Identity Theft Detection in Mobile Social Networks Using Behavioral Semantics

User behavioral analysis is expected to be a key technique for identity theft detection in the Internet, especially in mobile social networks (MSNs). While traditional methods prefer to use explicit behaviors, a series of behaviors implicit in user's texts can probably provide much more accurate identity. And these implicit behaviors can be digged from texts by LDA. Besides the latent feature in texts, a behavior also include other features (e.g., spatial and temporal features). A joint feature including these features can be a better evidence for identity theft detection. In this paper, we use a probabilistic generative model to detect identity theft in MSNs. We are going to conduct experiments on two real-life datasets: Foursquare and Yelp. A early experiment shows that semantic features achieve better performance than spatial features and we are conducting our main experiment to see a better performance with joint behavioral feature.

[1]  T. Graepel,et al.  Private traits and attributes are predictable from digital records of human behavior , 2013, Proceedings of the National Academy of Sciences.

[2]  Padhraic Smyth,et al.  Modeling human location data with mixtures of kernel densities , 2014, KDD.

[3]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[4]  Debrup Chakraborty,et al.  A cryptographic study of tokenization systems , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).

[5]  Saeid Safavi,et al.  Fraud Detection in Voice-Based Identity Authentication Applications and Services , 2016, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW).

[6]  Xiaoping Zhou,et al.  Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks , 2016, IEEE Transactions on Knowledge and Data Engineering.

[7]  Shazia Wasim Sadiq,et al.  Discovering interpretable geo-social communities for user behavior prediction , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).

[8]  M. Kosinski,et al.  Computer-based personality judgments are more accurate than those made by humans , 2015, Proceedings of the National Academy of Sciences.

[9]  Aixin Sun,et al.  Topic Modeling for Short Texts with Auxiliary Word Embeddings , 2016, SIGIR.

[10]  Sherali Zeadally,et al.  Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[12]  K. Suzanne Barber,et al.  Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[13]  Zhanpeng Jin,et al.  CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Guiran Chang,et al.  nPAKE: An Improved Group PAKE Protocol , 2012, 2012 Ninth Web Information Systems and Applications Conference.

[15]  Thamar Solorio,et al.  A Case Study of Sockpuppet Detection in Wikipedia , 2013 .