ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User

The rapid growth of smart phones and recent advances in telephony have triggered an enormous increase in the number of telephony subscribers. Some people have more than one calling identity for different purposes, such as for business and personal use. Discovering multiple identities of an individual can be important for fraud detection, detection of coordinated criminals, collaborative recommendations, and analyses of complete social graph of an individual. To address the challenge of finding identities that belong to a single individual, this paper describes ID-CONNECT, an approach for linking multiple identities of an individual based on that individual's social call graph and call behavior. The approach is based on the assumption that similarity between identities can be better estimated by using both call network and call behavior of identities towards their friends and that the more similar the weighted call graph of two identities, the higher is the similarity between them. ID-CONNECT is a two-step approach: 1) it estimates similarity between identities by incorporating call rate and duration, and 2) it generates sets of candidate identities for each target identity. We experimentally evaluate our approach on different random graph models and compare its performance against other approaches. Our evaluation results show that our approach significantly reduces candidate set size (up to 70%) while achieving comparable true positive rate.

[1]  Virgílio A. F. Almeida,et al.  Studying User Footprints in Different Online Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[2]  Bartunov Sergey,et al.  Joint Link-Attribute User Identity Resolution in Online Social Networks , 2012 .

[3]  Richard Chbeir,et al.  User Profile Matching in Social Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[4]  Vincent Y. Shen,et al.  User identification across multiple social networks , 2009, 2009 First International Conference on Networked Digital Technologies.

[5]  Muhammad Ajmal Azad,et al.  Caller-REP: Detecting unwanted calls with caller social strength , 2013, Comput. Secur..

[6]  Martin Szomszor,et al.  Correlating user profiles from multiple folksonomies , 2008, Hypertext.

[7]  Reza Zafarani,et al.  Connecting users across social media sites: a behavioral-modeling approach , 2013, KDD.

[8]  Peter Fankhauser,et al.  Identifying Users Across Social Tagging Systems , 2011, ICWSM.

[9]  Pável Calado,et al.  Resolving user identities over social networks through supervised learning and rich similarity features , 2012, SAC '12.

[10]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[11]  Christos Faloutsos,et al.  Mobile call graphs: beyond power-law and lognormal distributions , 2008, KDD.

[12]  Ramayya Krishnan,et al.  HYDRA: large-scale social identity linkage via heterogeneous behavior modeling , 2014, SIGMOD Conference.

[13]  M. Newman Random Graphs as Models of Networks , 2002, cond-mat/0202208.

[14]  Muhammad Ajmal Azad,et al.  Mitigating SPIT with Social Strength , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[15]  Ling Huang,et al.  Joint Link Prediction and Attribute Inference Using a Social-Attribute Network , 2014, TIST.

[16]  Jennifer Widom,et al.  SimRank: a measure of structural-context similarity , 2002, KDD.

[17]  Xing Xie,et al.  Effective Social Graph Deanonymization Based on Graph Structure and Descriptive Information , 2015, ACM Trans. Intell. Syst. Technol..

[18]  Barbara Carminati,et al.  User similarities on social networks , 2013, Social Network Analysis and Mining.

[19]  Anupam Joshi,et al.  @i seek 'fb.me': identifying users across multiple online social networks , 2013, WWW.

[20]  Reza Zafarani,et al.  Connecting Corresponding Identities across Communities , 2009, ICWSM.

[21]  M. E. J. Newman,et al.  Power laws, Pareto distributions and Zipf's law , 2005 .

[22]  Angelos D. Keromytis,et al.  A Comprehensive Survey of Voice over IP Security Research , 2012, IEEE Communications Surveys & Tutorials.

[23]  Shyhtsun Felix Wu,et al.  Analysis of user keyword similarity in online social networks , 2011, Social Network Analysis and Mining.

[24]  M. Newman Power laws, Pareto distributions and Zipf's law , 2005 .