Trust-Aware Detection of Malicious Users in Dating Social Networks

被引:12
作者
Shen, Xingfa [1 ]
Lv, Wentao [1 ]
Qiu, Jianhui [1 ]
Kaur, Achhardeep [2 ]
Xiao, Fengjun [3 ]
Xia, Feng [2 ]
机构
[1] Hangzhou Dianzi Univ, Dept Comp Sci & Technol, Hangzhou 310018, Peoples R China
[2] Federat Univ Australia, Inst Innovat Sci & Sustainabil, Ballarat, Vic 3353, Australia
[3] Hangzhou Dianzi Univ, Sci Tech Acad, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Social networking (online); Behavioral sciences; Feature extraction; Oral communication; Data models; Switches; Soft sensors; Anomaly detection; malicious users; social networks; trust; user behavior; MATRIX FACTORIZATION; NEAREST NEIGHBORS; RECOMMENDATION; DBSCAN;
D O I
10.1109/TCSS.2022.3174011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Online dating is an increasingly thriving business which boosts billion-dollar revenues and attracts users in the tens of millions. Despite its popularity, internet dating is not exempt from the concerns about privacy and trust posed by the revelation of potentially sensitive data as well as the exposure to self-reported (and hence potentially distorted) information. The increasing popularity of online dating networks leads to an increase in security concerns and challenges, as well as harmful actions and attacks, such as creating fake accounts, phishing on these networks. To maintain the safety of legitimate online dating users, it is critical to recognize and isolate criminal people as soon as possible. However, researchers concerning malicious user detection in dating social networks are merely a few. To address some key challenges in this space, we propose a trust-aware detection framework to detect malicious users based on different kinds of data from a real dating site. In particular, we develop a user trust model to distinguish between malicious and legitimate users. Furthermore, we propose a novel data-balancing method to improve the recall rate of malicious user detection. Extensive experiments have been conducted over real-world datasets. The results show that the proposed approach yields a precision of up to 59.16% and a recall rate of up to 73%, which is significantly higher than other baseline algorithms.
引用
收藏
页码:2587 / 2598
页数:12
相关论文
共 39 条
[1]   Detecting Hoaxes, Frauds, and Deception in Writing Style Online [J].
Afroz, Sadia ;
Brennan, Michael ;
Greenstadt, Rachel .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :461-475
[2]   Investigating the Effect of Attributes on User Trust in Social Media [J].
Al Qundus, Jamal ;
Paschke, Adrian .
DATABASE AND EXPERT SYSTEMS APPLICATIONS: DEXA 2018 INTERNATIONAL WORKSHOPS, 2018, 903 :278-288
[3]  
Al-Rousan S, 2020, INT CONF ELECTRO INF, P416, DOI [10.1109/eit48999.2020.9208268, 10.1109/EIT48999.2020.9208268]
[4]  
[Anonymous], 2014, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, DOI [DOI 10.1109/CVPR.2014.241, 10.1109/CVPR.2014.241]
[5]  
Bensouda N., 2018, PROC INT C LEARN OPT, DOI [10.1145/3230905.3230922, DOI 10.1145/3230905.3230922]
[6]   The online dating romance scam: causes and consequences of victimhood [J].
Buchanan, Tom ;
Whitty, Monica T. .
PSYCHOLOGY CRIME & LAW, 2014, 20 (03) :261-283
[7]   Adaptive Density-Based Spatial Clustering for Massive Data Analysis [J].
Cai, Zihao ;
Wang, Jian ;
He, Kejing .
IEEE ACCESS, 2020, 8 :23346-23358
[8]   Social trust model for rating prediction in recommender systems: Effects of similarity, centrality, and social ties [J].
Davoudi A. ;
Chatterjee M. .
Online Social Networks and Media, 2018, 7 :1-11
[9]   Effective Intrusion Detection System Using XGBoost [J].
Dhaliwal, Sukhpreet Singh ;
Abdullah-Al Nahid ;
Abbas, Robert .
INFORMATION, 2018, 9 (07)
[10]   Feature-enriched matrix factorization for relation extraction [J].
Duc-Thuan Vo ;
Bagheri, Ebrahim .
INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (03) :424-444