A Survey of Malicious Accounts Detection in Large-Scale Online Social Networks

As a virtual community and online platform, people can share different views, ideas, and experiences freely on social networks. Due to popularity of online social networks (OSNs) such as Facebook, Twitter etc., malicious accounts gain improper benefits through abuse of social network services, and malicious accounts detection is increasingly becoming a focus in the field of OSNs security research. In this paper, we give a detailed review in various types of malicious accounts detection methods in large-scale OSNs. We present most common methods based on user behavior analysis and OSNs structure. It also discusses major challenge relating malicious accounts detection.

[1]  Jinyuan Jia,et al.  Random Walk Based Fake Account Detection in Online Social Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[2]  Vern Paxson,et al.  Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.

[3]  Keke Gai,et al.  A survey on FinTech , 2018, J. Netw. Comput. Appl..

[4]  Fenglong Ma,et al.  Discovering social spammers from multiple views , 2017, Neurocomputing.

[5]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[6]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, IMC '10.

[7]  S. Santhosinidevi,et al.  Towards Detecting Compromised Accounts on Social Networks , 2018 .

[8]  Mohammad Karim Sohrabi,et al.  A Feature Selection Approach to Detect Spam in the Facebook Social Network , 2018 .

[9]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[10]  Keke Gai,et al.  Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.

[11]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.

[12]  Sushil Jajodia,et al.  Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.

[13]  Abhinav Kumar,et al.  Spotting opinion spammers using behavioral footprints , 2013, KDD.

[14]  Gianluca Stringhini,et al.  EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services , 2015, USENIX Security Symposium.

[15]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[16]  Eva Zangerle,et al.  "Sorry, I was hacked": a classification of compromised twitter accounts , 2014, SAC.

[17]  Gianluca Stringhini,et al.  COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.

[18]  Michalis Faloutsos,et al.  An analysis of socware cascades in online social networks , 2013, WWW.

[19]  Nor Badrul Anuar,et al.  Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..

[20]  Xiaowei Ying,et al.  Spectrum based fraud detection in social networks , 2011, ICDE.

[21]  Muhammad Al-Qurishi,et al.  Sybil Defense Techniques in Online Social Networks: A Survey , 2017, IEEE Access.

[22]  Cao Xiao,et al.  Detecting Clusters of Fake Accounts in Online Social Networks , 2015, AISec@CCS.

[23]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[24]  Songqing Chen,et al.  UNIK: unsupervised social network spam detection , 2013, CIKM.

[25]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..

[26]  Indrajit Ray,et al.  SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks , 2016, SEC.

[27]  Muhammad Abulaish,et al.  An MCL-Based Approach for Spam Profile Detection in Online Social Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[28]  Keke Gai,et al.  Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.

[29]  Teng-Sheng Moh,et al.  Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers , 2010, ICISTM.