An approach for detecting profile cloning in online social networks

Online social networks (OSNs) are websites that allow users to build connections and relationships to other Internet users. Social networks store information remotely, rather than on a user's personal computer. They can be used to keep in touch with friends, make new contacts and find people with similar interests and ideas. Nowadays the popularity of online social networks is growing rapidly. Many people besides friends and acquaintances are interested in the information people post on social networks. Identity thieves, scam artists, debt collectors, stalkers, and corporations looking for a market advantage are using social networks to gather information about consumers. Companies that operate social networks are themselves collecting a variety of data about their users, both to personalize the services for the users and to sell to advertisers. The concern of leakage of privacy and security is extremely growing in social networks in these days .The identity theft attacks (ICAs) by creating clone identities in OSNs try to steal users' personal information and nowadays it is very important in cyberspace. If no protection mechanism is applied it effects on users' activity, trust and reliance relations that establish with other users. In this paper, first profile cloning and identity theft attack are introduced, and then a framework for detection suspicious identity is proposed. This approach is based on attribute similarity and friend network similarity. According to similarity measures which are computed in each step and by having predetermined threshold, it will be decided which profile is clone which one is genuine.

[1]  Bhume Bhumiratana A Model for Automating Persistent Identity Clone in Online Social Network , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[2]  Gail-Joon Ahn,et al.  Security and Privacy in Social Networks , 2011, IEEE Internet Comput..

[3]  Sotiris Ioannidis,et al.  Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[4]  Abdul Azim Abdul Ghani,et al.  Rank-order weighting of web application attributes , 2011, Int. Arab J. Inf. Technol..

[5]  S. Dongen Graph clustering by flow simulation , 2000 .

[6]  Nicole B. Ellison,et al.  Social network sites: definition, history, and scholarship , 2010 .

[7]  Hakim Hacid,et al.  Towards multiple identity detection in social networks , 2012, WWW.

[8]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[9]  Dennis M. Buede,et al.  The Engineering Design of Systems , 2009 .

[10]  Hassan Takabi,et al.  Towards active detection of identity clone attacks on online social networks , 2011, CODASPY '11.

[11]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[12]  Muhammad Abulaish,et al.  An MCL-Based Approach for Spam Profile Detection in Online Social Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[13]  Ibrahim Aljarah,et al.  Discovering Communities in Social Networks Using Topology and Attributes , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.

[14]  Serge Egelman,et al.  It's not what you know, but who you know: a social approach to last-resort authentication , 2009, CHI.

[15]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[16]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[17]  George Varghese,et al.  I seek you: searching and matching individuals in social networks , 2009, WIDM.

[18]  Barbara Carminati,et al.  Network and profile based measures for user similarities on social networks , 2011, 2011 IEEE International Conference on Information Reuse & Integration.

[19]  Vasudeva Varma,et al.  A weighted tag similarity measure based on a collaborative weight model , 2010, SMUC '10.

[20]  G. Dromart,et al.  A Model , 2009 .