Skip to main content
Log in

A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs)

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Nowadays, Online Social Networks (OSNs) are becoming more and more popular means of communication as they are easily accessible and offer advanced features to their users. The quantity of social network users is radically expanding each year. The increase in the number of users has also led to a tremendous increase in security threats such as the profile cloning attack. In profile cloning attacks, attackers create the exact or similar duplicate fake profiles as victims with malicious intention and deceive target individuals on OSNs. Current social networks do not offer any active security services to verify the authenticity of users who send friend requests; hence incautious users can quickly become victims of profile cloning attacks. The literature lacks effective, efficient and accurate protection techniques. This paper proposes a novel defense mechanism to protect users from profile cloning attacks on OSNs. Our scheme is based on attribute similarity, friend list similarity and strength of ties measures. We analyze user profiles, identify the key attributes and friend lists, and measure the attribute similarity and friend list similarity between profiles. Relationship strength among users can help authenticate users on OSNs. We include the relationship strength measure with the attribute and friend list similarity to distinguish between cloned and genuine profiles. The proposed defense scheme is tested with the synthetic and real-world datasets, and the results are compared with the current method. The empirical results validate the scheme’s effectiveness, efficacy, and accuracy. Our scheme outperforms the existing method and has low false rates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Availability of data and materials

Yes, On demand.

Code availability

Yes, On demand.

References

  1. He BZ, Chen CM, Su YP, Sun HM (2014) A defence scheme against identity theft attack based on multiple social networks. Expert Syst Appl 41(5):2345–2352

    Article  Google Scholar 

  2. Fire M, Kagan D, Elyashar A, Elovici Y (2014) Friend or foe? Fake profile identification in online social networks. Soc Netw Anal Min 1(4):1–23

    Google Scholar 

  3. Alharbi A, Dong H, Yi X, Tari Z, Khalil I (2021) Social media identity deception detection: a survey. ACM Comput Surv (CSUR) 54(3):1–35

    Article  Google Scholar 

  4. Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2017) Malicious accounts: Dark of the social networks. J Netw Comput Appl 79:41–67

    Article  Google Scholar 

  5. Fire M et al (2018) A sneak into the devil’s colony-fake profiles in online social networks. J Supercomput 5(1):26–39

    Google Scholar 

  6. Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th International Conference on World Wide Web, ACM, pp 551–560

  7. Kontaxis G, Polakis I, Ioannidis S, Markatos EP (2011) Detecting social network profile cloning. In: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, pp 295–300

  8. Jin L, Takabi H, Joshi JB (2011) Towards active detection of identity clone attacks on online social networks. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, ACM, pp 27–38

  9. Bródka P, Sobas M, Johnson H (2014) Profile cloning detection in social networks. In: 2014 European Network Intelligence Conference, IEEE, pp 63–68

  10. Shan Z, Cao H, Lv J, Yan C, Liu A (2013) Enhancing and identifying cloning attacks in online social networks. In: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ACM, p 59

  11. Villar-Rodríguez E, Del Ser J, Torre-Bastida AI, Bilbao MN, Salcedo-Sanz S (2016) A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines. Concurr Comput: Pract Exp 28(4):1385–1395

    Article  Google Scholar 

  12. Wang C, Yang B, Luo J (2017) Identity theft detection in mobile social networks using behavioral semantics. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), IEEE, pp 1–3

  13. Mohammadrezaei M, Shiri ME, Rahmani AM (2018) Identifying fake accounts on social networks based on graph analysis and classification algorithms. Secur Commun Netw 2018

  14. Kumar N, Dabas P et al (2019) Detection and prevention of profile cloning in online social networks. 2019 5th International Conference on Signal Processing. Computing and Control (ISPCC), IEEE, pp 287–291

    Google Scholar 

  15. Punkamol D, Marukatat R (2020) Detection of account cloning in online social networks. In: 2020 8th International Electrical Engineering Congress (iEECON), IEEE, pp 1–4

  16. Zare M, Khasteh SH, Ghafouri S (2020) Automatic ICA detection in online social networks with PageRank. Peer-to-Peer Netw App 13(5):1297–1311

    Article  Google Scholar 

  17. Joshi S, Nagariya HG, Dhanotiya N, Jain S (2020) Identifying fake profile in online social network: an overview and survey. International Conference on Machine Learning. Image Processing, Network Security and Data Sciences, Springer, pp 17–28

    Google Scholar 

  18. Ramalingam D, Chinnaiah V (2018) Fake profile detection techniques in large-scale online social networks: a comprehensive review. Comput Electr Eng 65:165–177

    Article  Google Scholar 

  19. Kharaji MY, Rizi FS (2014) An iac approach for detecting profile cloning in online social networks. Int J Netw Secur App 6(1):75

    Google Scholar 

  20. Rizi FS, Khayyambashi MR, Kharaji MY (2014) A new approach for finding cloned profiles in online social networks. Int J Netw Secur 6

  21. Zare M, Khasteh SH, Khoshroo SA (2017) A new automatic method for ica detection in online social networks. CSI J Comput Sci Eng 14(2)

  22. Jaccard P (1901) Étude comparative de la distribution florale dans une portion des alpes et des jura. Bull Soc Vaudoise Sci Nat 37:547–579

    Google Scholar 

  23. Lorrain F, White HC (1971) Structural equivalence of individuals in social networks. J Math Sociol 1(1):49–80

    Article  Google Scholar 

  24. Rossi R, Ahmed N (2015) The network data repository with interactive graph analytics and visualization. In: Proceedings of the AAAI Conference on Artificial Intelligence. URL: http://networkrepository.com

Download references

Funding

No funds, grants, or other support was received.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have equally contributed.

Corresponding author

Correspondence to Udai Pratap Rao.

Ethics declarations

Ethics approval

Yes.

Consent to participate

Yes.

Consent for publication

Yes.

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jethava, G., Rao, U.P. A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs). Peer-to-Peer Netw. Appl. 15, 2253–2269 (2022). https://doi.org/10.1007/s12083-022-01344-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01344-1

Keywords

Navigation