Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process

In recent years, the security of online social networks (OSNs) has become an issue of widespread concern. Searching and detecting compromised accounts in OSNs is crucial for ensuring the security of OSN platforms. In this study, the authors proposed a new method of detecting compromised accounts based on a supervised analytical hierarchy process (SAHP). First, they considered the expression habits of a user to present the profile features of a user more comprehensively than previous research. Next, the information gain ratio was combined with the analytical hierarchy process algorithm to calculate the weight of each feature. Finally, a detection decision was taken, and varying thresholds were used to obtain different detection results. The experimental results showed that the accuracy and precision of the SAHP were 81.7 and 96.4%, respectively. The results indicated that the new method improved upon the previously established COMPA (detecting compromised accounts on social networks) methods for detecting compromised accounts.

[1]  Pabitra Mitra,et al.  Modelling visual saliency using degree centrality , 2010 .

[2]  Jianhua Dai,et al.  Attribute selection based on information gain ratio in fuzzy rough set theory with application to tumor classification , 2013, Appl. Soft Comput..

[3]  Murat Ince,et al.  Web-based learning object selection software using analytical hierarchy process , 2014, IET Softw..

[4]  Sushil Jajodia,et al.  Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.

[5]  Almudena Alcaide,et al.  Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management , 2016, IET Inf. Secur..

[6]  Stephen Hailes,et al.  Evolving attackers against wireless sensor networks using genetic programming , 2017, IET Wirel. Sens. Syst..

[7]  Raul Tempone,et al.  Fast Bayesian experimental design: Laplace-based importance sampling for the expected information gain , 2017, Computer Methods in Applied Mechanics and Engineering.

[8]  J. Wood Marine renewables face paperwork barrier [marine power generation] , 2005 .

[9]  W. Knight Caught in the net [Internet and e-mail security issues] , 2005 .

[10]  Juan Martínez-Romo,et al.  Detecting malicious tweets in trending topics using a statistical analysis of language , 2013, Expert Syst. Appl..

[11]  Hao Li,et al.  Unsupervised video anomaly detection using feature clustering , 2012, IET Signal Process..