Automatic ICA detection in online social networks with PageRank

被引:4
作者
Zare, Maryam [1 ]
Khasteh, Seyed Hossein [1 ]
Ghafouri, Saeid [1 ]
机构
[1] KN Toosi Univ Technol, Comp Engn Dept, Tehran N, Iran
关键词
Online social networks; Identity cloning attack; Profile; PageRank; MapReduce; K-means; ACCOUNT DETECTION; SENSOR NETWORKS; ATTACKS; FRAMEWORK;
D O I
10.1007/s12083-020-00894-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, online social networks have become an essential part of humans. However, there are some dark side to this widespread use of online social networks. One of them is the fact that many attackers have succeeded to clone celebrities' profiles and have attracted hundreds or thousands of followers. This type of forging has caused many problems for famous people. This phenomenon is commonly known as Identity Cloning Attack which is abbreviated to ICA in the literature. ICA occurs when a malicious user selects one of the famous users of a social network as his victim. The attacker then creates a user account similar to the victim's profile and embarks on various malicious social activities. In this paper, we have proposed an automatic method to identify cloned profiles. This method consists of three main steps and is implemented on Hadoop framework using the MapReduce programming model. In the first step, we count the number of followers of each user and store it as an attribute for their profile. In the second step, the network users are clustered based on their profile attributes and their number of followers. Subsequently, we move all the profiles within the same cluster as the victim's profile to the next step and consider them as suspicious profiles. The victim's profile is a profile of a celebrity, where the proposed method is conducted to verify its authenticity. In the third step, we eventually select the profile with the highest rank as the valid profile. This method of ranking the profiles is based on the outcome of PageRank algorithm in the first step. This method is easily applicable and does not require any additional information for identifying the original user account. Furthermore, this method employs a distributed processing framework, limits the search space, and decreases the required computation by clustering the profiles. We have applied the suggested method to a dataset that we collected from Instagram. Our findings were quite promising, and in some situations, we were able to identify all the cloned profiles with a 100% accuracy. The results are comparable to the best ones in this area of study.
引用
收藏
页码:1297 / 1311
页数:15
相关论文
共 40 条
[1]   Recognizing human behaviours in online social networks [J].
Amato, Flora ;
Castiglione, Aniello ;
De Santo, Aniello ;
Moscato, Vincenzo ;
Picariello, Antonio ;
Persia, Fabio ;
Sperli, Giancarlo .
COMPUTERS & SECURITY, 2018, 74 :355-370
[2]  
[Anonymous], 2009, ULTRAMODERN TEL WORK
[3]  
[Anonymous], 2014, ARXIV14032006
[4]  
Basnet R, 2008, STUD FUZZ SOFT COMP, V226, P373, DOI 10.1007/978-3-540-77465-5_19
[5]  
Bilge L., 2009, Proceedings of the 18th International Conference on World Wide Web, Security and privacy/session, P551, DOI 10.1145/1526709.1526784
[6]   Integro: Leveraging victim prediction for robust fake account detection in large scale OSNs [J].
Boshmaf, Yazan ;
Logothetis, Dionysios ;
Siganos, Georgos ;
Leria, Jorge ;
Lorenzo, Jose ;
Ripeanu, Matei ;
Beznosou, Konstantin ;
Halawa, Hassan .
COMPUTERS & SECURITY, 2016, 61 :142-168
[7]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[8]   The anatomy of a large-scale hypertextual Web search engine [J].
Brin, S ;
Page, L .
COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (1-7) :107-117
[9]   On the detection of clones in sensor networks using random key predistribution [J].
Brooks, Richard ;
Govindaraju, P. Y. ;
Pirretti, Matthew ;
Vijaykrishnan, N. ;
Kandemir, Mahmut T. .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 37 (06) :1246-1258
[10]   SET: Detecting node clones in sensor networks [J].
Choi, Heesook ;
Zhu, Sencun ;
La Porta, Thomas F. .
2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, :341-350