trends in Circumventing Web-Malware Detection UTSA Moheeb Abu Rajab, Lucas Ballard, Nav Jagpal, Panayiotis Mavrommatis, Daisuke Nojiri, Niels Provos, Ludwig.
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks.
Twitsper: Tweeting Privately. Abstract Although online social networks provide some form of privacy controls to protect a user's shared content from other.
m-Privacy for Collaborative Data Publishing
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Multiparty Access Control for Online Social Networks : Model and Mechanisms.
A New Algorithm for Inferring User Search Goals with Feedback Sessions.
Privacy-Preserving and Content-Protecting Location Based Queries.
Energy-Efficient Protocol for Cooperative Networks.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Facilitating Document Annotation Using Content and Querying Value.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
CODERS ADJUNCTION POINT Presented by, Rumana Ahmed Deeba Tazeen CSE final year.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
GRADUATE SEMINAR – CPSC 8985 FUTURE SMS BY Suresh Kurapati Varun Chowdhary Enjum Umakanth Vellanki Under the guidance of Dr. Soon-Ok-Park.
Dynamic Query Forms for Database Queries. Abstract Modern scientific databases and web databases maintain large and heterogeneous data. These real-world.
S URVIVABILITY A NALYSIS OF AD HOC NETWORK UNDER ATTACK Project Members S.Karthiga G.Asha J.Anusha Guided By Mrs. P.Prittopaul.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
BY S.S.SUDHEER VARMA (13NT1D5816)
Uncovering Social Spammers: Social Honeypots + Machine Learning
Social Media Attacks.
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
Problem Statement To transform the traditional system to automated system(ERP). No centralized control. Low data privacy. Huge amount of human resources.
Presentation transcript:

CPSC FALL 2015TEAM P6 Real-time Detection System for Suspicious URLs Submitted by T.ANUPCHANDRA V.KRANTHI SUDHA CH.KRISHNAPRASAD Under Guidance by Dr. Soon Ok Park

I.Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. II.we propose a Real-Time Detection System for suspicious URL’s in Twitter stream(WARNING BIRD). Our system investigates correlations of URL redirect chains extracted from several tweets. III.We collect numerous tweets from the Twitter public timeline and build a statistical classifier using themWe also present WARNINGBIRD as a near real-time system for classifying suspicious URLs in the Twitter stream.

I.In the existing system attackers use shortened malicious URLs that redirect Twitter users to external attack servers. II.To cope with malicious tweets, several Twitter spam detection schemes have been proposed. These schemes can be classified into account feature-based, relation feature-based, and message feature based schemes. Account feature-based schemes use the distinguishing features of spam accounts such as the ratio of tweets containing URLs, the account creation date, and the number of followers and friends.

I. In this paper, we propose WARNINGBIRD, a suspicious URL detection system for Twitter. Instead of investigating the landing pages of individual URLs in each tweet, which may not be successfully fetched, we considered correlations of URL redirect chains extracted from a number of tweets. II.Because attacker’s resources are generally limited and need to be reused, their URL redirect chains usually share the same URLs

I.We present a new suspicious URL detection system for Twitter that is based on the correlations of URL redirect chains, which are difficult to fabricate. The system can find correlated URL redirect chains using the frequently shared URLs and determine their suspiciousness in almost real time. II.We introduce new features of suspicious URLs: some of which are newly discovered and while others are variations of previously discovered features. III.We present the results of investigations conducted on suspicious URLs that have been widely distributed through Twitter over several months.

Module Data collection Feature extraction Training Classification

SYSTEM ARCHITECTURE

HARDWARE REQUIREMENTS:  System : Any Processor above 500 MHz.  Hard Disk : 40 GB.  Ram : 512 MB.

Language : JDK (1.7.0) Frontend : JSP, Servlets Backend : Oracle11g IDE : my eclipse 8.6 Operating System : windows 2007

Spiral Model

Unified Modeling Language  Use Case Diagram  Sequence Diagram  Collaboration Diagram  State Chat Diagram  Activity Diagram  Component Diagram  Deployment Diagram  Class Diagram  DFD

Use Case Diagram

Sequence Diagram

Collaboration Diagram

State Chat Diagram

Activity Diagram

Component Diagram

Deployment Diagram

ER Diagram

Conventional suspicious URL detection systems are ineffective in their protection against conditional redirection servers that distinguish investigators from normal browsers and redirect them to benign pages to cloak malicious landing pages. In this paper, we proposed a new suspicious URL detection system for Twitter, called WARNINGBIRD. Unlike the conventional systems, WARNINGBIRD is robust when protecting against conditional redirection, because it does not rely on the features of malicious landing pages that may not be reachable. Instead, it focuses on the correlations of multiple redirect chains that share the same redirection servers. real-time system to classify large samples of tweets from the Twitter public timeline.