Profile Cloning Detection in Social Networks

Profile cloning is a severe security issue in social networks since it is used to make a profile identical to existing ones. Profile cloning detection creates a possibility to detect frauds that would use people's trust to gather social information. This paper proposes two novel methods of profile cloning detection and also presents state-of-the-art research. The first method is based on the similarity of attributes from both profiles and the second method is based on the similarity of relationship networks. The methods are further evaluated with experiments and the results clearly describes that the proposed methods are useful and efficient compared to existing methods. The paper also stress that profile cloning in Facebook is not only possible but also fairly easy to perform.

[1]  Martin Boldt,et al.  Privacy Threats Related to User Profiling in Online Social Networks , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[2]  Sotiris Ioannidis,et al.  Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[3]  Hassan Takabi,et al.  Towards active detection of identity clone attacks on online social networks , 2011, CODASPY '11.

[4]  Dekang Lin,et al.  An Information-Theoretic Definition of Similarity , 1998, ICML.

[5]  Przemyslaw Kazienko,et al.  Negative Effects of Incentivised Viral Campaigns for Activity in Social Networks , 2013, 2012 Second International Conference on Cloud and Green Computing.

[6]  David J. Hand,et al.  Statistical fraud detection: A review , 2002 .

[7]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[8]  Brandon Van Der Heide,et al.  Too Much of a Good Thing? The Relationship Between Number of Friends and Interpersonal Impressions on Facebook , 2008, J. Comput. Mediat. Commun..

[9]  Haiying Shen,et al.  SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box , 2011, 2011 Proceedings IEEE INFOCOM.

[10]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[11]  Vern Paxson,et al.  Detecting and Analyzing Automated Activity on Twitter , 2011, PAM.