{"title":"Bi-LSTM Neural Network Approach to Detect and Recognize Cyberthreats, Cyberstalking and Extremist Tweets in Twitter","authors":"A. K, R. O, J. D, S. S","doi":"10.1109/ICAAIC56838.2023.10140281","DOIUrl":null,"url":null,"abstract":"Phishing attacks, in which victims are handed dangerous URLs, are among the cyberthreats. When you engage with these sites, a process of credential stealing begins. Furthermore, there has been an increase in the transmission of terrorist and extremist tweets, as well as cyberstalking operations, in recent days. As technology advances this can be addressed with machine learning approaches and artificial intelligence by developing models and conducting automated tweet identification. Cyberthreats, cyberstalking, and extremist comments are anticipated using this live algorithm. The dataset obtained from Kaggle is given as input to the model and are trained using the Bi-LSTM method based on a twitter dataset. The algorithm has outstanding performance scores, with a total accuracy of 93% and F1 score of 95%.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAAIC56838.2023.10140281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Phishing attacks, in which victims are handed dangerous URLs, are among the cyberthreats. When you engage with these sites, a process of credential stealing begins. Furthermore, there has been an increase in the transmission of terrorist and extremist tweets, as well as cyberstalking operations, in recent days. As technology advances this can be addressed with machine learning approaches and artificial intelligence by developing models and conducting automated tweet identification. Cyberthreats, cyberstalking, and extremist comments are anticipated using this live algorithm. The dataset obtained from Kaggle is given as input to the model and are trained using the Bi-LSTM method based on a twitter dataset. The algorithm has outstanding performance scores, with a total accuracy of 93% and F1 score of 95%.