Recognizing Fake identities in Online Social Networks based on a Finite Automaton approach

Online Social Networks (OSNs) are a great venue for scammers to impersonate the identities of users via creating fake profiles. Fake profiles are a popular tool for the intruders which can be used to carry out malicious activities such as impersonation attacks and harming persons' reputation and privacy in (OSN). Hence, recognizing the identities of fake profiles is one of the critical security problems in OSNs. In this paper, we proposed a detection mechanism called Fake Profiles Recognizer (FPR) for recognizing and detecting Fake Profiles in OSNs. The detection methodology in FPR is based on the functionality of Regular Expression and Deterministic Finite Automaton (DFA) approaches for recognizing the identity of profiles. We evaluated our detection system on three popular types of Online Social Networks: Facebook, Google+, and Twitter. The results explored high accuracy, efficiency, and low False Positive Rate of FPR mechanism in detecting the identities of Fake Profiles. In addition, our proposed detection mechanism achieved strong competitive results compared with other detection mechanisms in the literature.

[1]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[2]  A. Hasib Threats of Online Social Networks , 2009 .

[3]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[4]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[5]  Gang Wang,et al.  Northeastern University , 2021, IEEE Pulse.

[6]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, IMC '10.

[7]  Mohammad Reza Khayyambashi,et al.  An approach for detecting profile cloning in online social networks , 2013, 7th International Conference on e-Commerce in Developing Countries:with focus on e-Security.

[8]  D. Powers Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness & Correlation , 2008 .

[9]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[10]  Christopher Krügel,et al.  Abusing Social Networks for Automated User Profiling , 2010, RAID.

[11]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[12]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.

[13]  Borko Furht,et al.  Handbook of Social Network Technologies and Applications , 2010, Handbook of Social Network Technologies.

[14]  Bobby Bhattacharjee,et al.  Identifying Close Friends on the Internet , 2009, HotNets.

[15]  Y. Elovici,et al.  Strangers Intrusion Detection - Detecting Spammers and Fake Proles in Social Networks Based on Topology Anomalies , 2012 .