Recognize Fraud Accounts on Social Platform Using SVM and Neural Networks

Authors

  • Thepalle Reddeppa  PG Scholar, Department of Computer Application, Madanapalle Institute of Technology & Science, India
  • Dr. J. Srinivasan  Assistant Professor, Department of Computer Application, Madanapalle Institute of Technology & Science, India

Keywords:

Support Vector machine ( SVM) and Neural network

Abstract

The present generation, online social networks (OSNs) have become increasingly popular, people’s social lives has become more associated with these sites. They use OSNs to keep in touch with each other’s, share news, organize events, and even run their own e-business. The rabid growth of OSNs and the massive amount of personal data of its subscribers have attracted attackers, and imposters to steal personal data, share false news, and spread malicious activities. On the other hand researchers have started to investigate efficient techniques to detect abnormal activities and fake accounts relying on accounts features, and classification algorithms. However, some of the account’s exploited features have negative contribution in the final results or have no impact, also using standalone classification algorithms does not always reach satisfied results. In this paper, a new algorithm, SVIn M-NN, is proposed to provide efficient detection for fake Instagram accounts, four feature selection and dimension reduction techniques were applied.

References

  1. (2018) Political advertising spending on Face book between 2014 and 2018. Internet draft. [Online]. Available: https://www.statista.com/statistics/891327/political-advertising spending-face book-by-sponsor-category/
  2. J. R. Douceur, “The Sybil attack,” in International workshop on peer-to-peer systems. Springer, 2002, pp. 251–260.
  3. (2012) Cbc.facebook shares drop on news of fake accounts. Internet draft. [Online]. Available: http://www.cbc.ca/news/technology/facebook-shares-drop-on news-of-fake-accounts-1.1177067
  4. R. Kaur and S. Singh, “A survey of data mining and social network analysis based anomaly detection techniques,” Egyptian informatics journal, vol. 17, no. 2, pp. 199–216, 2016.
  5. L. M. Potgieter and R. Naidoo, “Factors explaining user loyalty in a social media-based brand community,” South African Journal of Information Management, vol. 19, no. 1, pp. 1–9, 2017.
  6. (2018) Quarterly earning reports. Internet draft. [Online]. Available: https://investor.fb.com/home/default.aspx
  7. (2018) Statista.twitter: number of monthly active users 2010-2018. Internet draft. [Online]. Available: https://www.statista.com/statistics/282087/number-of-monthly active-twitter-users/
  8. Y. Boshmaf, M. Ripeanu, K. Beznosov, and E. Santos-Neto, “Thwarting fake accounts by predicting their victims,” in Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. ACM, 2015, pp. 81–89.
  9. (2018) Facebook publishes enforcement numbers for the first time. Internet draft. [Online]. Available: https://newsroom.fb.com/news/2018/05/enforcement-numbers/
  10. (2013) Banque populaire dis-moi combien damis tu as sur facebook, je te dirai si ta banque va taccorder un prłt. Internet draft. [Online]. Available: http://bigbrowser.blog.lemonde.fr/2013/09/19/popularitedis-moi-combien-damis-tu-as-sur-facebook-je-te-dirai-si-ta-banqueva-taccorder-un-pret/
  11. S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov, “A billion keys, but few locks: the crisis of web single sign-on,” in Proceedings of the 2010 New Security Paradigms Workshop. ACM, 2010, pp. 61–72.
  12. S. Fong, Y. Zhuang, and J. He, “Not every friend on a social network can be trusted: Classifying imposters using decision trees,” in Future Generation Communication Technology (FGCT), 2012 International Conference on. IEEE, 2012, pp. 58–63.
  13. K. Thomas, C. Grier, D. Song, and V. Paxson, “Suspended accounts in retrospect: an analysis of twitter spam,” in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011, pp. 243–258.
  14. Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, “The socialbot network: when bots socialize for fame and money,” in Proceedings of the 27th annual computer security applications conference. ACM, 2011, pp. 93–102.
  15. J. Ratkiewicz, M. Conover, M. Meiss, B. Gonc¸alves, S. Patil, A. Flammini, and F. Menczer, “Truthy: mapping the spread of astroturf in microblog streams,” in Proceedings of the 20th international conference companiossn on World wide web. ACM, 2011, pp. 249–252.

Downloads

Published

2022-08-30

Issue

Section

Research Articles

How to Cite

[1]
Thepalle Reddeppa, Dr. J. Srinivasan, " Recognize Fraud Accounts on Social Platform Using SVM and Neural Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 4, pp.256-259, July-August-2022.