Skip to main content
Log in

Detection of Malicious Profiles and Protecting Users in Online Social Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Everyone today actively uses online social networks to get in touch with their friends, for career opportunities, and business also. Some of the most popular social networks are Facebook, Instagram, LinkedIn, and Twitter. But the question is how much their authentication systems are built in a secured way. The authentication systems mostly depend on the user's general details such as name, photo, and location. In such systems, mischievous persons can easily create fake profiles by cloning the user’s identity to abuse the user’s information. Using fake profiles they can misuse original user’s photos, contacts, and videos. This kind of mischievous person can be identified by the use of privacy detection mechanisms. So, this research emphasizes some data mining techniques for protecting the original user’s information and to identify the malicious accounts in social network sites. By the assessment of 3PS (Publically Privacy Protection System), this work employs the malicious account detection method in OSN depending upon the mischievous person’s uncountable shared posts in a day and latest activity and behaviors. Examining the network similarity and comparison of attributes threshold values referred to the original user’s profile can be used to identify the malicious accounts. For this E_SVM-NN classifier is used based on the feature reduction techniques. This work involves in creating OSN accounts for experiments and investigates the latest updates, posts, comments, photos, and performing online search etc. which are used to evaluate the effectiveness and significance of the proposed work in contrast to the previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Xianghan, Z., Zhipeng, Z., Zheyi, C., Yuanlon, Y., & Chunming, R. (2015). Detecting spammers on social networks. Neuro Computing, 159, 27–34.

    Google Scholar 

  2. Kayode, S. A., Tao, H., Wanqing, W., & Houbing, S. (2018). Twitter spam account detection based on clustering and classification methods. The Journal of Supercomputing, 76, 4802–4837.

    Google Scholar 

  3. Faraz, A., & Muhammad, A. (2013). A generic statistical approach for spam detection in online social networks. Computer Communications, 36, 1120–1129.

    Article  Google Scholar 

  4. Mohammad, K. S., & Firoozeh, K. (2017). A feature selection approach to detect spam in the facebook social network. Computer Engineering and Computer Science, 43, 949–958.

    Google Scholar 

  5. Zakia, Z., & Sadia, S. (2017). Spam detection in social media employing machine learning tool for text mining. In 13th International conference on signal image technology and internet-based systems (pp. 137–142).

  6. Mohammadreza, M., Mohammad, E. S., & Amir, M. R. (2018). Identifying fake accounts on social networks based on graph analysis and classification algorithms. Hindawi Security and Communication Networks, 2018, 1–17.

    Article  Google Scholar 

  7. Husna, S., Callum, B., Zachary, D., & Aspen, O. (2016). Friend or Faux? In International conference on information society (pp. 169–170).

  8. Srinivas, R. P., Jayadev, G., & Narsimha, G. (2017). A comprehensive model for detecting fake profiles in online social networks. IJARSE, 6(2017), 385–394.

    Google Scholar 

  9. Roshani, K. C., & Dakhane, D. M. (2016). Machine learning approach for detection of malicious URLs and spam in social network. IRJET, 3, 835–839.

    Google Scholar 

  10. Mohammed, A., de Quincey, E., & Peter, A. (2017). Using supervised machine learning algorithms to detect suspicious URLs in online social networks. In International conference on advances in social networks analysis and mining (pp. 1104–1111).

  11. Cao, X., David, M. F., & Theodore, H. (2015). Detecting clusters of fake accounts in online social networks. ACM, 2015, 91–101.

    Google Scholar 

  12. Michael, M. T., Hongfei, L., Bo, X., & Liang, Y. (2018). Personality predictions based on user behaviour on the facebook social media platform. IEEE Access, 2018, 1–11.

    Google Scholar 

  13. Suchithra, M., Baskar, M., Ramkumar, J., & Kalyanasundaram, B. (2020). Amutha B, Invariant packet feature with network conditions for efficient low rate attack detection in multimedia networks for improved QoS. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02056-1.

    Article  Google Scholar 

  14. Alireza, S., Shafigheh, H., & Amir, M. R. (2018). Personality classification based on profiles of social networks’ users and the five-factor model of personality. Human Centric Computing and Information Sciences, 8, 1–15.

    Google Scholar 

  15. Jothikumar, R., Rubesh kumar, T., Jayalakshmi, P., Baskar, M., Thiagarajan, R., & Mohan, I. (2020). Enhanced resemblance measures for integration in image-rich information networks. JCR., 7(16), 106–111. https://doi.org/10.31838/jcr.07.16.14.

    Article  Google Scholar 

  16. Hatem, A. K., Emad, E., & Waleed, E. (2016). Protecting online social networks profiles by hiding sensitive data Attributes. Symposium on Data Mining Applications, 2016, 20–27.

    Google Scholar 

  17. Monika, S., Divya, B., & Sanjeev, S. (2014). Detecting malicious users in twitter using classifiers. ACM, 2014, 247–253.

    Google Scholar 

  18. Baskar, M., & Gnansekaran, T. (2017). Developing efficient intrusion tracking system using region based traffic impact measure towards the denial of service attack mitigation. Journal of Computational and Theoretical Nanoscience, 14(7), 3576–3582. (ISSN: 1546-1955 (Print): EISSN: 1546-1963 (Online)).

    Article  Google Scholar 

  19. Matthew, E., Robert, L., Benjamin, G., Awais, R., & Alistair, B. (2017). Panning for gold: Automatically analysing online social engineering attack surfaces. Computers and Security, 69, 18–34.

    Article  Google Scholar 

  20. Sumit, M. K., & Vidya, D. (2018). Automatic detection of compromised accounts and applications on OS. International Journal of Advance Scientific Research and Engineering Trends, 3(4), 9–12.

    Google Scholar 

  21. Ramkumar, J., Baskar, M., Viswak, M., & Ashish, M. D. (2020). Smart shopping with integrated secure system based on IoT. International Journal of Advanced Science and Technology, 29(5), 301–312. (ISSN: 2005-4238).

    Google Scholar 

  22. Abigail, P., Asaf, S., Rami, P., Aviad, E., Yuval, E., Mehran, R., & Christoph, P. (2017). Creation and management of social network honeypots for detecting targeted cyber attacks. IEEE Transactions on Computational Social Systems, 4(3), 65–79.

    Article  Google Scholar 

  23. Ramamurthy, M., Krishnamurthi, I., Vimal, S., & Annamalai, S. (2020). Analysis of obstructive sleep apnea disorder with accuracy prediction using SVM for smart environment. ACM Transactions on Multimedia Computing, Communications, and Applications. https://doi.org/10.1145/3382782.

    Article  Google Scholar 

  24. Georgios, K., Iasonas, P., Sotiris, I., & Evangelos, P. M. (2014). Detecting social network profile cloning. IEEE Explore, 2011, 1–13.

    Google Scholar 

  25. Hari, K. C. (2017). Online social network analysis using machine learning techniques. International Journal of Advances in Engineering & Scientific Research, 4(4), 25–40.

    Google Scholar 

  26. Arulananth, T. S., Balaji, L., Baskar, M., et al. (2020). PCA based dimensional data reduction and segmentation for DICOM images. Neural Processing Letters. https://doi.org/10.1007/s11063-020-10391-9.

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Senthil Raja.

Ethics declarations

Conflict of interest

We authors not having any conflict of interest among ourselves to submit and publish our articles in Wireless Personal Communications journal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Senthil Raja, M., Arun Raj, L. Detection of Malicious Profiles and Protecting Users in Online Social Networks. Wireless Pers Commun 127, 107–124 (2022). https://doi.org/10.1007/s11277-021-08095-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08095-x

Keywords

Navigation