Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks

被引:50
作者
Al-Qurishi, Muhammad [1 ]
Hossain, M. Shamim [2 ]
Alrubaian, Majed [1 ]
Rahman, Sk Md Mizanur [1 ]
Alamri, Atif [2 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11543, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11543, Saudi Arabia
关键词
Malicious activity; social network; sybil attack; user behaviors; TWITTER;
D O I
10.1109/TII.2017.2753202
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the enormous growth and volume of online social networks and their features, along with the vast number of socially connected users, it has become difficult to explain the true semantic value of published content for the detection of user behaviors. Without understanding the contextual background, it is impractical to differentiate among various groups in terms of their relevance and mutual relations, or to identify the most significant representatives from the community at large. In this paper, we propose an integrated social media content analysis platform that leverages three levels of features, i.e., user-generated content, social graph connections, and user profile activities, to analyze and detect anomalous behaviors that deviate significantly fromthe norm in large-scale social networks. Several types of analyses have been conducted for a better understanding of the different user behaviors in the detection of highly adaptive malicious users. We attempted a novel approach regarding the process of data extraction and classification to contextualize large-scale networks in a proper manner. We also collected a significant number of user profiles from Twitter and YouTube, along with around 13 million channel activities. Extensive evaluations were conducted on real-world datasets of user activities for both social networks. The evaluation results show the effectiveness and utility of the proposed approach.
引用
收藏
页码:799 / 813
页数:15
相关论文
共 48 条
[1]   Malicious accounts: Dark of the social networks [J].
Adewole, Kayode Sakariyah ;
Anuar, Nor Badrul ;
Kamsin, Amirrudin ;
Varathan, Kasturi Dewi ;
Razak, Syed Abdul .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 79 :41-67
[2]   Twitter turing test: Identifying social machines [J].
Alarifi, Abdulrahman ;
Alsaleh, Mansour ;
Al-Salman, AbdulMalik .
INFORMATION SCIENCES, 2016, 372 :332-346
[3]  
Alghamdi B, 2016, 2016 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE WORKSHOPS (WIW 2016), P5, DOI [10.1109/WIW.2016.014, 10.1109/WIW.2016.41]
[4]   Communities, Random Walks, and Social Sybil Defense [J].
Alvisi, Lorenzo ;
Clement, Allen ;
Epasto, Alessandro ;
Lattanzi, Silvio ;
Panconesi, Alessandro .
INTERNET MATHEMATICS, 2014, 10 (3-4) :360-420
[5]  
Amin A., 2017, CLUSTER COMPUT, P1, DOI DOI 10.1007/S10586-017-0878-4
[6]  
[Anonymous], 2008, P 14 ACM SIGKDD INT, DOI DOI 10.1145/1401890.1401960
[7]  
[Anonymous], 2016, THESIS
[8]   COIP-Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles [J].
Bahri, Leila ;
Carminati, Barbara ;
Ferrari, Elena .
ACM TRANSACTIONS ON THE WEB, 2016, 10 (04)
[9]   Integro: Leveraging victim prediction for robust fake account detection in large scale OSNs [J].
Boshmaf, Yazan ;
Logothetis, Dionysios ;
Siganos, Georgos ;
Leria, Jorge ;
Lorenzo, Jose ;
Ripeanu, Matei ;
Beznosou, Konstantin ;
Halawa, Hassan .
COMPUTERS & SECURITY, 2016, 61 :142-168
[10]   Comparing Twitter and Facebook user behavior: Privacy and other aspects [J].
Buccafurri, Francesco ;
Lax, Gianluca ;
Nicolazzo, Serena ;
Nocera, Antonino .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 52 :87-95