Machine Learning-Based Fake Profile Detection on Social Networking Websites
DOI:
https://doi.org/10.32628/CSEIT2410236Keywords:
Fake Profiles, Python, Machine Learning, Random Forest Classifier, Decision TreeAbstract
These days social media has become an integral part of our lives, the challenge of detecting the fake accounts on platforms like Instagram, twitter, facebook etc. , . has gained significant importance. Each of these social media platforms offers benefits and drawbacks, as well as security risks for our information. This project titled "Instagram Fake Account Detection using Machine Learning", employs Python as its primary tool to tackle this problem. It leverages two powerful machine learning algorithms, the Random Forest Classifier and the Decision Tree Classifier, to accomplish this task.
Downloads
References
E. Karunakar, V. D. R. Pavani, T. N. I. Priya, M. V. Sri, and K. Tiruvalluru, "Ensemble fake profile detection using machine learning (ML)," J. Inf. Comput. Sci., vol. 10, pp. 1071–1077, 2020.
M. U. S. Khan, M. Ali, A. Abbas, S. U. Khan, and A. Y. Zomaya, "Segregating spammers and unsolicited bloggers from genuine experts on twitter," IEEE Trans. Dependable Secure Comput., vol. 15, no. 4, pp. 551–560, Jul./Aug. 2018.
P. K. Roy, J. P. Singh, and S. Banerjee, "Deep learning to filter SMS spam," Future Gener. Comput. Syst., vol. 102, pp. 524–533, 2020. DOI: https://doi.org/10.1016/j.future.2019.09.001
R. Kaur, S. Singh, and H. Kumar, "A modern overview of several countermeasures for the rise of spam and compromised accounts in online social networks," J. Netw. Comput. Appl., vol. 112, pp. 53–88, 2018. DOI: https://doi.org/10.1016/j.jnca.2018.03.015
V. Balakrishnan, S. Khan, and H. R. Arabnia, "Improving cyberbullying detection using twitter users’ psychological features and machine learning," Comput. Secur., vol. 90, 2020, Art. no. 101710. DOI: https://doi.org/10.1016/j.cose.2019.101710
Georgios Kontaxis, I. Polakis, S. Ioannidis and E. P. Markatos, "Detecting social network profile cloning," 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Seattle, WA, USA, 2011, pp. 295-300, doi: 10.1109/PERCOMW.2011.5766886. DOI: https://doi.org/10.1109/PERCOMW.2011.5766886
Monther Aldwairi, and Ali Alwahedi, "Detecting Fake News in Social Media Networks", Procedia Computer Science, Volume 141, 2018, Pages 215-222; https://doi.org/10.1016/j.procs.2018.10.171 DOI: https://doi.org/10.1016/j.procs.2018.10.171
Buket Erşahin, Özlem Aktaş, D. Kılınç and C. Akyol, "Twitter fake account detection," 2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Turkey, 2017, pp. 388-392, doi: 10.1109/UBMK.2017.8093420. DOI: https://doi.org/10.1109/UBMK.2017.8093420
Kumud Patel, Saijshree Srivastava, and Sudhanshu Agrahari, "Survey on Fake Profile Detection on Social Sites by Using Machine Learning Algorithm," 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 2020, pp. 1236-1240, doi: 10.1109/ICRITO48877.2020.9197935. DOI: https://doi.org/10.1109/ICRITO48877.2020.9197935
Alexey D.Frunze and Aleksey A. Frolov, "Methods for Detecting Fake Accounts on the Social Network VK," 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, Moscow, Russia, 2021, pp. 342-346, doi: 10.1109/ElConRus51938.2021.9396670. DOI: https://doi.org/10.1109/ElConRus51938.2021.9396670
M. BalaAnand, S. Sankari, R. Sowmipriya, and S. Sivaranjani, "Recognising fraudulent users on social networks through their nonverbal cues," Int. J. Technol. Eng. Syst., vol. 7, no. 2, pp. 157–161, 2015.
A. M. Meligy, H. M. Ibrahim, and M. F. Torky, "Identifier checker tool for online social networks to identify false profiles," Int. J. Comput. Netw. Inf. Secur., vol. 9, no. 1, pp. 31–39, 2017. DOI: https://doi.org/10.5815/ijcnis.2017.01.04
S. Lee and J. Kim, "WarningBird: IEEE Trans. Dependable Secure Comput., "A near real-time detection method for suspicious URLs in twitter stream," IEEE Trans. Dependable Secure Comput., vol. 10, no. 3, pp. 183–195, May/Jun. 2013. DOI: https://doi.org/10.1109/TDSC.2013.3
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.