Profile Cloning Detection in Online Social Networks

Due to the emergence of online social networks, the importance of privacy on the Internet has vitally increased. Thus, it is important to develop mechanisms that will prevent our hidden personal data from unauthorized access and use. In this paper an attempt was made to present a concept of profile cloning detection in Online Social Networks (OSN) using Graph and Network Theory. Compering values of attributes of users’ personal profiles and analysing structural similarity of networks, we identify attackers which steal users’ identity.

[1]  Avrim Blum,et al.  Learning from Labeled and Unlabeled Data using Graph Mincuts , 2001, ICML.

[2]  Mohammad Reza Khayyambashi,et al.  An approach for detecting profile cloning in online social networks , 2013, 7th International Conference on e-Commerce in Developing Countries:with focus on e-Security.

[3]  Paul Van Dooren,et al.  A MEASURE OF SIMILARITY BETWEEN GRAPH VERTICES . WITH APPLICATIONS TO SYNONYM EXTRACTION AND WEB SEARCHING , 2002 .

[4]  Zbigniew Tarapata,et al.  An Application of Multicriteria Weighted Graph Similarity Method to Social Networks Analyzing , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.

[5]  Jennifer Widom,et al.  SimRank: a measure of structural-context similarity , 2002, KDD.

[6]  Zbigniew Tarapata,et al.  Application of Graphs and Networks Similarity Measures for Analyzing Complex Networks , 2011 .

[7]  H. J. Smith,et al.  Managing Privacy: Information Technology and Corporate America , 1994 .

[8]  Zbigniew Tarapata,et al.  Methods of Profile Cloning Detection in Online Social Networks , 2016 .

[9]  Sotiris Ioannidis,et al.  Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[10]  Laura Zager,et al.  Graph similarity and matching , 2005 .

[11]  Mladen Nikolic,et al.  Measuring similarity of graph nodes by neighbor matching , 2012, Intell. Data Anal..

[12]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[13]  Zoubin Ghahramani,et al.  Combining active learning and semi-supervised learning using Gaussian fields and harmonic functions , 2003, ICML 2003.

[14]  David Liben-Nowell,et al.  The link-prediction problem for social networks , 2007 .

[15]  Lorrie Faith Cranor,et al.  Internet privacy , 1999, CACM.

[16]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[17]  Irwin King,et al.  Exploit of online social networks with Semi-Supervised Learning , 2010, The 2010 International Joint Conference on Neural Networks (IJCNN).