Fake Profile Identification in Social Network

Authors(3) :-Santosh Kumar Mehta, L.N. Padhy, Rajesh Kumar Gupta

In present generation, the social life of everyone has become associated with the social networking Sites. The time spent on sites like Facebook or LinkedIn is constantly increasing at an impressive rate. At the same time, users populate their online profile with lots of information that aims at providing a complete representation of themselves. But with their rapid growth, it creates many problems like fake profiles, online impersonation. Fake account means malicious users of social networks to send spam, commit fraud. A single malicious actor may create thousands of fake accounts in order to scale their operation to reach the maximum number of legitimate members. In this paper focus is made on social networks for detection of fake profile. An attempt has been made to analysis various existing techniques that include comparison in perspective of various applications mapping various performance parameters.

Authors and Affiliations

Santosh Kumar Mehta
Department of CSE, Konark Institute of Science and Technology, Bhubaneswar, Odisha, India
L.N. Padhy
Department of CSE, Konark Institute of Science and Technology, Bhubaneswar, Odisha, India
Rajesh Kumar Gupta
Department of CSE, Konark Institute of Science and Technology, Bhubaneswar, Odisha, India

Online Social Networks (OSN), Facebook Immune System (FIS), phishing, Social Networking Sites (SNS).

  1. T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS, volume 11, page 8, 2011.
  2. A. Wang. Detecting spam bots in online social networking sites: a machine learning approach. Data and Applications Security and Privacy XXIV, pages 335-342, 2010.
  3. C. Wagner, S. Mitter, C. K'orner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW, volume 12, 2012.
  4. G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network pro?le cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295-300. IEEE, 2011.
  5. S. Krasser, Y. Tang, J. Gould, D. Alperovitch, and P. Judge. Identifying image spam based on header and ?le properties using c4. 5 decision trees and support vector machine learning. In Information Assurance and Security Workshop, 2007. IAW'07. IEEE SMC, pages 255-261. IEEE, 2007
  6. H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B.Y. Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement, pages 35-47. ACM, 2010.
  7. Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. Who is tweeting on twitter: human, bot, or cyborg? In Proceedings of the 26th Annual Computer Security Applications Conference, pages 21-30. ACM, 2010.
  8. S. Krasser, Y. Tang, J. Gould, D. Alperovitch, and P. Judge. Identifying image spam based on header and ?le properties using c4. 5 decision trees and support vector machine learning. In Information Assurance and Security Workshop, 2007. IAW'07. IEEE SMC, pages 255-261. IEEE, 2007.
  9. G.K. Gupta. Introduction to Data Mining with Case Studies. Prentice Hall India, 2008.
  10. Rajan Chattamvelli. Data Mining Methods. Narosa, 2010.
  11. Spies create fake facebook account in nato chief's name to steal personal details, http://in. news.yahoo.com/spies-create-fake-facebook-account-nato-chiefs-name-114824955. html.
  12. Man arrested for uploading obscene images of woman colleague, http://www.ndtv.com/ article/andhra-pradesh/man-arrested-for-uploading-obscene-images-of-woman-colleague-173266.
  13. Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93-102. ACM, 2011.
  14. S. Nagaraja, A. Houmansadr, P. Piyawongwisal, V. Singh, P. Agarwal, and N. Borisov. Stegobot: A covert social network botnet. In Information Hiding, pages 299-313. Springer, 2011.
  15. M. Huber, M. Mulazzani, and E. Weippl. Who on earth is mr. cypher: Automated friend injection attacks on social networking sites. Security and Privacy-Silver Linings in the Cloud, pages 80-89, 2016.
  16. T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS, volume 11, page 8, 2011.
  17. Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93-102. ACM, 2011.
  18. C. Wagner, S. Mitter, C. K'orner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW, volume 12, 2012.
  19. G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network pro?le cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295-300. IEEE, 2011.
  20. A. Wang. Detecting spam bots in online social networking sites: a machine learning approach. Data and Applications Security and Privacy XXIV, pages 335-342, 2010.
  21. H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B.Y. Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement, pages 35-47. ACM, 2010.
  22. Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. Who is tweeting on twitter: human, bot, or cyborg? In Proceedings of the 26th Annual Computer Security Applications Conference, pages 21-30. ACM

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 733-737
Manuscript Number : CSEIT1724179
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Santosh Kumar Mehta, L.N. Padhy, Rajesh Kumar Gupta, "Fake Profile Identification in Social Network", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.733-737, July-August-2017.
Journal URL : http://ijsrcseit.com/CSEIT1724179

Article Preview

Follow Us

Contact Us