Knowledge-based approaches for identity management in online social networks

被引:6
|
作者
Bahri, Leila [1 ]
Carminati, Barbara [1 ,2 ]
Ferrari, Elena [2 ]
机构
[1] Royal Tech Univ, Dept Software & Comp Syst, Stockholm, Sweden
[2] Univ Insubria, Dept Theoret & Appl Sci, Varese, Italy
关键词
identity management; online social network; LEARNING APPROACH; SYBIL ATTACKS; THEFT; DEFENSE;
D O I
10.1002/widm.1260
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When we meet a new person, we start by introducing ourselves. We share our names, and other information about our jobs, cities, family status, and so on. This is how socializing and social interactions can start: we first need to identify each other. Identification is a cornerstone in establishing social contacts. We identify ourselves and others by a set of civil (e.g., name, nationality, ID number, gender) and social (e.g., music taste, hobbies, religion) characteristics. This seamlessly carried out identification process in face-to-face interactions is challenged in the virtual realms of socializing, such as in online social network (OSN) platforms. New identities (i.e., online profiles) could be created without being subject to any level of verification, making it easy to create fake information and forge fake identities. This has led to a massive proliferation of accounts that represent fake identities (i.e., not mapping to physically existing entities), and that poison the online socializing environment with fake information and malicious behavior (e.g., child abuse, information stealing). Within this milieu, users in OSNs are left unarmed against the challenging task of identifying the real person behind the screen. OSN providers and research bodies have dedicated considerable effort to the study of the behavior and features of fake OSN identities, trying to find ways to detect them. Some other research initiatives have explored possible techniques to enable identity validation in OSNs. Both kinds of approach rely on extracting knowledge from the OSN, and exploiting it to achieve identification management in their realms. We provide a review of the most prominent works in the literature. We define the problem, provide a taxonomy of related attacks, and discuss the available solutions and approaches for knowledge-based identity management in OSNs. This article is categorized under: Fundamental Concepts of Data and Knowledge > Human Centricity and User Interaction Application Areas> Internet and Web-Based Applications Application Areas> Society and Culture
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Community-based Identity Validation on Online Social Networks
    Bahri, Leila
    Carminati, Barbara
    Ferrari, Elena
    [J]. 2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2014), 2014, : 21 - 30
  • [23] Evolving fuzzy neural networks for supervised/unsupervised online knowledge-based learning
    Kasabov, N
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2001, 31 (06): : 902 - 918
  • [24] Knowledge-based business management
    不详
    [J]. BWK, 2003, 55 (09): : 42 - 45
  • [25] Knowledge-based nitrogen management
    Ibrahim, Muhammed Mustapha
    Hou, Enqing
    [J]. NATURE FOOD, 2023, 4 (12): : 1031 - 1032
  • [26] ActiveDBC: learning Knowledge-based Information propagation in mobile social networks
    Park, Jiho
    Ryu, Jegwang
    Yang, Sung-Bong
    [J]. WIRELESS NETWORKS, 2019, 25 (04) : 1519 - 1531
  • [27] Knowledge-based Process Management
    Szmodics, Peter
    [J]. 2015 6TH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFOCOMMUNICATIONS (COGINFOCOM), 2015, : 33 - 37
  • [28] ActiveDBC: learning Knowledge-based Information propagation in mobile social networks
    Jiho Park
    Jegwang Ryu
    Sung-Bong Yang
    [J]. Wireless Networks, 2019, 25 : 1519 - 1531
  • [29] Knowledge-based nitrogen management
    Muhammed Mustapha Ibrahim
    Enqing Hou
    [J]. Nature Food, 2023, 4 : 1031 - 1032
  • [30] Social Identity Management in Social Networks
    Blanco, Diego
    Sanz, Jorge G.
    Pavon, Juan
    [J]. INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE 2008, 2009, 50 : 62 - 70