Trust-Aware Detection of Malicious Users in Dating Social Networks

被引:10
|
作者
Shen, Xingfa [1 ]
Lv, Wentao [1 ]
Qiu, Jianhui [1 ]
Kaur, Achhardeep [2 ]
Xiao, Fengjun [3 ]
Xia, Feng [2 ]
机构
[1] Hangzhou Dianzi Univ, Dept Comp Sci & Technol, Hangzhou 310018, Peoples R China
[2] Federat Univ Australia, Inst Innovat Sci & Sustainabil, Ballarat, Vic 3353, Australia
[3] Hangzhou Dianzi Univ, Sci Tech Acad, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Social networking (online); Behavioral sciences; Feature extraction; Oral communication; Data models; Switches; Soft sensors; Anomaly detection; malicious users; social networks; trust; user behavior; MATRIX FACTORIZATION; NEAREST NEIGHBORS; RECOMMENDATION; DBSCAN;
D O I
10.1109/TCSS.2022.3174011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Online dating is an increasingly thriving business which boosts billion-dollar revenues and attracts users in the tens of millions. Despite its popularity, internet dating is not exempt from the concerns about privacy and trust posed by the revelation of potentially sensitive data as well as the exposure to self-reported (and hence potentially distorted) information. The increasing popularity of online dating networks leads to an increase in security concerns and challenges, as well as harmful actions and attacks, such as creating fake accounts, phishing on these networks. To maintain the safety of legitimate online dating users, it is critical to recognize and isolate criminal people as soon as possible. However, researchers concerning malicious user detection in dating social networks are merely a few. To address some key challenges in this space, we propose a trust-aware detection framework to detect malicious users based on different kinds of data from a real dating site. In particular, we develop a user trust model to distinguish between malicious and legitimate users. Furthermore, we propose a novel data-balancing method to improve the recall rate of malicious user detection. Extensive experiments have been conducted over real-world datasets. The results show that the proposed approach yields a precision of up to 59.16% and a recall rate of up to 73%, which is significantly higher than other baseline algorithms.
引用
收藏
页码:2587 / 2598
页数:12
相关论文
共 50 条
  • [1] Trust-Aware Recommendation in Social Networks
    Xiao, Yingyuan
    Bu, Zhongjing
    Hsu, Ching-Hsien
    Zhu, Wenxin
    Shen, Yan
    [J]. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017): 10TH INTERNATIONAL CONFERENCE, KSEM 2017, MELBOURNE, VIC, AUSTRALIA, AUGUST 19-20, 2017, PROCEEDINGS, 2017, 10412 : 380 - 388
  • [2] Trust-Aware Privacy Evaluation in Online Social Networks
    Zeng, Yongbo
    Sun, Yan
    Xing, Liudong
    Vokkarane, Vinod
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 932 - 938
  • [3] Trust-aware media recommendation in heterogeneous social networks
    Jian Wu
    Liang Chen
    Qi Yu
    Panpan Han
    Zhaohui Wu
    [J]. World Wide Web, 2015, 18 : 139 - 157
  • [4] Trust-aware media recommendation in heterogeneous social networks
    Wu, Jian
    Chen, Liang
    Yu, Qi
    Han, Panpan
    Wu, Zhaohui
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2015, 18 (01): : 139 - 157
  • [5] On Deep Learning for Trust-Aware Recommendations in Social Networks
    Deng, Shuiguang
    Huang, Longtao
    Xu, Guandong
    Wu, Xindong
    Wu, Zhaohui
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (05) : 1164 - 1177
  • [6] Deep Matrix Factorization for Trust-Aware Recommendation in Social Networks
    Wan, Liangtian
    Xia, Feng
    Kong, Xiangjie
    Hsu, Ching-Hsien
    Huang, Runhe
    Ma, Jianhua
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 511 - 528
  • [7] A Trust-Aware System for Personalized User Recommendations in Social Networks
    Eirinaki, Magdalini
    Louta, Malamati D.
    Varlamis, Iraklis
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2014, 44 (04): : 409 - 421
  • [8] Filtering Malicious Messages by Trust-Aware Cognitive Routing in Vehicular Ad Hoc Networks
    Mirzadeh, Ida
    Haghighi, Mohammad Sayad
    Jolfaei, Alireza
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (01) : 1134 - 1143
  • [9] Modeling Trust-Aware Recommendations With Temporal Dynamics in Social Networks
    Ahmed, Adeel
    Saleem, Khalid
    Rashid, Umer
    Baz, Abdullah
    [J]. IEEE ACCESS, 2020, 8 : 149676 - 149705
  • [10] Trust-Aware Review Spam Detection
    Xue, Hao
    Li, Fengjun
    Seo, Hyunjin
    Pluretti, Roseann
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 726 - 733