Detection of Malicious Profiles and Protecting Users in Online Social Networks

被引:0
|
作者
M. Senthil Raja
L. Arun Raj
机构
[1] B.S.Abdur Rahman Crescent Institute of Science and Technology,Department of Computer Science and Engineering, School of Computing, College of Engineering and Technology
[2] SRM Institute of Science and Technology,undefined
来源
关键词
3PS (publically privacy protection system); E_SVM-NN classifier; Data mining techniques; Online social networks; Malicious profile cloning;
D O I
暂无
中图分类号
学科分类号
摘要
Everyone today actively uses online social networks to get in touch with their friends, for career opportunities, and business also. Some of the most popular social networks are Facebook, Instagram, LinkedIn, and Twitter. But the question is how much their authentication systems are built in a secured way. The authentication systems mostly depend on the user's general details such as name, photo, and location. In such systems, mischievous persons can easily create fake profiles by cloning the user’s identity to abuse the user’s information. Using fake profiles they can misuse original user’s photos, contacts, and videos. This kind of mischievous person can be identified by the use of privacy detection mechanisms. So, this research emphasizes some data mining techniques for protecting the original user’s information and to identify the malicious accounts in social network sites. By the assessment of 3PS (Publically Privacy Protection System), this work employs the malicious account detection method in OSN depending upon the mischievous person’s uncountable shared posts in a day and latest activity and behaviors. Examining the network similarity and comparison of attributes threshold values referred to the original user’s profile can be used to identify the malicious accounts. For this E_SVM-NN classifier is used based on the feature reduction techniques. This work involves in creating OSN accounts for experiments and investigates the latest updates, posts, comments, photos, and performing online search etc. which are used to evaluate the effectiveness and significance of the proposed work in contrast to the previous works.
引用
收藏
页码:107 / 124
页数:17
相关论文
共 50 条
  • [31] Better Adaptive Malicious Users Detection Algorithm in Human Contact Networks
    Lin, Limei
    Huang, Yanze
    Xu, Li
    Hsieh, Sun-Yuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (11) : 2968 - 2981
  • [32] DETECTING FRAUDULENT TWITTER PROFILES: A MODEL FOR FRAUD DETECTION IN ONLINE SOCIAL NETWORKS
    Albahar, Marwan Ali
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2019, 15 (05): : 1629 - 1639
  • [33] Detecting Malicious Users in Online Dating Application
    Qiu, Jianhui
    Shen, Xingfa
    Guo, Yan
    Yao, Jian
    Fang, Renzhe
    [J]. 5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, : 255 - 260
  • [34] Uncovering Large Groups of Active Malicious Accounts in Online Social Networks
    Cao, Qiang
    Yang, Xiaowei
    Yu, Jieqi
    Palow, Christopher
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 477 - 488
  • [35] Understanding Online Social Networks' Users - A Twitter Approach
    Delcea, Camelia
    Cotfas, Liviu-Adrian
    Paun, Ramona
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, ICCCI 2014, 2014, 8733 : 145 - 153
  • [36] Friendship Online: Users' Experiences of Relationships in Social Networks
    Comber, Rob
    [J]. ECCE 2009 - EUROPEAN CONFERENCE ON COGNITIVE ERGONOMICS: DESIGNING BEYOND THE PRODUCT - UNDERSTANDING ACTIVITY AND USER EXPERIENCE IN UBIQUITOUS ENVIRONMENTS, 2009, 258 : 430 - 433
  • [37] Identification of influential users by neighbors in online social networks
    Sheikhahmadi, Amir
    Nematbakhsh, Mohammad Ali
    Zareie, Ahmad
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2017, 486 : 517 - 534
  • [38] IDENTIFYING RELIABLE POSTS AND USERS IN ONLINE SOCIAL NETWORKS
    Xie, Sifa
    Weng, Wei
    Chen, Ke
    Liu, Xiangrong
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2014, 28 (06)
  • [39] Social brokerage and productivity of users in online innovation networks
    Mukherjee, Satyam
    Jain, Tarun
    [J]. JOURNAL OF PRODUCT INNOVATION MANAGEMENT, 2023, 40 (02) : 231 - 254
  • [40] Competitive diffusion in online social networks with heterogeneous users
    Li, Pei
    He, Su
    Wang, Hui
    Zhang, Xin
    [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2014, 28 (22):