skip to main content
10.1145/1943513.1943520acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Towards active detection of identity clone attacks on online social networks

Published:21 February 2011Publication History

ABSTRACT

Online social networks (OSNs) are becoming increasingly popular and Identity Clone Attacks (ICAs) that aim at creating fake identities for malicious purposes on OSNs are becoming a significantly growing concern. Such attacks severely affect the trust relationships a victim has built with other users if no active protection is applied. In this paper, we first analyze and characterize the behaviors of ICAs. Then we propose a detection framework that is focused on discovering suspicious identities and then validating them. Towards detecting suspicious identities, we propose two approaches based on attribute similarity and similarity of friend networks. The first approach addresses a simpler scenario where mutual friends in friend networks are considered; and the second one captures the scenario where similar friend identities are involved. We also present experimental results to demonstrate flexibility and effectiveness of the proposed approaches. Finally, we discuss some feasible solutions to validate suspicious identities.

References

  1. L. Bilge, T. Strufe, D. Balzarotti and E. Kirda, "All your contacts are belong to us: automated identity theft attacks on social networks", In Proceedings of the 18th international conference on World Wide Web, Madrid, Spain, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Facebook Factsheet {Online}. http://www.facebook.com/press/info.php?statistics.Google ScholarGoogle Scholar
  3. Wikipedia. Social network {Online}. http://en.wikipedia.org/wiki/Social_network.Google ScholarGoogle Scholar
  4. Identity Badge {Online}. http://apps.facebook.com/identity_badgeGoogle ScholarGoogle Scholar
  5. mysafeFriend {Online}. http://apps.facebook.com/mysafefriendGoogle ScholarGoogle Scholar
  6. FightIDTheft {Online}. http://www.facebook.com/FightIDTheftGoogle ScholarGoogle Scholar
  7. Facebook Identity Theft - Don't be a Victim! {Online}. http://www.facebook.com/group.php?gid=7086517815Google ScholarGoogle Scholar
  8. E. Spertus, M. Sahami and O. Buyukkokten, "Evaluating similarity measures: a large-scale study in the orkut social network", In Proceedings of the 11th ACM SIGKDD international conference on Knowledge discovery in data mining, pp. 678--684, Chicago, IL, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Markines, C. Cattuto, F. Menczer, D. Benz, A. Hotho, and G. Stumme, "Evaluating similarity measures for emergent semantics of social tagging", In Proceedings of the 18th international Conference on World Wide Web, pp. 641--650, Madrid, Spain, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Schechter, S. Egelman, and R.W. Reeder, "It's not what you know, but who you know: a social approach to last-resort authentication", In Proceedings of the 27th international conference on Human factors in computing systems, pp. 1983--1992, Boston, MA, USA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks", In Proceedings of the IEEE Symposium on Security and Privacy, pp. 49--63, Oakland, CA, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y.Zeng, J.Cao, S. Zhang, S.Guo, and L. Xie, "Random-walk based approach to detect clone attacks in wireless sensor network," IEEE Journal on Selected Areas in Conmmunications, Vol. 28, No. 5, pp. 677--691, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Motoyama and G. Varghese, "I seek you: searching and matching individuals in social networks", In Proceeding of the 11th international workshop on Web information and data management, pp.67--75, Hong Kong, China, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. J. Bayardo, Y. Ma, and R. Srikant, "Scaling up all pairs similarity search", In Proceedings of the 16th international Conference on World Wide Web, pp. 131--140, Banff, Alberta, Canada, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Xiao, W. Wang, X. Lin and J. X. Yu, "Efficient similarity joins for near duplicate detection", In Proceeding of the 17th international Conference on World Wide Web, pp. 131--140, Beijing, China, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi, "On the evolution of user interaction in Facebook", In Proceedings of the 2nd ACM Workshop on online Social Networks, pp. 37--42, Barcelona, Spain, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards active detection of identity clone attacks on online social networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CODASPY '11: Proceedings of the first ACM conference on Data and application security and privacy
          February 2011
          294 pages
          ISBN:9781450304665
          DOI:10.1145/1943513

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 February 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate149of789submissions,19%

          Upcoming Conference

          CODASPY '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader