Fusing Behavioral Projection Models for Identity Theft Detection in Online Social Networks

被引:7
|
作者
Wang, Cheng [1 ]
Yang, Bo [1 ]
Cui, Jipeng [1 ]
Wang, Chaodong [1 ]
机构
[1] Tongji Univ, Key Lab, Minist Educ Embedded Syst & Serv Comp, Dept Comp Sci, Shanghai 201804, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Behavioral projection model; identity theft detection; logical fusion scheme; online social network (OSN); IDENTIFICATION;
D O I
10.1109/TCSS.2019.2917003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We aim at exploiting users' coarse behavioral records for identity theft detection in online services. We concentrate on this issue in online social networks (OSNs) that users' behavioral records usually consist of multiple dimensional behavior data. The behavioral records in each dimension are possibly coarse and insufficient for effectively modeling users' behavioral patterns. In this paper, we investigate whether there is a complementary effect among different dimensions of records for modeling users' behavioral patterns. We focus on three typical dimensions of behaviors in OSNs, i.e., offline check-ins, online tippostings, and social contacts. We devise the dedicated behavior models based on each dimension of data, i.e., users' behavioral projection models. Then, by examining all feasible logical combinations of them, we find the optimal ones for two real-world data sets: Foursquare and Yelp. Notably, we analyze the potential correlation between customized demand and optimal logical fusion scheme. As an insightful result, we find that the correlation is independent of the specific data. This study would give the cybersecurity community new insights into the possibility and methodology to achieve a customized identity theft detection in OSNs by integrating multiple behavioral projection models.
引用
收藏
页码:637 / 648
页数:12
相关论文
共 50 条
  • [1] Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks
    Wang, Cheng
    Zhu, Hangyu
    Yang, Bo
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (02) : 428 - 439
  • [2] Identity Theft Detection in Mobile Social Networks Using Behavioral Semantics
    Wang, Cheng
    Yang, Bo
    Luo, Jing
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 272 - 274
  • [3] PARTICIPATORY DETECTION OF IDENTITY THEFT ON MOBILE SOCIAL PLATFORMS
    Lorimer, Philip A. K.
    Diec, Victor Ming-Fai
    Kantarci, Burak
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 833 - 837
  • [4] An Approach to Identity Theft Detection Using Social Network Analysis
    Kolaczek, Grzegorz
    2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 78 - 81
  • [5] Fusing Text and Frienships for Location Inference in Online Social Networks
    Gu, Hansu
    Hang, Haojie
    Lv, Qin
    Grunwald, Dirk
    2012 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY (WI-IAT 2012), VOL 1, 2012, : 158 - 165
  • [6] Models of Online Social Networks
    Bonato, Anthony
    Hadi, Noor
    Horn, Paul
    Pralat, Pawel
    Wang, Changping
    INTERNET MATHEMATICS, 2009, 6 (03) : 285 - 313
  • [7] An Identity Authentication Protocol in Online Social Networks
    Li, Lingjun
    Zhao, Xinxin
    Xue, Guoliang
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [8] Keeping Identity Secret in Online Social Networks
    Zhao, Xinxin
    Li, Lingjun
    Xue, Guoliang
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [9] Models of Influence in Online Social Networks
    AlFalahi, Kanna
    Atif, Yacine
    Abraham, Ajith
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2014, 29 (02) : 161 - 183
  • [10] A defence scheme against Identity Theft Attack based on multiple social networks
    He, Bing-Zhe
    Chen, Chien-Ming
    Su, Yi-Ping
    Sun, Hung-Min
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (05) : 2345 - 2352