Detection of Fake Profiles in Social Media - Literature Review

False identities play an important role in advanced persisted threats and are also involved in other malicious activities. The present article focuses on the literature review of the state-of-the-art research aimed at detecting fake profiles in social media. The approaches to detecting fake social media accounts can be classified into the approaches aimed on analysing individual accounts, and the approaches capturing the coordinated activities spanning a large group of accounts. The article sheds light on the role of fake identities in advanced persistent threats and covers the mentioned approaches of detecting fake social media

[1]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[2]  Sotiris Ioannidis,et al.  Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[3]  Mauro Conti,et al.  FakeBook: Detecting Fake Profiles in On-Line Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[4]  Vern Paxson,et al.  Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.

[5]  Wenfeng Li,et al.  Real-time traffic information collecting and monitoring system based on the internet of things , 2011, 2011 6th International Conference on Pervasive Computing and Applications.

[6]  Edgar R. Weippl,et al.  Fake identities in social media: A case study on the sustainability of the Facebook business model , 2012, J. Serv. Sci. Res..

[7]  Kyumin Lee,et al.  The Dark Side of Micro-Task Marketplaces: Characterizing Fiverr and Automatically Detecting Crowdturfing , 2014, ICWSM.

[8]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[9]  Bruno S. Silvestre,et al.  Social Media? Get Serious! Understanding the Functional Building Blocks of Social Media , 2011 .

[10]  Anna Cinzia Squicciarini,et al.  Uncovering Crowdsourced Manipulation of Online Reviews , 2015, SIGIR.

[11]  Kyumin Lee,et al.  Characterizing and automatically detecting crowdturfing in Fiverr and Twitter , 2015, Social Network Analysis and Mining.

[12]  Gang Wang,et al.  Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.

[13]  Kaushik Dutta,et al.  Identifying Fake Profiles in LinkedIn , 2020, PACIS.

[14]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[15]  Konstantin Beznosov,et al.  Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs , 2016, Comput. Secur..

[16]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.

[17]  Krishna P. Gummadi,et al.  Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.

[18]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[19]  Edgar R. Weippl,et al.  Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..

[20]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[21]  Venkatesan Guruswami,et al.  CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.

[22]  Gang Wang,et al.  Serf and turf: crowdturfing for fun and profit , 2011, WWW.

[23]  Li Guo,et al.  Detecting Sybil Nodes in Anonymous Communication Systems , 2013, ITQM.

[24]  Emiliano De Cristofaro,et al.  Characterizing Seller-Driven Black-Hat Marketplaces , 2015, ArXiv.

[25]  Chen-Nee Chuah,et al.  Ghostbusting Facebook: Detecting and Characterizing Phantom Profiles in Online Social Gaming Applications , 2010, WOSN.

[26]  Christos Faloutsos,et al.  Suspicious Behavior Detection: Current Trends and Future Directions , 2016, IEEE Intelligent Systems.

[27]  Emiliano De Cristofaro,et al.  Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots , 2014, Internet Measurement Conference.

[28]  Gang Wang,et al.  Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers , 2014, USENIX Security Symposium.

[29]  Gianluca Stringhini,et al.  Towards Detecting Compromised Accounts on Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[30]  Sushil Jajodia,et al.  Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.