Dynamic reputation information propagation based malicious account detection in OSNs

People all around the world have become increasingly dependent on online social networks (OSNs), meanwhile, the number of malicious accounts in OSNs is also rapidly growing. Traditional content-based data mining techniques and user graph-based methods are asking for more and more computing resources from networks providers, especially for the networks with huge and complicated network topologies. Moreover, traditional content-based analysis methods need to keep up with the times, which need to be retrained when the structure of users’ data changes or when the malicious contents come along with some pop cultures. With the purpose of reducing the dependence on network providers’ computing resources and improving the precision of detection, a novel detection method of malicious account, which bases on dynamic users’ reputation information propagation, is proposed in this paper. According to the comparison result of requesting user’s comprehensive reputation and malicious threshold, user can mark requesting user’s reputation so as to achieve the purpose of malicious account detection and providing indirect recommended reputation information about requesting user for other users. Through experiments with two real-world datasets and comparison with two typical efficient detection algorithms, this algorithm can effectively detect malicious accounts without the central detection system as well as improve the detection precision.

[1]  Zhigang Chen,et al.  Effective information transmission based on socialization nodes in opportunistic networks , 2017, Comput. Networks.

[2]  Jie Zhang,et al.  Factored similarity models with social trust for top-N item recommendation , 2017, Knowl. Based Syst..

[3]  Wei Hu,et al.  Twitter spammer detection using data stream clustering , 2014, Inf. Sci..

[4]  Zhigang Chen,et al.  Information cache management and data transmission algorithm in opportunistic social networks , 2018, Wireless Networks.

[5]  Monika Singh,et al.  Detecting Malicious Users in Twitter using Classifiers , 2014, SIN.

[6]  S. Masrom,et al.  TRUST AWARE RECOMMENDER SYSTEM WITH DISTRUST IN DIFFERENT VIEWS OF TRUSTED USERS , 2018 .

[7]  Songjun Ma,et al.  Seeking powerful information initial spreaders in online social networks: a dense group perspective , 2017, Wireless Networks.

[8]  Reza Farahbakhsh,et al.  NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media , 2017, IEEE Transactions on Information Forensics and Security.

[9]  Yuval Elovici,et al.  Friend or foe? Fake profile identification in online social networks , 2013, Social Network Analysis and Mining.

[10]  Alex 'Sandy' Pentland,et al.  If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts , 2016, International Journal of Information Security.

[11]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[12]  Nor Badrul Anuar,et al.  Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..

[13]  Zheyi Chen,et al.  Detecting spammers on social networks , 2015, Neurocomputing.

[14]  Zhiwu Lu,et al.  Community Based Spammer Detection in Social Networks , 2015, WAIM.

[15]  Xiao Wang,et al.  VoteTrust: Leveraging friend invitation graph to defend against social network Sybils , 2013, 2013 Proceedings IEEE INFOCOM.

[16]  Yuqing Mao,et al.  Web of Credit: Adaptive Personalized Trust Network Inference From Online Rating Data , 2016, IEEE Transactions on Computational Social Systems.

[17]  Gang Wang,et al.  Serf and turf: crowdturfing for fun and profit , 2011, WWW.

[18]  Erdong Chen,et al.  Facebook immune system , 2011, SNS '11.

[19]  Zhigang Chen,et al.  Small Data: Effective Data Based on Big Communication Research in Social Networks , 2018, Wirel. Pers. Commun..

[20]  David G. Schwartz,et al.  Social network analysis of web links to eliminate false positives in collaborative anti-spam systems , 2011, J. Netw. Comput. Appl..