Detecting cloning attack in Social Networks using classification and clustering techniques

Social Networks (SN) are popular among the people to interact with their friends through the internet. Users spending their time in popular social networking sites like facebook, Myspace and twitter to share the personal information. Cloning attack is one of the insidious attacks in facebook. Usually attackers stole the images and personal information about a person and create the fake profile pages. Once the profile gets cloned they started to send a friend request using the cloned profile. Incase if the real users account gets blocked, they used to send a new friend request to their friends. At the same time cloned one also sending the request to the person. At that time it was hard to identify the real one for users. In the proposed system the clone attack is detected based on user action time period and users click pattern to find the similarity between the cloned profile and real one in facebook. Using Cosine similarity and Jaccard index the performance of the similarity between the users is improved.

[1]  Hung Hum,et al.  Is Naïve Bayes a Good Classifier for Document Classification , 2011 .

[2]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2013, IEEE Trans. Inf. Forensics Secur..

[3]  Jing Liu,et al.  An Analysis of Security in Social Networks , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[4]  T. Krishna Chaitanya,et al.  Analysis and Detection of Modern Spam Techniques on Social Networking Sites , 2012, 2012 Third International Conference on Services in Emerging Markets.

[5]  Edgar R. Weippl,et al.  Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam , 2011, IEEE Internet Computing.

[6]  Xiaolong Su,et al.  An improved K-Means clustering algorithm , 2010, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[7]  Kevin Borders,et al.  Social networks and context-aware spam , 2008, CSCW.

[8]  Uyen Trang Nguyen,et al.  A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks , 2013, IEEE Transactions on Information Forensics and Security.

[9]  Daniel T. Larose,et al.  Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .

[10]  Sri Khetwat Saritha,et al.  Link Encryption to Counteract with Rouge Social Network Crawlers , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[11]  Xi Chen,et al.  Privacy Issues and Solutions in Social Network Sites , 2012, IEEE Technology and Society Magazine.

[12]  Bhavani M. Thuraisingham,et al.  Preventing Private Information Inference Attacks on Social Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.

[13]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[14]  Sotiris Ioannidis,et al.  Understanding the behavior of malicious applications in social networks , 2010, IEEE Network.

[15]  S. Niwattanakul,et al.  Using of Jaccard Coefficient for Keywords Similarity , 2022 .

[16]  Syeda Meraj Bilfaqih Preventing Private Information Inference Attacks on Social Networks , 2015 .

[17]  Jennie Malboeuf Algorithm , 1994, Neurology.