Graph Based Local Risk Estimation in Large Scale Online Social Networks

Online Social Networks (OSNs) have become extremely popular in recent years, leading to the presence of huge volumes of users' personal information on the Internet. This increases the need for efficient and effective measures helping users to judge their direct contacts so as to avoid friendship with malicious users that could misuse their personal information. At this purpose, in this paper we propose a risk measure, called local risk factor, having as a key idea the fact the malicious users in OSNs (aka attackers) show some common features on the topology of their social graphs, which is different from those of legitimate users. This consideration brought us to design a set of features defined based on attacker activity patterns. To prove the effectiveness of the proposed risk measure, we run several experiments on a real OSN dataset (i.e., Orkut social network) with more than 3 million vertices and 117 million edges, by injecting synthetic fake users according to different settings and showing how the proposed measures can indeed help in their detection.

[1]  Barbara Carminati,et al.  Privacy in Social Networks: How Risky is Your Social Graph? , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[2]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[3]  Konstantin Beznosov,et al.  Design and analysis of a social botnet , 2013, Comput. Networks.

[4]  Danai Koutra,et al.  Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.

[5]  Jian Tang,et al.  On Complementarity of Cluster and Outlier Detection Schemes , 2003, DaWaK.

[6]  Haifeng Chen,et al.  Fault detection and localization in distributed systems using invariant relationships , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[7]  Christos Faloutsos,et al.  It's who you know: graph mining using recursive structural features , 2011, KDD.

[8]  Anthony K. H. Tung,et al.  Ranking Outliers Using Symmetric Neighborhood Relationship , 2006, PAKDD.

[9]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[10]  Gang Wang,et al.  Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.

[11]  Christos Faloutsos,et al.  Metric forensics: a multi-level approach for mining volatile graphs , 2010, KDD.

[12]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[13]  Luca Becchetti,et al.  Link-Based Characterization and Detection of Web Spam , 2006, AIRWeb.

[14]  Ee-Peng Lim,et al.  Detecting Anomalies in Bipartite Graphs with Mutual Dependency Principles , 2012, 2012 IEEE 12th International Conference on Data Mining.

[15]  Marco Rosa,et al.  Four degrees of separation , 2011, WebSci '12.

[16]  Shaik. AshaBee,et al.  Towards Online Spam Filtering In Social Networks , 2017 .

[17]  Konstantin Beznosov,et al.  Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs , 2015, NDSS.

[18]  Fabrício Benevenuto,et al.  Reverse engineering socialbot infiltration strategies in Twitter , 2014, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[19]  Erdong Chen,et al.  Facebook immune system , 2011, SNS '11.

[20]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[21]  Mohammad Abdollahi Azgomi,et al.  A hybrid fraud scoring and spike detection technique in streaming data , 2010, Intell. Data Anal..

[22]  Konstantin Beznosov,et al.  Graph-based Sybil Detection in social and information systems , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[23]  Christos Faloutsos,et al.  oddball: Spotting Anomalies in Weighted Graphs , 2010, PAKDD.

[24]  Paul Barford,et al.  Intrusion as (anti)social communication: characterization and detection , 2012, KDD.