A Detection System to Counter Identity Deception in Social Media Applications

被引:0
作者
Kuruvilla, Antu Mary [1 ]
Varghese, Saira [1 ]
机构
[1] Toc H Inst Sci & Technol, Comp Sci & Engn, Ernakulam, India
来源
2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015) | 2015年
关键词
Deception; sockpuppet; nonverbal and verbal behavior; security; accuracy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Considering the current landscape of the internet where there is a plethora of social networking sites and collaborative websites like Wikipedia concern about malicious users keeping multiple accounts is of prime importance. Most of the collaborative sites allow users to easily create an account and start accessing the content. Social media services such as collaborative project's single user constantly creates many accounts with different account names not long after a block has been applied. The blocked person who creates multiple accounts is called sockpuppet. Current mechanism for detecting deception are based on human deception detection (e. g., speech or text). Although these method have high detection accuracy, but it cannot be applied in databases with large volumes of data. So they are computationally inefficient. There is an efficient method for detecting identity deception by using both Nonverbal (e. g., user activity or Movement) and Verbal Behavior (facial expression, text) in the social media environment. These methods increase high detection accuracy. Post examination and close monitoring on these methods which finds out that it can be applied to any social media environment.
引用
收藏
页数:5
相关论文
共 15 条
[1]   Detecting Hoaxes, Frauds, and Deception in Writing Style Online [J].
Afroz, Sadia ;
Brennan, Michael ;
Greenstadt, Rachel .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :461-475
[2]  
Alfons A, 2013, J STAT SOFTW, V54, P1
[3]   Cyber bullying: Overview and strategies for school counsellors, guidance officers, and all school personnel [J].
Bhat, Christine Suniti .
AUSTRALIAN JOURNAL OF GUIDANCE AND COUNSELLING, 2008, 18 (01) :53-66
[4]  
Burgoon J., 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences, p21a
[5]   Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers [J].
Grazioli, S ;
Jaryenpaa, SL .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2000, 30 (04) :395-410
[6]   Identification of fraudulent financial statements using linguistic credibility analysis [J].
Humpherys, Sean L. ;
Moffitt, Kevin C. ;
Burns, Mary B. ;
Burgoon, Judee K. ;
Felix, William F. .
DECISION SUPPORT SYSTEMS, 2011, 50 (03) :585-594
[7]   Users of the world, unite! The challenges and opportunities of Social Media [J].
Kaplan, Andreas M. ;
Haenlein, Michael .
BUSINESS HORIZONS, 2010, 53 (01) :59-68
[8]  
Lamb CE, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P160, DOI 10.1109/ISI.2013.6578809
[9]  
Lu Shan., 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences, p20c
[10]   Deception detection through automatic, unobtrusive analysis of nonverbal behavior [J].
Meservy, TO ;
Jensen, ML ;
Kruse, J ;
Burgoon, JK ;
Nunamaker, JF ;
Twitchell, DP ;
Tsechpenakis, G ;
Metaxas, DN .
IEEE INTELLIGENT SYSTEMS, 2005, 20 (05) :36-43