Skip to main content
Erschienen in: Wireless Networks 7/2020

21.07.2018

Dynamic reputation information propagation based malicious account detection in OSNs

verfasst von: Haoyan Liang, Zhigang Chen, Jia Wu

Erschienen in: Wireless Networks | Ausgabe 7/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

People all around the world have become increasingly dependent on online social networks (OSNs), meanwhile, the number of malicious accounts in OSNs is also rapidly growing. Traditional content-based data mining techniques and user graph-based methods are asking for more and more computing resources from networks providers, especially for the networks with huge and complicated network topologies. Moreover, traditional content-based analysis methods need to keep up with the times, which need to be retrained when the structure of users’ data changes or when the malicious contents come along with some pop cultures. With the purpose of reducing the dependence on network providers’ computing resources and improving the precision of detection, a novel detection method of malicious account, which bases on dynamic users’ reputation information propagation, is proposed in this paper. According to the comparison result of requesting user’s comprehensive reputation and malicious threshold, user can mark requesting user’s reputation so as to achieve the purpose of malicious account detection and providing indirect recommended reputation information about requesting user for other users. Through experiments with two real-world datasets and comparison with two typical efficient detection algorithms, this algorithm can effectively detect malicious accounts without the central detection system as well as improve the detection precision.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
3.
Zurück zum Zitat Fire, M., et al. (2014). Friend or foe? Fake profile identification in online social networks. Social Network Analysis and Mining, 4(1), 194.CrossRef Fire, M., et al. (2014). Friend or foe? Fake profile identification in online social networks. Social Network Analysis and Mining, 4(1), 194.CrossRef
4.
Zurück zum Zitat Adewole, K. S., et al. (2017). Malicious accounts: Dark of the social networks. Journal of Network and Computer Applications, 79, 41–67.CrossRef Adewole, K. S., et al. (2017). Malicious accounts: Dark of the social networks. Journal of Network and Computer Applications, 79, 41–67.CrossRef
5.
Zurück zum Zitat Yang, Z., et al. (2016). VoteTrust: Leveraging friend invitation graph to defend against social network sybils. IEEE Transactions on Dependable and Secure Computing, 13(4), 488–501.CrossRef Yang, Z., et al. (2016). VoteTrust: Leveraging friend invitation graph to defend against social network sybils. IEEE Transactions on Dependable and Secure Computing, 13(4), 488–501.CrossRef
6.
Zurück zum Zitat Miller, Z., et al. (2014). Twitter spammer detection using data stream clustering. Information Sciences, 260, 64–73.CrossRef Miller, Z., et al. (2014). Twitter spammer detection using data stream clustering. Information Sciences, 260, 64–73.CrossRef
7.
Zurück zum Zitat Cao, Q., et al. (2012). Aiding the detection of fake accounts in large scale social online services. In Proceedings of the 9th USENIX conference on networked systems design and implementation. USENIX Association. Cao, Q., et al. (2012). Aiding the detection of fake accounts in large scale social online services. In Proceedings of the 9th USENIX conference on networked systems design and implementation. USENIX Association.
8.
Zurück zum Zitat Wang, G., et al. (2012). Serf and turf: Crowdturfing for fun and profit. In Proceedings of the 21st international conference on World Wide Web. ACM. Wang, G., et al. (2012). Serf and turf: Crowdturfing for fun and profit. In Proceedings of the 21st international conference on World Wide Web. ACM.
9.
Zurück zum Zitat Kincaid, J. (2010). EdgeRank: The secret sauce that makes Facebook’s news feed tick. TechCrunch, April. Kincaid, J. (2010). EdgeRank: The secret sauce that makes Facebook’s news feed tick. TechCrunch, April.
11.
Zurück zum Zitat Stein, T., Erdong, C., & Karan, M. (2011). Facebook immune system. In Proceedings of the 4th workshop on social network systems. ACM. Stein, T., Erdong, C., & Karan, M. (2011). Facebook immune system. In Proceedings of the 4th workshop on social network systems. ACM.
12.
Zurück zum Zitat Almaatouq, A., et al. (2016). If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. International Journal of Information Security, 15(5), 475–491.CrossRef Almaatouq, A., et al. (2016). If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. International Journal of Information Security, 15(5), 475–491.CrossRef
13.
Zurück zum Zitat Zheng, X., et al. (2015). Detecting spammers on social networks. Neurocomputing, 159, 27–34.CrossRef Zheng, X., et al. (2015). Detecting spammers on social networks. Neurocomputing, 159, 27–34.CrossRef
14.
Zurück zum Zitat Singh, M., Divya, B., & Sanjeev, S. (2014). Detecting malicious users in Twitter using classifiers. In Proceedings of the 7th international conference on security of information and networks. ACM. Singh, M., Divya, B., & Sanjeev, S. (2014). Detecting malicious users in Twitter using classifiers. In Proceedings of the 7th international conference on security of information and networks. ACM.
15.
Zurück zum Zitat Mao, Y., & Shen, H. (2017). Web of credit: Adaptive personalized trust network inference from online rating data. IEEE Transactions on Computational Social Systems, 3(4), 176–189.CrossRef Mao, Y., & Shen, H. (2017). Web of credit: Adaptive personalized trust network inference from online rating data. IEEE Transactions on Computational Social Systems, 3(4), 176–189.CrossRef
16.
Zurück zum Zitat Liu, D., et al. (2015). Community based spammer detection in social networks. In International conference on web-age information management. Springer, Cham. Liu, D., et al. (2015). Community based spammer detection in social networks. In International conference on web-age information management. Springer, Cham.
17.
Zurück zum Zitat Sadan, Z., & Schwartz, D. G. (2011). Social network analysis of web links to eliminate false positives in collaborative anti-spam systems. Journal of Network and Computer Applications, 34(5), 1717–1723.CrossRef Sadan, Z., & Schwartz, D. G. (2011). Social network analysis of web links to eliminate false positives in collaborative anti-spam systems. Journal of Network and Computer Applications, 34(5), 1717–1723.CrossRef
19.
Zurück zum Zitat Jia, W. U., Chen, Z., & Zhao, M. (2017). Effective information transmission based on socialization nodes in opportunistic networks. Computer Networks, 129, 297–305.CrossRef Jia, W. U., Chen, Z., & Zhao, M. (2017). Effective information transmission based on socialization nodes in opportunistic networks. Computer Networks, 129, 297–305.CrossRef
20.
Zurück zum Zitat Wu, J., Zhao, M., & Chen, Z. (2018). Small data: Effective data based on big communication research in social networks. Wireless Personal Communications, 99(3), 1391–1404.CrossRef Wu, J., Zhao, M., & Chen, Z. (2018). Small data: Effective data based on big communication research in social networks. Wireless Personal Communications, 99(3), 1391–1404.CrossRef
22.
Zurück zum Zitat Zafarani, R., & Liu, H. (2009). Social computing data repository at ASU [http://socialcomputing.asu.edu]. Tempe, AZ: Arizona State University, School of Computing, Informatics and Decision Systems Engineering. Accessed 3 Feb 2009. Zafarani, R., & Liu, H. (2009). Social computing data repository at ASU [http://​socialcomputing.​asu.​edu]. Tempe, AZ: Arizona State University, School of Computing, Informatics and Decision Systems Engineering. Accessed 3 Feb 2009.
24.
Zurück zum Zitat Mahtar, S. N. A. M., et al. (2017). Trust aware recommender system with distrust in different views of trusted users. Journal of Fundamental and Applied Sciences, 9(5S), 168–182.CrossRef Mahtar, S. N. A. M., et al. (2017). Trust aware recommender system with distrust in different views of trusted users. Journal of Fundamental and Applied Sciences, 9(5S), 168–182.CrossRef
25.
Zurück zum Zitat Guo, G., et al. (2017). Factored similarity models with social trust for top-N item recommendation. Knowledge-Based Systems, 122, 17–25.CrossRef Guo, G., et al. (2017). Factored similarity models with social trust for top-N item recommendation. Knowledge-Based Systems, 122, 17–25.CrossRef
26.
Zurück zum Zitat Shehnepoor, S., et al. (2017). NetSpam: A network-based spam detection framework for reviews in online social media. IEEE Transactions on Information Forensics and Security, 12(7), 1585–1595.CrossRef Shehnepoor, S., et al. (2017). NetSpam: A network-based spam detection framework for reviews in online social media. IEEE Transactions on Information Forensics and Security, 12(7), 1585–1595.CrossRef
Metadaten
Titel
Dynamic reputation information propagation based malicious account detection in OSNs
verfasst von
Haoyan Liang
Zhigang Chen
Jia Wu
Publikationsdatum
21.07.2018
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-018-1795-z

Weitere Artikel der Ausgabe 7/2020

Wireless Networks 7/2020 Zur Ausgabe

Neuer Inhalt