Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning

In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution.

[1]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[2]  Kim-Kwang Raymond Choo,et al.  The convergence of new computing paradigms and big data analytics methodologies for online social networks , 2018, J. Comput. Sci..

[3]  Jong Hyuk Park,et al.  Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..

[4]  Georgia Koutrika,et al.  Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges , 2007, IEEE Internet Computing.

[5]  N. Arunkumar,et al.  Enabling technologies for fog computing in healthcare IoT systems , 2019, Future Gener. Comput. Syst..

[6]  Calton Pu,et al.  Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks , 2011, IEEE Internet Computing.

[7]  Aziz Mohaisen,et al.  AMAL: High-fidelity, behavior-based automated malware analysis and classification , 2014, Comput. Secur..

[8]  Christopher M. Danforth,et al.  An evolutionary algorithm approach to link prediction in dynamic social networks , 2013, J. Comput. Sci..

[9]  Sotiris Ioannidis,et al.  Understanding the behavior of malicious applications in social networks , 2010, IEEE Network.

[10]  Xianghan Zheng,et al.  ELM-based spammer detection in social networks , 2016, The Journal of Supercomputing.

[11]  Wesley Shu,et al.  The Perceived Benefits of 6-Degree-Separation Social Networks , 2011, Internet Res..

[12]  Nor Badrul Anuar,et al.  Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..

[13]  Xiuzhen Zhang,et al.  Anomaly detection in online social networks , 2014, Soc. Networks.

[14]  Edgar R. Weippl,et al.  Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam , 2011, IEEE Internet Computing.

[15]  Mikhail J. Atallah,et al.  Private Information: To Reveal or not to Reveal , 2008, TSEC.

[16]  Kaiqi Zhang,et al.  Maximizing influence in a social network: Improved results using a genetic algorithm , 2017 .

[17]  Zheyi Chen,et al.  Detecting spammers on social networks , 2015, Neurocomputing.

[18]  Quanyan Zhu,et al.  Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.

[19]  Linyuan Lu,et al.  Link Prediction in Complex Networks: A Survey , 2010, ArXiv.

[20]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[21]  Haining Wang,et al.  BogusBiter: A transparent protection against phishing attacks , 2010, TOIT.

[22]  Pooya Moradian Zadeh,et al.  A Multi-Population Cultural Algorithm for Community Detection in Social Networks , 2015, ANT/SEIT.

[23]  Hossam Faris,et al.  Evolving Support Vector Machines using Whale Optimization Algorithm for spam profiles detection on online social networks in different lingual contexts , 2018, Knowl. Based Syst..