Finite Automata for Fake Profile Identification in Online Social Networks

In this modern era, fraudsters discover various approaches to defame the popularity of high-profile social accounts associated with various social networking sites. In this paper, a finite automata-based fake profile identifier is proposed to curb fake profiles and to solve security issues. The proposed method is compared with the other general validation methods and found that our model gives better results than the existing models.

[1]  Jaswinder Singh,et al.  A Review on Resemblance of User Profiles in Social Networks using Similarity Measures , 2016 .

[2]  C. Y. Lee Automata and finite automata , 1960 .

[3]  V. S. Subrahmanian,et al.  Using sentiment to detect bots on Twitter: Are humans more opinionated than bots? , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[4]  Massimiliano Albanese,et al.  Security and Privacy Issues in Social Networks , 2015, Data Management in Pervasive Systems.

[5]  Krishna P. Gummadi,et al.  Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.

[6]  Hoda M. O. Mokhtar,et al.  Detecting Fake Accounts on Social Media , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[7]  K. Saravanakumar,et al.  On Privacy and Security in Social Media – A Comprehensive Study☆ , 2016 .

[8]  Anupam Joshi,et al.  Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy , 2013, WWW.

[9]  Jan Eloff,et al.  Using Machine Learning to Detect Fake Identities: Bots vs Humans , 2018, IEEE Access.

[10]  Virgílio A. F. Almeida,et al.  Studying User Footprints in Different Online Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[11]  Gianluca Stringhini,et al.  COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.

[12]  Alessandro Flammini,et al.  Predicting online extremism, content adopters, and interaction reciprocity , 2016, SocInfo.

[13]  Bhume Bhumiratana A Model for Automating Persistent Identity Clone in Online Social Network , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[14]  Sushil Jajodia,et al.  Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.

[15]  Jeanna Neefe Matthews,et al.  Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach , 2015, SMSociety.