Fake Profile Identification in Social Network

Authors

  • Santosh Kumar Mehta  Department of CSE, Konark Institute of Science and Technology, Bhubaneswar, Odisha, India
  • L.N. Padhy  Department of CSE, Konark Institute of Science and Technology, Bhubaneswar, Odisha, India
  • Rajesh Kumar Gupta  Department of CSE, Konark Institute of Science and Technology, Bhubaneswar, Odisha, India

Keywords:

Online Social Networks (OSN), Facebook Immune System (FIS), phishing, Social Networking Sites (SNS).

Abstract

In present generation, the social life of everyone has become associated with the social networking Sites. The time spent on sites like Facebook or LinkedIn is constantly increasing at an impressive rate. At the same time, users populate their online profile with lots of information that aims at providing a complete representation of themselves. But with their rapid growth, it creates many problems like fake profiles, online impersonation. Fake account means malicious users of social networks to send spam, commit fraud. A single malicious actor may create thousands of fake accounts in order to scale their operation to reach the maximum number of legitimate members. In this paper focus is made on social networks for detection of fake profile. An attempt has been made to analysis various existing techniques that include comparison in perspective of various applications mapping various performance parameters.

References

  1. T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS, volume 11, page 8, 2011.
  2. A. Wang. Detecting spam bots in online social networking sites: a machine learning approach. Data and Applications Security and Privacy XXIV, pages 335-342, 2010.
  3. C. Wagner, S. Mitter, C. K'orner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW, volume 12, 2012.
  4. G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295-300. IEEE, 2011.
  5. S. Krasser, Y. Tang, J. Gould, D. Alperovitch, and P. Judge. Identifying image spam based on header and file properties using c4. 5 decision trees and support vector machine learning. In Information Assurance and Security Workshop, 2007. IAW'07. IEEE SMC, pages 255-261. IEEE, 2007
  6. H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B.Y. Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement, pages 35-47. ACM, 2010.
  7. Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. Who is tweeting on twitter: human, bot, or cyborg? In Proceedings of the 26th Annual Computer Security Applications Conference, pages 21-30. ACM, 2010.
  8. S. Krasser, Y. Tang, J. Gould, D. Alperovitch, and P. Judge. Identifying image spam based on header and file properties using c4. 5 decision trees and support vector machine learning. In Information Assurance and Security Workshop, 2007. IAW'07. IEEE SMC, pages 255-261. IEEE, 2007.
  9. G.K. Gupta. Introduction to Data Mining with Case Studies. Prentice Hall India, 2008.
  10. Rajan Chattamvelli. Data Mining Methods. Narosa, 2010.
  11. Spies create fake facebook account in nato chief's name to steal personal details, http://in. news.yahoo.com/spies-create-fake-facebook-account-nato-chiefs-name-114824955. html.
  12. Man arrested for uploading obscene images of woman colleague, http://www.ndtv.com/ article/andhra-pradesh/man-arrested-for-uploading-obscene-images-of-woman-colleague-173266.
  13. Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93-102. ACM, 2011.
  14. S. Nagaraja, A. Houmansadr, P. Piyawongwisal, V. Singh, P. Agarwal, and N. Borisov. Stegobot: A covert social network botnet. In Information Hiding, pages 299-313. Springer, 2011.
  15. M. Huber, M. Mulazzani, and E. Weippl. Who on earth is mr. cypher: Automated friend injection attacks on social networking sites. Security and Privacy-Silver Linings in the Cloud, pages 80-89, 2016.
  16. T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS, volume 11, page 8, 2011.
  17. Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93-102. ACM, 2011.
  18. C. Wagner, S. Mitter, C. K'orner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW, volume 12, 2012.
  19. G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295-300. IEEE, 2011.
  20. A. Wang. Detecting spam bots in online social networking sites: a machine learning approach. Data and Applications Security and Privacy XXIV, pages 335-342, 2010.
  21. H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B.Y. Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement, pages 35-47. ACM, 2010.
  22. Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. Who is tweeting on twitter: human, bot, or cyborg? In Proceedings of the 26th Annual Computer Security Applications Conference, pages 21-30. ACM

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Santosh Kumar Mehta, L.N. Padhy, Rajesh Kumar Gupta, " Fake Profile Identification in Social Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.733-737, July-August-2017.