ABSTRACT
Online social networks (OSNs) are becoming increasingly popular and Identity Clone Attacks (ICAs) that aim at creating fake identities for malicious purposes on OSNs are becoming a significantly growing concern. Such attacks severely affect the trust relationships a victim has built with other users if no active protection is applied. In this paper, we first analyze and characterize the behaviors of ICAs. Then we propose a detection framework that is focused on discovering suspicious identities and then validating them. Towards detecting suspicious identities, we propose two approaches based on attribute similarity and similarity of friend networks. The first approach addresses a simpler scenario where mutual friends in friend networks are considered; and the second one captures the scenario where similar friend identities are involved. We also present experimental results to demonstrate flexibility and effectiveness of the proposed approaches. Finally, we discuss some feasible solutions to validate suspicious identities.
- L. Bilge, T. Strufe, D. Balzarotti and E. Kirda, "All your contacts are belong to us: automated identity theft attacks on social networks", In Proceedings of the 18th international conference on World Wide Web, Madrid, Spain, 2009. Google ScholarDigital Library
- Facebook Factsheet {Online}. http://www.facebook.com/press/info.php?statistics.Google Scholar
- Wikipedia. Social network {Online}. http://en.wikipedia.org/wiki/Social_network.Google Scholar
- Identity Badge {Online}. http://apps.facebook.com/identity_badgeGoogle Scholar
- mysafeFriend {Online}. http://apps.facebook.com/mysafefriendGoogle Scholar
- FightIDTheft {Online}. http://www.facebook.com/FightIDTheftGoogle Scholar
- Facebook Identity Theft - Don't be a Victim! {Online}. http://www.facebook.com/group.php?gid=7086517815Google Scholar
- E. Spertus, M. Sahami and O. Buyukkokten, "Evaluating similarity measures: a large-scale study in the orkut social network", In Proceedings of the 11th ACM SIGKDD international conference on Knowledge discovery in data mining, pp. 678--684, Chicago, IL, USA, 2005. Google ScholarDigital Library
- B. Markines, C. Cattuto, F. Menczer, D. Benz, A. Hotho, and G. Stumme, "Evaluating similarity measures for emergent semantics of social tagging", In Proceedings of the 18th international Conference on World Wide Web, pp. 641--650, Madrid, Spain, 2009. Google ScholarDigital Library
- S. Schechter, S. Egelman, and R.W. Reeder, "It's not what you know, but who you know: a social approach to last-resort authentication", In Proceedings of the 27th international conference on Human factors in computing systems, pp. 1983--1992, Boston, MA, USA, 2009. Google ScholarDigital Library
- B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks", In Proceedings of the IEEE Symposium on Security and Privacy, pp. 49--63, Oakland, CA, USA, 2005. Google ScholarDigital Library
- Y.Zeng, J.Cao, S. Zhang, S.Guo, and L. Xie, "Random-walk based approach to detect clone attacks in wireless sensor network," IEEE Journal on Selected Areas in Conmmunications, Vol. 28, No. 5, pp. 677--691, 2010. Google ScholarDigital Library
- M. Motoyama and G. Varghese, "I seek you: searching and matching individuals in social networks", In Proceeding of the 11th international workshop on Web information and data management, pp.67--75, Hong Kong, China, 2009. Google ScholarDigital Library
- R. J. Bayardo, Y. Ma, and R. Srikant, "Scaling up all pairs similarity search", In Proceedings of the 16th international Conference on World Wide Web, pp. 131--140, Banff, Alberta, Canada, 2007. Google ScholarDigital Library
- C. Xiao, W. Wang, X. Lin and J. X. Yu, "Efficient similarity joins for near duplicate detection", In Proceeding of the 17th international Conference on World Wide Web, pp. 131--140, Beijing, China, 2008. Google ScholarDigital Library
- B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi, "On the evolution of user interaction in Facebook", In Proceedings of the 2nd ACM Workshop on online Social Networks, pp. 37--42, Barcelona, Spain, 2009. Google ScholarDigital Library
Index Terms
- Towards active detection of identity clone attacks on online social networks
Recommendations
Enhancing and identifying cloning attacks in online social networks
ICUIMC '13: Proceedings of the 7th International Conference on Ubiquitous Information Management and CommunicationRecently Online Social Networks (OSNs) are enjoying a continuous boom, while suffering from omnifarious malicious attacks. Cloning attack is one of the attack patterns towards online social networks, where typically the attacker disguises fake accounts ...
Towards Privacy-Preserving Content Sharing for Online Social Networks
UbiComp '18: Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable ComputersThis paper presents presents an approach to preserve privacy for content sharing in online social networks. The approach is based on the concept of friendship strengths and social ties within a friendship circle. Friends can be categorized into ...
Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks
Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533Online Social Networks (OSNs) such as Facebook, Twitter, and so on recently are major impact in communication and social interaction. Users can share any information with others. However, they have concerns about losing privacy due to lack of an ...
Comments