Abstract
Nowadays, Online Social Networks (OSNs) are becoming more and more popular means of communication as they are easily accessible and offer advanced features to their users. The quantity of social network users is radically expanding each year. The increase in the number of users has also led to a tremendous increase in security threats such as the profile cloning attack. In profile cloning attacks, attackers create the exact or similar duplicate fake profiles as victims with malicious intention and deceive target individuals on OSNs. Current social networks do not offer any active security services to verify the authenticity of users who send friend requests; hence incautious users can quickly become victims of profile cloning attacks. The literature lacks effective, efficient and accurate protection techniques. This paper proposes a novel defense mechanism to protect users from profile cloning attacks on OSNs. Our scheme is based on attribute similarity, friend list similarity and strength of ties measures. We analyze user profiles, identify the key attributes and friend lists, and measure the attribute similarity and friend list similarity between profiles. Relationship strength among users can help authenticate users on OSNs. We include the relationship strength measure with the attribute and friend list similarity to distinguish between cloned and genuine profiles. The proposed defense scheme is tested with the synthetic and real-world datasets, and the results are compared with the current method. The empirical results validate the scheme’s effectiveness, efficacy, and accuracy. Our scheme outperforms the existing method and has low false rates.
Similar content being viewed by others
Availability of data and materials
Yes, On demand.
Code availability
Yes, On demand.
References
He BZ, Chen CM, Su YP, Sun HM (2014) A defence scheme against identity theft attack based on multiple social networks. Expert Syst Appl 41(5):2345–2352
Fire M, Kagan D, Elyashar A, Elovici Y (2014) Friend or foe? Fake profile identification in online social networks. Soc Netw Anal Min 1(4):1–23
Alharbi A, Dong H, Yi X, Tari Z, Khalil I (2021) Social media identity deception detection: a survey. ACM Comput Surv (CSUR) 54(3):1–35
Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2017) Malicious accounts: Dark of the social networks. J Netw Comput Appl 79:41–67
Fire M et al (2018) A sneak into the devil’s colony-fake profiles in online social networks. J Supercomput 5(1):26–39
Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th International Conference on World Wide Web, ACM, pp 551–560
Kontaxis G, Polakis I, Ioannidis S, Markatos EP (2011) Detecting social network profile cloning. In: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, pp 295–300
Jin L, Takabi H, Joshi JB (2011) Towards active detection of identity clone attacks on online social networks. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, ACM, pp 27–38
Bródka P, Sobas M, Johnson H (2014) Profile cloning detection in social networks. In: 2014 European Network Intelligence Conference, IEEE, pp 63–68
Shan Z, Cao H, Lv J, Yan C, Liu A (2013) Enhancing and identifying cloning attacks in online social networks. In: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ACM, p 59
Villar-Rodríguez E, Del Ser J, Torre-Bastida AI, Bilbao MN, Salcedo-Sanz S (2016) A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines. Concurr Comput: Pract Exp 28(4):1385–1395
Wang C, Yang B, Luo J (2017) Identity theft detection in mobile social networks using behavioral semantics. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), IEEE, pp 1–3
Mohammadrezaei M, Shiri ME, Rahmani AM (2018) Identifying fake accounts on social networks based on graph analysis and classification algorithms. Secur Commun Netw 2018
Kumar N, Dabas P et al (2019) Detection and prevention of profile cloning in online social networks. 2019 5th International Conference on Signal Processing. Computing and Control (ISPCC), IEEE, pp 287–291
Punkamol D, Marukatat R (2020) Detection of account cloning in online social networks. In: 2020 8th International Electrical Engineering Congress (iEECON), IEEE, pp 1–4
Zare M, Khasteh SH, Ghafouri S (2020) Automatic ICA detection in online social networks with PageRank. Peer-to-Peer Netw App 13(5):1297–1311
Joshi S, Nagariya HG, Dhanotiya N, Jain S (2020) Identifying fake profile in online social network: an overview and survey. International Conference on Machine Learning. Image Processing, Network Security and Data Sciences, Springer, pp 17–28
Ramalingam D, Chinnaiah V (2018) Fake profile detection techniques in large-scale online social networks: a comprehensive review. Comput Electr Eng 65:165–177
Kharaji MY, Rizi FS (2014) An iac approach for detecting profile cloning in online social networks. Int J Netw Secur App 6(1):75
Rizi FS, Khayyambashi MR, Kharaji MY (2014) A new approach for finding cloned profiles in online social networks. Int J Netw Secur 6
Zare M, Khasteh SH, Khoshroo SA (2017) A new automatic method for ica detection in online social networks. CSI J Comput Sci Eng 14(2)
Jaccard P (1901) Étude comparative de la distribution florale dans une portion des alpes et des jura. Bull Soc Vaudoise Sci Nat 37:547–579
Lorrain F, White HC (1971) Structural equivalence of individuals in social networks. J Math Sociol 1(1):49–80
Rossi R, Ahmed N (2015) The network data repository with interactive graph analytics and visualization. In: Proceedings of the AAAI Conference on Artificial Intelligence. URL: http://networkrepository.com
Funding
No funds, grants, or other support was received.
Author information
Authors and Affiliations
Contributions
All the authors have equally contributed.
Corresponding author
Ethics declarations
Ethics approval
Yes.
Consent to participate
Yes.
Consent for publication
Yes.
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jethava, G., Rao, U.P. A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs). Peer-to-Peer Netw. Appl. 15, 2253–2269 (2022). https://doi.org/10.1007/s12083-022-01344-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01344-1