Content Filtering on Social Networking Sites with Fuzzy Logic

G. N. Purohit, Priti Singh, Praveen Dangi

Abstract


Social Networking Sites (SNSs) provide an online platform that is used by people to build social networks or social relations with other people. Many users are not aware of the hidden threats to privacy that exist while using these SNSs. There has been a growing concern regarding these threats in general and among researchers in particular. The present study is a novel attempt to devise a measure to overcome these threatsusing fuzzy logic and IDPS(Intrusion Detection and Prevention System).This study is helpful in achieving twin objectives-(i)  establishing through survey and fuzzy logic, that people are aware of the potential threats in using SNSs and (ii)  helping them in securing their accounts by using the IDPS technique. Thus, it is hoped that the current study will be useful to society at large in providing more secure social networking sites.

Full Text:

PDF

References


Adikari,S; Dutta,K[2014].Identifying Fake Profiles in Linkedin,18th Pacific Asia Conference on Information Systems ,Chengdu, China, Vol. 18, Issue No. 11,pp. 1516-1528.

Aldhafferi,N; Watson ,C[2013].Personal Information Privacy settings of online social networks and their suitability for Mobile Internet devices, International Journal of Security, Privacy and Trust Management ( IJSPTM) ,Vol. 2,Issue No. 3,pp. 2277 – 5498.

Casillas,J;Herrera, [2003].Interpretability issues in fuzzy modelling, Studies in Fuzziness and Soft Computing. Springer, Vol. 128,pp. 3-22.

Dahiya,V; Sajja,P[2012]. Designing of Fuzzy rule base for Vision Defects, ,Int.J.Computer Technology & Applications ,Vol 3,Issue No.2, pp. 734-737.

Denning, D.E.[1987].An Intrusion Detection Model, IEEE Trans. Software Eng., Vol.13,Issue No. 2, pp. 222–232.

Dhami, A; Agarwal, N. [2013].Impact o trust, security and privacy concerns in social networking, Advance Computing Conference (IACC ) IEEE 3rd International, pp. 465 – 469.

Fusco,S.J.; Abbas,R,[2012]. Location-based social networking: impact on trust in relationships. IEEE Technology and Society Magazine, Vol. 31, Issue No 2, pp. 39-50.

Heberlein; Dias,L .T. [1990]. A network security monitor. In proceedings of the IEEE Synopsium on research in security and privacy, Vol. 8, Issue No.3,pp. 296-304.

Ko, M.N. ;Cheek,G.P [2010].Social Network Connect Services, IEEE Computer Society, Vol. 43, Issue No.8, pp. 37-43.

Li,N ; Chen,G [2010].Analysis of a Location-based Social Network, IEEE Network, Vol. 24 , Issue No. 5 , pp. 20-25.

Sajja ,P.S[2008]. Fuzzy artificial neural network decision support system for course selection, Journal of Engineering and Technology, Vol.2, Issue No.2, pp.96-102.




DOI: https://doi.org/10.23956/ijarcsse/V7I6/0264

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.