Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2020

04-03-2020

Automatic ICA detection in online social networks with PageRank

Authors: Maryam Zare, Seyed Hossein Khasteh, Saeid Ghafouri

Published in: Peer-to-Peer Networking and Applications | Issue 5/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays, online social networks have become an essential part of humans. However, there are some dark side to this widespread use of online social networks. One of them is the fact that many attackers have succeeded to clone celebrities’ profiles and have attracted hundreds or thousands of followers. This type of forging has caused many problems for famous people. This phenomenon is commonly known as Identity Cloning Attack which is abbreviated to ICA in the literature. ICA occurs when a malicious user selects one of the famous users of a social network as his victim. The attacker then creates a user account similar to the victim’s profile and embarks on various malicious social activities. In this paper, we have proposed an automatic method to identify cloned profiles. This method consists of three main steps and is implemented on Hadoop framework using the MapReduce programming model. In the first step, we count the number of followers of each user and store it as an attribute for their profile. In the second step, the network users are clustered based on their profile attributes and their number of followers. Subsequently, we move all the profiles within the same cluster as the victim’s profile to the next step and consider them as suspicious profiles. The victim’s profile is a profile of a celebrity, where the proposed method is conducted to verify its authenticity. In the third step, we eventually select the profile with the highest rank as the valid profile. This method of ranking the profiles is based on the outcome of PageRank algorithm in the first step. This method is easily applicable and does not require any additional information for identifying the original user account. Furthermore, this method employs a distributed processing framework, limits the search space, and decreases the required computation by clustering the profiles. We have applied the suggested method to a dataset that we collected from Instagram. Our findings were quite promising, and in some situations, we were able to identify all the cloned profiles with a 100% accuracy. The results are comparable to the best ones in this area of study.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Basnet R, Mukkamala S, and Sung AH (2008) "Detection of phishing attacks: A machine learning approach," in Soft Computing Applications in Industry: Springer, pp. 373–383 Basnet R, Mukkamala S, and Sung AH (2008) "Detection of phishing attacks: A machine learning approach," in Soft Computing Applications in Industry: Springer, pp. 373–383
2.
go back to reference Shariff SM and Zhang X (2014) "A survey on deceptions in online social networks," in Computer and Information Sciences (ICCOINS), 2014 International Conference on, pp. 1–6: IEEE Shariff SM and Zhang X (2014) "A survey on deceptions in online social networks," in Computer and Information Sciences (ICCOINS), 2014 International Conference on, pp. 1–6: IEEE
3.
go back to reference Heydari A, Tavakoli MA, Salim N, Heydari Z (2015) Detection of review spam: a survey. Expert Syst Appl 42(7):3634–3642CrossRef Heydari A, Tavakoli MA, Salim N, Heydari Z (2015) Detection of review spam: a survey. Expert Syst Appl 42(7):3634–3642CrossRef
4.
go back to reference Bilge L, Strufe T, Balzarotti D, and Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks," in Proceedings of the 18th international conference on World wide web, pp. 551–560: ACM Bilge L, Strufe T, Balzarotti D, and Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks," in Proceedings of the 18th international conference on World wide web, pp. 551–560: ACM
5.
go back to reference Jin L, Takabi H, and Joshi JB (2011) "Towards active detection of identity clone attacks on online social networks," in Proceedings of the first ACM conference on Data and application security and privacy, pp. 27–38: ACM Jin L, Takabi H, and Joshi JB (2011) "Towards active detection of identity clone attacks on online social networks," in Proceedings of the first ACM conference on Data and application security and privacy, pp. 27–38: ACM
6.
go back to reference Kharaji MY, Rizi FS (2014) "An IAC Approach for Detecting Profile Cloning in Online Social Networks," arXiv preprint arXiv:1403.2006 Kharaji MY, Rizi FS (2014) "An IAC Approach for Detecting Profile Cloning in Online Social Networks," arXiv preprint arXiv:1403.2006
7.
go back to reference Zabielski M, Tarapata Z, Kasprzyk R, and Szkółka K (2016) "Profile cloning detection in online social networks," Computer Science and Mathematical Modelling Zabielski M, Tarapata Z, Kasprzyk R, and Szkółka K (2016) "Profile cloning detection in online social networks," Computer Science and Mathematical Modelling
8.
go back to reference Khan WZ, Aalsalem MY, Saad MNBM, and Xiang Y (2013) "Detection and mitigation of node replication attacks in wireless sensor networks: a survey," International Journal of Distributed Sensor Networks, vol. 9, no. 5, p. 149023 Khan WZ, Aalsalem MY, Saad MNBM, and Xiang Y (2013) "Detection and mitigation of node replication attacks in wireless sensor networks: a survey," International Journal of Distributed Sensor Networks, vol. 9, no. 5, p. 149023
9.
go back to reference Choi H, Zhu S, and La Porta TF (2007) "SET: Detecting node clones in sensor networks," in Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, pp. 341–350: IEEE Choi H, Zhu S, and La Porta TF (2007) "SET: Detecting node clones in sensor networks," in Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, pp. 341–350: IEEE
10.
go back to reference Brooks R, Govindaraju P, Pirretti M, Vijaykrishnan N, Kandemir MT (2007) On the detection of clones in sensor networks using random key predistribution. IEEE Trans Syst Man Cybern Part C Appl Rev 37(6):1246–1258CrossRef Brooks R, Govindaraju P, Pirretti M, Vijaykrishnan N, Kandemir MT (2007) On the detection of clones in sensor networks using random key predistribution. IEEE Trans Syst Man Cybern Part C Appl Rev 37(6):1246–1258CrossRef
11.
go back to reference Xing K, Liu F, Cheng X, and Du DH (2008) "Real-time detection of clone attacks in wireless sensor networks," in Distributed Computing Systems, 2008. ICDCS’08. The 28th International Conference on, pp. 3–10: IEEE Xing K, Liu F, Cheng X, and Du DH (2008) "Real-time detection of clone attacks in wireless sensor networks," in Distributed Computing Systems, 2008. ICDCS’08. The 28th International Conference on, pp. 3–10: IEEE
12.
go back to reference Zhu B, Setia S, Jajodia S, Roy S, Wang L (2010) Localized multicast: efficient and distributed replica detection in large-scale sensor networks. IEEE Trans Mob Comput 9(7):913–926CrossRef Zhu B, Setia S, Jajodia S, Roy S, Wang L (2010) Localized multicast: efficient and distributed replica detection in large-scale sensor networks. IEEE Trans Mob Comput 9(7):913–926CrossRef
13.
go back to reference Ko LC, Chen HY, and Lin GR (2009) "A neighbor-based detection scheme for wireless sensor networks against node replication attacks," in Ultra Modern Telecommunications & Workshops, 2009. ICUMT’09. International Conference on, pp. 1–6: IEEE Ko LC, Chen HY, and Lin GR (2009) "A neighbor-based detection scheme for wireless sensor networks against node replication attacks," in Ultra Modern Telecommunications & Workshops, 2009. ICUMT’09. International Conference on, pp. 1–6: IEEE
14.
go back to reference Conti M, Poovendran R, and Secchiero M (2012) "Fakebook: Detecting fake profiles in on-line social networks," in Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), 2012, pp. 1071–1078: IEEE Computer Society Conti M, Poovendran R, and Secchiero M (2012) "Fakebook: Detecting fake profiles in on-line social networks," in Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), 2012, pp. 1071–1078: IEEE Computer Society
15.
go back to reference Madhavi A, Narayana Reddy VS (2016) Automated detection of fake profiles using simple framework: SVM. IJACTA 4(1):176–181 Madhavi A, Narayana Reddy VS (2016) Automated detection of fake profiles using simple framework: SVM. IJACTA 4(1):176–181
16.
go back to reference Boshmaf Y et al (2016) Íntegro: leveraging victim prediction for robust fake account detection in large scale OSNs. Computers & Security 61:142–168CrossRef Boshmaf Y et al (2016) Íntegro: leveraging victim prediction for robust fake account detection in large scale OSNs. Computers & Security 61:142–168CrossRef
17.
go back to reference Kontaxis G, Polakis I, Ioannidis S, and Markatos EP (2011) "Detecting social network profile cloning," in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, 2011, pp. 295–300: IEEE Kontaxis G, Polakis I, Ioannidis S, and Markatos EP (2011) "Detecting social network profile cloning," in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, 2011, pp. 295–300: IEEE
18.
go back to reference M. Y. Kharaji, F. S. Rizi, and M. R. Khayyambashi (2014) "A new approach for finding cloned profiles in online social networks," arXiv preprint arXiv:1406.7377 M. Y. Kharaji, F. S. Rizi, and M. R. Khayyambashi (2014) "A new approach for finding cloned profiles in online social networks," arXiv preprint arXiv:1406.7377
19.
go back to reference Khayyambashi MR and Rizi FS (2013) "An approach for detecting profile cloning in online social networks," in E-Commerce in Developing Countries: With Focus on E-Security (ECDC), 2013 7th Intenational Conference on, pp. 1–12: IEEE Khayyambashi MR and Rizi FS (2013) "An approach for detecting profile cloning in online social networks," in E-Commerce in Developing Countries: With Focus on E-Security (ECDC), 2013 7th Intenational Conference on, pp. 1–12: IEEE
20.
go back to reference Meligy AM, Ibrahim HM, Torky MF (2015) A Framework for Detecting Cloning Attacks in OSN Based on a Novel Social Graph Topology. International Journal of Intelligent Systems and Applications 7(3):13CrossRef Meligy AM, Ibrahim HM, Torky MF (2015) A Framework for Detecting Cloning Attacks in OSN Based on a Novel Social Graph Topology. International Journal of Intelligent Systems and Applications 7(3):13CrossRef
22.
go back to reference Shan Z, Cao H, Lv J, Yan C, and Liu A (2013) "Enhancing and identifying cloning attacks in online social networks," in Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, p. 59: ACM Shan Z, Cao H, Lv J, Yan C, and Liu A (2013) "Enhancing and identifying cloning attacks in online social networks," in Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, p. 59: ACM
23.
go back to reference Kiruthiga S and Kannan A (2014) "Detecting cloning attack in Social Networks using classification and clustering techniques," in Recent Trends in Information Technology (ICRTIT), 2014 International Conference on, pp. 1–6: IEEE Kiruthiga S and Kannan A (2014) "Detecting cloning attack in Social Networks using classification and clustering techniques," in Recent Trends in Information Technology (ICRTIT), 2014 International Conference on, pp. 1–6: IEEE
24.
go back to reference Ramalingam D, Chinnaiah V (2018) Fake profile detection techniques in large-scale online social networks: a comprehensive review. Comput Electr Eng 65(3):165–177CrossRef Ramalingam D, Chinnaiah V (2018) Fake profile detection techniques in large-scale online social networks: a comprehensive review. Comput Electr Eng 65(3):165–177CrossRef
25.
go back to reference Wang G, Konolige T, Wilson C, Wang X, Zheng H, and Zhao BY (2013) “You are how you click: Clickstream analysis for sybil detection.” in USENIX Security Symposium, vol. 9, pp. 1–008 Wang G, Konolige T, Wilson C, Wang X, Zheng H, and Zhao BY (2013) “You are how you click: Clickstream analysis for sybil detection.” in USENIX Security Symposium, vol. 9, pp. 1–008
26.
go back to reference Viswanath B, Bashir MA, Crovella M, Guha S, Gummadi KP, Krishnamurthy B, and Mislove A (2014) “Towards detecting anomalous user behavior in online social networks.” in USENIX Security Symposium, pp. 223–238 Viswanath B, Bashir MA, Crovella M, Guha S, Gummadi KP, Krishnamurthy B, and Mislove A (2014) “Towards detecting anomalous user behavior in online social networks.” in USENIX Security Symposium, pp. 223–238
27.
go back to reference Amato F, Castiglione A, De Santo A, Moscato V, Picariello A, Persia F, Sperlí G (2018) Recognizing human behaviours in online social networks. Comput Secur 74:355–370CrossRef Amato F, Castiglione A, De Santo A, Moscato V, Picariello A, Persia F, Sperlí G (2018) Recognizing human behaviours in online social networks. Comput Secur 74:355–370CrossRef
28.
go back to reference Gong Q, Chen Y, He X, Zhaung Z, Wang T, Huang H, Wang X, Fu X (2018) DeepScan: exploiting deep learning for malicious account detection in location-based social networks. IEEE Commun Mag 56(11):21–27CrossRef Gong Q, Chen Y, He X, Zhaung Z, Wang T, Huang H, Wang X, Fu X (2018) DeepScan: exploiting deep learning for malicious account detection in location-based social networks. IEEE Commun Mag 56(11):21–27CrossRef
29.
go back to reference El Azab A, Idrees AM, Mahmoud MA, Hefny H (2016) Fake account detection in twitter based on minimum weighted feature set. World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering 10(1):13–18 El Azab A, Idrees AM, Mahmoud MA, Hefny H (2016) Fake account detection in twitter based on minimum weighted feature set. World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering 10(1):13–18
30.
go back to reference Karegowda AG, Manjunath AS, Jayaram MA (July-December 2010) Comparative study of attribute selection using gain ratio. International Journal of Information Technology and Knowledge Management 2(2):271–277 Karegowda AG, Manjunath AS, Jayaram MA (July-December 2010) Comparative study of attribute selection using gain ratio. International Journal of Information Technology and Knowledge Management 2(2):271–277
31.
go back to reference Mulamba D, Ray I, and Ray I (2016) "SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks," in IFIP International Information Security and Privacy Conference, 2016, pp. 179–193: Springer Mulamba D, Ray I, and Ray I (2016) "SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks," in IFIP International Information Security and Privacy Conference, 2016, pp. 179–193: Springer
32.
go back to reference Gao P, Gong NZ, Kulkarni S, Thomas K, and Mittal P (2015) “SybilFrame: a defense-in-depth framework for StructureBased Sybil detection,” Gao P, Gong NZ, Kulkarni S, Thomas K, and Mittal P (2015) “SybilFrame: a defense-in-depth framework for StructureBased Sybil detection,”
33.
go back to reference Ma X, Ma J, Li H, Jiang Q, Gao S (2018) ARMOR: a trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Futur Gener Comput Syst 79:82–94CrossRef Ma X, Ma J, Li H, Jiang Q, Gao S (2018) ARMOR: a trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Futur Gener Comput Syst 79:82–94CrossRef
34.
go back to reference Wang C, Yang B, and Luo J (2017) "Identity theft detection in mobile social networks using behavioral semantics," in 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–3: IEEE Wang C, Yang B, and Luo J (2017) "Identity theft detection in mobile social networks using behavioral semantics," in 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–3: IEEE
35.
go back to reference Ramalingam D, Chinnaiah V (2018) Fake profile detection techniques in large-scale online social networks: a comprehensive review. Computers & Electrical Engineering 65:165–177CrossRef Ramalingam D, Chinnaiah V (2018) Fake profile detection techniques in large-scale online social networks: a comprehensive review. Computers & Electrical Engineering 65:165–177CrossRef
36.
go back to reference Zhu WT, Zhou J, Deng RH, Bao F (2012) Detecting node replication attacks in wireless sensor networks: a survey. J Netw Comput Appl 35(3):1022–1034CrossRef Zhu WT, Zhou J, Deng RH, Bao F (2012) Detecting node replication attacks in wireless sensor networks: a survey. J Netw Comput Appl 35(3):1022–1034CrossRef
37.
go back to reference Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30(1–7):107–117CrossRef Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30(1–7):107–117CrossRef
38.
go back to reference Ferrara E, Interdonato R, and Tagarelli A (2014) "Online popularity and topical interests through the lens of instagram," in Proceedings of the 25th ACM conference on Hypertext and social media, pp. 24–34: ACM Ferrara E, Interdonato R, and Tagarelli A (2014) "Online popularity and topical interests through the lens of instagram," in Proceedings of the 25th ACM conference on Hypertext and social media, pp. 24–34: ACM
39.
go back to reference Breiman L (2001) "Random forests," Mach Learn Breiman L (2001) "Random forests," Mach Learn
40.
go back to reference Rokach L, Maimon O (2005) Data mining and knowledge discovery handbook - chapter 9 (decision trees), Oded Maimon and Lior Rokach, Eds. Rokach L, Maimon O (2005) Data mining and knowledge discovery handbook - chapter 9 (decision trees), Oded Maimon and Lior Rokach, Eds.
41.
go back to reference Manning CD, Raghavan P, Schütze H (2008) Introduction to information retrieval. Cambridge University, New YorkCrossRef Manning CD, Raghavan P, Schütze H (2008) Introduction to information retrieval. Cambridge University, New YorkCrossRef
43.
go back to reference Joachims T (2002) Learning to classify text using support vector machines: methods, theory, and algorithms. Kluwer Academic Publishers, BostonCrossRef Joachims T (2002) Learning to classify text using support vector machines: methods, theory, and algorithms. Kluwer Academic Publishers, BostonCrossRef
Metadata
Title
Automatic ICA detection in online social networks with PageRank
Authors
Maryam Zare
Seyed Hossein Khasteh
Saeid Ghafouri
Publication date
04-03-2020
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00894-6

Other articles of this Issue 5/2020

Peer-to-Peer Networking and Applications 5/2020 Go to the issue

Premium Partner