SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 313
Design and Development of a System for Predicting
Threats using Data Science
Gaurav Tripathi1, Gaurav Rai2, Sunny Singh3
1,2,3Department of Computer Engineering, T.C.E.T, Mumbai
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Impact of Social Media on a human being is more
severe and dangerous rather than their enemy as we are
living in a world where social media is the second most
essential part of our life, like with food and water humans
cannot live, same can be said about the social media as it
connects people who are living far away to those who are
close to you. So making social media safe heaven is a
difficult job but at-least taking a measure can be done
before any chaos takes place due to social media activity
could be done. As social media isn't bound by any
boundaries of countries and government rules even
sometimes international rules are also not enough to handle
the threats, the government has many systems but not as
integrated one to handle the public level threats which had
already taken place in countries like India. The main aim of
this research is to utilize natural language processing, data
analytics, big data, machine learning ideas for the
acknowledgement of upcoming threats and prediction of
social media threats dependent on the real-time scenarios.
Here in this paper, unsupervised natural language
processing is applied to social media data, with a reason to
predict, identify the people and source, responsible for
spreading threats.
Key Words: Social media threats analysis, Threat
prediction of social media, Natural Language
Processing, Machine Learning, Data Analytics, Big
Data, Convolutional Neural Network
1. INTRODUCTION
Over the last few years, online communication has moved
toward social-driven technologies, like social media
networks such as WhatsApp, Facebook, Instagram,
Twitter and other social media platforms such as blogging
websites, YouTube Videos, online virtual communities,
and online petition platforms such as change.org, etc.
These social technologies have started a revolution in
user-generated data, online global communities, and rich
human behavior-related content. Understanding human
preferences are important to the development of
applications and platforms for predicting threats from
social media data using data science. This paper discusses
the role of social media data to understand the behavior of
humans regarding their online activity based on data.
With the advancement in the latest technology about
sentiment analysis and predictive analytics, it has opened
many avenues for researchers and enterprises to
understand the human mental state and their social
behavior in a better way. The proposed challenge is to
predict people's activities on social media, to help in
eliminating and reducing the percentage of any incident
(Stampede, Mob-lynching, etc.) before it’s occurring.
There are several existing systems which are currently
used by the government of India they are listed as
NETRA(Network Traffic Analysis System), CCTNS(Crime
and Criminal Tracking & Networks System), Social Media
Labs and where NETRA is most effective nowadays as it is
used by intelligence bureau, India's domestic intelligence
agency and research & analysis wing(RAW) as NETRA
can analyze voice traffic passing through several social
media platforms and can intercept messages with such
keyword like 'attack', 'bomb', 'kill' in real-time system
from the enormous amount of tweets, status updates,
blogs, forums.
The purpose is to aim at making use of unsupervised
natural language processing and machine learning
algorithms (Clustering, Linear and Logistic regression)
and data science (Data Pre-processing, Big Data, hybrid
algorithm) in interpreting Social Web Data of various
platforms like Facebook, Twitter, Google trends and other
various sources. Start from fetching trending keyword
from various social media platform and categorizing into
single format and with the help of ensembling of clustering
algorithm and using natural language processing to label
the unstructured text for meaning and later on predict
the sentiment of trending topic based on user's data &
using that data our application will predict the threat level
in three categories high, moderate & low region wise.
Social Media Analysis will be monitoring, collecting,
and analyzing the data of a Facebook page (posts,
comments, likes, shares) and a Twitter profile (tweets,
re-tweets, mentions, and public tweets containing
one/two keywords only) and from other various sources
for predicting the future or upcoming threats by taking
each and every social media platforms data and
categorizing them into six categories such as Toxic, Severe
Toxic, Obscene, Insult, Threat, Identity Hate to predict the
threat and toxicity level of that particular trending topic.
2. RELATED WORK
In the section below, the approach used has been
discussed in detail.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 314
2.1 Overview
So nowadays there are many tools and technology
available in the market which can be used to analyze the
social media data but most of it are using for marketing
purpose that too even are not cost-effective, with the
advances in technology about sentiment analysis and
predictive analytics, it has opened many avenues for
researchers and enterprises to understand the human
mental state better. The proposed challenge is to predict
people's activities on social media, to help in eliminating
and reducing the percentage of any incident before it
occurs. The purpose is aimed at making use
unsupervised natural language processing and machine
learning algorithms (Clustering, Linear and Logistic
regression) and data science (Data Pre-processing, Big
Data, hybrid algorithm) in interpreting Social Web Data of
various platforms like Facebook, Twitter, Google trends
and other various sources of machine learning algorithms
(Clustering, Linear and Logistic regression) and data
science (Data Pre-processing, Big Data) in interpreting
Social Web Data of various platforms like Facebook,
Twitter, Google trends and other various sources. Social
Media Analysis will be monitoring, collecting, and
analyzing the data of a Facebook page (posts, comments,
likes, shares) and a Twitter profile (tweets, retweets,
mentions, and public tweets containing one/two
keywords only) and from other various sources for
predicting the future or upcoming threats.
2.2 Algorithm
NLTK Classifier- NLTK Classifier to predict the sentiment
of the comments and tweets that are either positive or
negative by using a corpus dataset to cluster the data into
categories.
Deep Learning Unsupervised Threat Classification
algorithm using CNN and Word2vec.
CNN is a class of deep, feed-forward artificial neural
networks (where connections between nodes do not form
a cycle) & use a variation of multilayer perceptrons
designed to require minimal preprocessing.
Word2vec - is a group of related models that are used to
produce word embeddings. These models are shallow,
two-layer neural networks that are trained to reconstruct
linguistic contexts of words.
Pytrends is a library which is a substitute to google trends
library for python to extract the data from google,youtube,
images for trending topics and past information related
data which were searched on google.
Fig I. Architecture
Fig II. Flowchart
2.3 Application
1. To predict the Real-time threat which is trending
on social media in terms of the hashtag.
2. Individually track a detailed review of a person
what kind of tweets and comments they usually
do.
3. Streaming Real-time data from various sources
and analyzing them for predicting the threat.
4. Real-time classification of threat in terms of low
severe high depend on the threshold and
population of the region
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 315
5. Region-wise classification of hashtags and tweets
and further analyzing the particular hashtag to
predict what kind of tweets are trending.
2.4 Expected Outcome
This project upon completion of full functionalities by
having access to all social media platforms will easily
predict the threat, fake news and categorizing the trending
hashtag in terms of obscene, toxic, severe toxic, threat,
identity hate, insult by analyzing every comments and
tweet based on the region, this might help to categorize
the trending hashtag or any trending topic whether they
are worthy of sharing, re-tweets, comments, etc. A simple
GUI will help to display the real-time threat analysis by
streaming data from various social media platforms to
check the threat level based on the region in three
categories low, moderate and severe based on the
population of that region.
3. METHODOLOGY
After the methodology being retrieving user’s data from
various social media platforms in structured/unstructured
format most probably in JSON format using the APIs
provided by these platforms. The extracted data is then
cleaned and filtered for our specific requirements. The
data then basically streamed to the client-side application
using the SPARK Streaming and Socket Stream program
with the help of Flask. Flask is a lightweight WSGI web
application framework. It is designed to make getting
started quick and easy, with the ability to scale up to
complex applications. It began as a simple wrapper around
Werkzeug and Jinja and has become one of the most
popular Python web application frameworks. The main
methodology for Threat Analysis is the Deep learning NLP
Classification Unsupervised model using convolution 2D
CNN for text classification method is used to train the
dataset. And using NLTK Corpus data for sentiment
analysis for the range of sentiments of people in terms of
positive and negative statements. Every threat is classified
in three categories low, moderate and severe based on
classification of every tweet and comments into several
terms like Toxic, Severe Toxic, Obscene, Insult, Threat,
Identity Hate and by counting these and every trending
can be tagged whether it is considered to re-tweet, repost,
and comment.
4. TESTING ENVIRONMENT
In our research, we focus on a collection of data from
various social media platforms such as Facebook, Twitter,
and various other sources. In comparison with previous
work, this paper focuses on more integrated retrieval of
data and real-time analytics and prediction on the
streaming data in a batch.
At first, the subject of this paper is the detection of
hashtags, comments, trending topics on several social
media platforms and posts which are posing threats in
terms of "toxic", "insult", "identity hate", "obscene",
"threat", “identity hate” to society in realtime .
Secondarily, in this paper, we utilized the 30% dataset of
toxic comment challenge and which were published on
Kaggle and 70% of data from various other platforms by
categorizing them individually into threat category of
several languages as every state in india has different
context of writing the text, to identify the above-
mentioned terms of the comments, posts, and tweets this
may help us to achieve and identify the hashtags, trending
topics and post which are posing threat on individual,
society, and business in real-time.
5. CONCLUSIONS
Threat Analysis of Social Media Data of various platforms
will be helpful to society as social media is the second
most important aspect of human being so making it safe is
a difficult task but somehow a particular security and
safety in terms of security measures can be provided by
achieving certain terms like trending hashtags, trending
topics in terms of particular categories such as toxic,
severe toxic, obscene, insult, threat, identity hate which
could prevent users from commenting, tweeting, re-
tweeting, reposting so many of the threats can be avoided
just by tagging them as these will be implemented region-
wise if it makes easier, efficient and using real-time
prediction it can become one of the most accurate,
efficient and effective ways to provide security to society
and help reinforcement departments of countries and help
people to understand the perspective and objective of
trollers, criminals, fake news agencies and political
interferences. This project provides a simple GUI which
makes it easier to predict and analyze the threat of various
platforms individually and predict the threat as well. This
system is an integrated, real-time data processing of
various social media platforms in an efficient way to detect
the threats which are posed by social media.
ACKNOWLEDGEMENT
We wish to express sincere thanks to Mr. Vijay Jain and Dr.
Anand Khandare for helping in our research and our
Computer Engineering department for arranging such a
platform. so that we can research all about Social Media
Analytics from several platforms. We also extend our
heartfelt thanks to our colleagues, family members, and
well-wishers.
REFERENCES
[1] Michael Fire, Roy Goldschmidt, and Yuval Elovici
2014. Online Social Networks: Threats and
Solutions(2014)
[2] Jennifer Golbeck, Zahra Ashktorab, Rashad O. Banjo,
Alexandra Berlinger, Siddharth Bhagwan( 2017, A
Large Human-Labeled Corpus for Online Harassment
Research(2017).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 316
[3] Miltiadis Kandias, Vasilis Stavrou, Nick Bozovic,
Dimitris Gritzalis 2013.Proactive Insider Threat
Detection Through Social Media: The YouTube Case
(2013)
[4] Racha Ajami, Noha Ramadan, Nader Mohamed,
Jameela Al-Jaroodi( Security Challenges and
Approaches in Online Social Networks 2011)
[5] Yakshi Sharma Dept of I.T, U.I.E.T Panjab University,
Chandigarh, 160014 India Veenu Mangat2015.
Mandeep Kaur practical approach to Sentiment
Analysis of Hindi tweets(2015)
[6] Aristidis G. Vrahatis, Sotiris K. Tasoulis, Vassilis P.
Plagianakos, Aristidis G. Vrahatis 2018.Convolutional
Neural Networks for Toxic Comment Classification
(2018)
[7] Weimin Luo, Jingbo Liu, Jing Liu 2009.An Analysis of
Security in Social Networks (2009)
[8] Soumya.T.R, S. Revathy 2018. Survey on Threats in
Online Social Media (2018)
[9] Yojana Goyal, Anand Sharma 2019. A Semantic
Approach for Cyber Threat Prediction Using Machine
Learning(2019)
[10] Anni Sapountzi, Kostas E. Psannis (Social Networking
Data Analysis Tools & Challenges 2016)
[11] Harri Jalonen (Negative emotions in social media as a
managerial challenge 2014)
[12] Natalya (Natalie) Bazarova, Yoon Hyung Choi, Victoria
Schwanda Sosik, Dan Cosley (Social Sharing of
Emotions on Facebook 2015)

Contenu connexe

Tendances

Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
FACE
 
Sentiment analysis using machine learning and deep Learning
Sentiment analysis using machine learning and deep LearningSentiment analysis using machine learning and deep Learning
Sentiment analysis using machine learning and deep Learning
Venkat Projects
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
CSCJournals
 
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFaces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
FACE
 

Tendances (20)

IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
 
IRJET- Smartphone Sensor based Security Questions and Location
IRJET- Smartphone Sensor based Security Questions and LocationIRJET- Smartphone Sensor based Security Questions and Location
IRJET- Smartphone Sensor based Security Questions and Location
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
 
Usability Review of Mashup Tools
Usability Review of Mashup ToolsUsability Review of Mashup Tools
Usability Review of Mashup Tools
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
 
Sentiment analysis using machine learning and deep Learning
Sentiment analysis using machine learning and deep LearningSentiment analysis using machine learning and deep Learning
Sentiment analysis using machine learning and deep Learning
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
 
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFaces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
 
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET-  	  Autobiographical Fallback Authentication using SmartphonesIRJET-  	  Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using Smartphones
 

Similaire à IRJET- Design and Development of a System for Predicting Threats using Data Science

Similaire à IRJET- Design and Development of a System for Predicting Threats using Data Science (20)

Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
IRJET- Sentiment Analysis of Twitter Data using Python
IRJET-  	  Sentiment Analysis of Twitter Data using PythonIRJET-  	  Sentiment Analysis of Twitter Data using Python
IRJET- Sentiment Analysis of Twitter Data using Python
 
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
 
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET -  	  Sentiment Analysis of Posts and Comments of OSNIRJET -  	  Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
 
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELAGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
 
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
 
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
Emotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine LearningEmotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine Learning
 
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
 
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
 

Plus de IRJET Journal

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Dernier (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 

IRJET- Design and Development of a System for Predicting Threats using Data Science

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 313 Design and Development of a System for Predicting Threats using Data Science Gaurav Tripathi1, Gaurav Rai2, Sunny Singh3 1,2,3Department of Computer Engineering, T.C.E.T, Mumbai ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Impact of Social Media on a human being is more severe and dangerous rather than their enemy as we are living in a world where social media is the second most essential part of our life, like with food and water humans cannot live, same can be said about the social media as it connects people who are living far away to those who are close to you. So making social media safe heaven is a difficult job but at-least taking a measure can be done before any chaos takes place due to social media activity could be done. As social media isn't bound by any boundaries of countries and government rules even sometimes international rules are also not enough to handle the threats, the government has many systems but not as integrated one to handle the public level threats which had already taken place in countries like India. The main aim of this research is to utilize natural language processing, data analytics, big data, machine learning ideas for the acknowledgement of upcoming threats and prediction of social media threats dependent on the real-time scenarios. Here in this paper, unsupervised natural language processing is applied to social media data, with a reason to predict, identify the people and source, responsible for spreading threats. Key Words: Social media threats analysis, Threat prediction of social media, Natural Language Processing, Machine Learning, Data Analytics, Big Data, Convolutional Neural Network 1. INTRODUCTION Over the last few years, online communication has moved toward social-driven technologies, like social media networks such as WhatsApp, Facebook, Instagram, Twitter and other social media platforms such as blogging websites, YouTube Videos, online virtual communities, and online petition platforms such as change.org, etc. These social technologies have started a revolution in user-generated data, online global communities, and rich human behavior-related content. Understanding human preferences are important to the development of applications and platforms for predicting threats from social media data using data science. This paper discusses the role of social media data to understand the behavior of humans regarding their online activity based on data. With the advancement in the latest technology about sentiment analysis and predictive analytics, it has opened many avenues for researchers and enterprises to understand the human mental state and their social behavior in a better way. The proposed challenge is to predict people's activities on social media, to help in eliminating and reducing the percentage of any incident (Stampede, Mob-lynching, etc.) before it’s occurring. There are several existing systems which are currently used by the government of India they are listed as NETRA(Network Traffic Analysis System), CCTNS(Crime and Criminal Tracking & Networks System), Social Media Labs and where NETRA is most effective nowadays as it is used by intelligence bureau, India's domestic intelligence agency and research & analysis wing(RAW) as NETRA can analyze voice traffic passing through several social media platforms and can intercept messages with such keyword like 'attack', 'bomb', 'kill' in real-time system from the enormous amount of tweets, status updates, blogs, forums. The purpose is to aim at making use of unsupervised natural language processing and machine learning algorithms (Clustering, Linear and Logistic regression) and data science (Data Pre-processing, Big Data, hybrid algorithm) in interpreting Social Web Data of various platforms like Facebook, Twitter, Google trends and other various sources. Start from fetching trending keyword from various social media platform and categorizing into single format and with the help of ensembling of clustering algorithm and using natural language processing to label the unstructured text for meaning and later on predict the sentiment of trending topic based on user's data & using that data our application will predict the threat level in three categories high, moderate & low region wise. Social Media Analysis will be monitoring, collecting, and analyzing the data of a Facebook page (posts, comments, likes, shares) and a Twitter profile (tweets, re-tweets, mentions, and public tweets containing one/two keywords only) and from other various sources for predicting the future or upcoming threats by taking each and every social media platforms data and categorizing them into six categories such as Toxic, Severe Toxic, Obscene, Insult, Threat, Identity Hate to predict the threat and toxicity level of that particular trending topic. 2. RELATED WORK In the section below, the approach used has been discussed in detail.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 314 2.1 Overview So nowadays there are many tools and technology available in the market which can be used to analyze the social media data but most of it are using for marketing purpose that too even are not cost-effective, with the advances in technology about sentiment analysis and predictive analytics, it has opened many avenues for researchers and enterprises to understand the human mental state better. The proposed challenge is to predict people's activities on social media, to help in eliminating and reducing the percentage of any incident before it occurs. The purpose is aimed at making use unsupervised natural language processing and machine learning algorithms (Clustering, Linear and Logistic regression) and data science (Data Pre-processing, Big Data, hybrid algorithm) in interpreting Social Web Data of various platforms like Facebook, Twitter, Google trends and other various sources of machine learning algorithms (Clustering, Linear and Logistic regression) and data science (Data Pre-processing, Big Data) in interpreting Social Web Data of various platforms like Facebook, Twitter, Google trends and other various sources. Social Media Analysis will be monitoring, collecting, and analyzing the data of a Facebook page (posts, comments, likes, shares) and a Twitter profile (tweets, retweets, mentions, and public tweets containing one/two keywords only) and from other various sources for predicting the future or upcoming threats. 2.2 Algorithm NLTK Classifier- NLTK Classifier to predict the sentiment of the comments and tweets that are either positive or negative by using a corpus dataset to cluster the data into categories. Deep Learning Unsupervised Threat Classification algorithm using CNN and Word2vec. CNN is a class of deep, feed-forward artificial neural networks (where connections between nodes do not form a cycle) & use a variation of multilayer perceptrons designed to require minimal preprocessing. Word2vec - is a group of related models that are used to produce word embeddings. These models are shallow, two-layer neural networks that are trained to reconstruct linguistic contexts of words. Pytrends is a library which is a substitute to google trends library for python to extract the data from google,youtube, images for trending topics and past information related data which were searched on google. Fig I. Architecture Fig II. Flowchart 2.3 Application 1. To predict the Real-time threat which is trending on social media in terms of the hashtag. 2. Individually track a detailed review of a person what kind of tweets and comments they usually do. 3. Streaming Real-time data from various sources and analyzing them for predicting the threat. 4. Real-time classification of threat in terms of low severe high depend on the threshold and population of the region
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 315 5. Region-wise classification of hashtags and tweets and further analyzing the particular hashtag to predict what kind of tweets are trending. 2.4 Expected Outcome This project upon completion of full functionalities by having access to all social media platforms will easily predict the threat, fake news and categorizing the trending hashtag in terms of obscene, toxic, severe toxic, threat, identity hate, insult by analyzing every comments and tweet based on the region, this might help to categorize the trending hashtag or any trending topic whether they are worthy of sharing, re-tweets, comments, etc. A simple GUI will help to display the real-time threat analysis by streaming data from various social media platforms to check the threat level based on the region in three categories low, moderate and severe based on the population of that region. 3. METHODOLOGY After the methodology being retrieving user’s data from various social media platforms in structured/unstructured format most probably in JSON format using the APIs provided by these platforms. The extracted data is then cleaned and filtered for our specific requirements. The data then basically streamed to the client-side application using the SPARK Streaming and Socket Stream program with the help of Flask. Flask is a lightweight WSGI web application framework. It is designed to make getting started quick and easy, with the ability to scale up to complex applications. It began as a simple wrapper around Werkzeug and Jinja and has become one of the most popular Python web application frameworks. The main methodology for Threat Analysis is the Deep learning NLP Classification Unsupervised model using convolution 2D CNN for text classification method is used to train the dataset. And using NLTK Corpus data for sentiment analysis for the range of sentiments of people in terms of positive and negative statements. Every threat is classified in three categories low, moderate and severe based on classification of every tweet and comments into several terms like Toxic, Severe Toxic, Obscene, Insult, Threat, Identity Hate and by counting these and every trending can be tagged whether it is considered to re-tweet, repost, and comment. 4. TESTING ENVIRONMENT In our research, we focus on a collection of data from various social media platforms such as Facebook, Twitter, and various other sources. In comparison with previous work, this paper focuses on more integrated retrieval of data and real-time analytics and prediction on the streaming data in a batch. At first, the subject of this paper is the detection of hashtags, comments, trending topics on several social media platforms and posts which are posing threats in terms of "toxic", "insult", "identity hate", "obscene", "threat", “identity hate” to society in realtime . Secondarily, in this paper, we utilized the 30% dataset of toxic comment challenge and which were published on Kaggle and 70% of data from various other platforms by categorizing them individually into threat category of several languages as every state in india has different context of writing the text, to identify the above- mentioned terms of the comments, posts, and tweets this may help us to achieve and identify the hashtags, trending topics and post which are posing threat on individual, society, and business in real-time. 5. CONCLUSIONS Threat Analysis of Social Media Data of various platforms will be helpful to society as social media is the second most important aspect of human being so making it safe is a difficult task but somehow a particular security and safety in terms of security measures can be provided by achieving certain terms like trending hashtags, trending topics in terms of particular categories such as toxic, severe toxic, obscene, insult, threat, identity hate which could prevent users from commenting, tweeting, re- tweeting, reposting so many of the threats can be avoided just by tagging them as these will be implemented region- wise if it makes easier, efficient and using real-time prediction it can become one of the most accurate, efficient and effective ways to provide security to society and help reinforcement departments of countries and help people to understand the perspective and objective of trollers, criminals, fake news agencies and political interferences. This project provides a simple GUI which makes it easier to predict and analyze the threat of various platforms individually and predict the threat as well. This system is an integrated, real-time data processing of various social media platforms in an efficient way to detect the threats which are posed by social media. ACKNOWLEDGEMENT We wish to express sincere thanks to Mr. Vijay Jain and Dr. Anand Khandare for helping in our research and our Computer Engineering department for arranging such a platform. so that we can research all about Social Media Analytics from several platforms. We also extend our heartfelt thanks to our colleagues, family members, and well-wishers. REFERENCES [1] Michael Fire, Roy Goldschmidt, and Yuval Elovici 2014. Online Social Networks: Threats and Solutions(2014) [2] Jennifer Golbeck, Zahra Ashktorab, Rashad O. Banjo, Alexandra Berlinger, Siddharth Bhagwan( 2017, A Large Human-Labeled Corpus for Online Harassment Research(2017).
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 316 [3] Miltiadis Kandias, Vasilis Stavrou, Nick Bozovic, Dimitris Gritzalis 2013.Proactive Insider Threat Detection Through Social Media: The YouTube Case (2013) [4] Racha Ajami, Noha Ramadan, Nader Mohamed, Jameela Al-Jaroodi( Security Challenges and Approaches in Online Social Networks 2011) [5] Yakshi Sharma Dept of I.T, U.I.E.T Panjab University, Chandigarh, 160014 India Veenu Mangat2015. Mandeep Kaur practical approach to Sentiment Analysis of Hindi tweets(2015) [6] Aristidis G. Vrahatis, Sotiris K. Tasoulis, Vassilis P. Plagianakos, Aristidis G. Vrahatis 2018.Convolutional Neural Networks for Toxic Comment Classification (2018) [7] Weimin Luo, Jingbo Liu, Jing Liu 2009.An Analysis of Security in Social Networks (2009) [8] Soumya.T.R, S. Revathy 2018. Survey on Threats in Online Social Media (2018) [9] Yojana Goyal, Anand Sharma 2019. A Semantic Approach for Cyber Threat Prediction Using Machine Learning(2019) [10] Anni Sapountzi, Kostas E. Psannis (Social Networking Data Analysis Tools & Challenges 2016) [11] Harri Jalonen (Negative emotions in social media as a managerial challenge 2014) [12] Natalya (Natalie) Bazarova, Yoon Hyung Choi, Victoria Schwanda Sosik, Dan Cosley (Social Sharing of Emotions on Facebook 2015)