Advertisement

Trust-Based Security Mechanism for Detecting Clusters of Fake Users in Social Networks

  • Davinder Kaur
  • Suleyman Uslu
  • Arjan DurresiEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 927)

Abstract

Inspired by the ability of the trust mechanism which can capture human trust using measurement theory we have designed trust-based security mechanism to find clusters of fake users in social networks. Proposed framework enables us to take human and community knowledge into a loop by using a variation of trust to detect fake users. This framework will increase the accuracy of detecting fake users by using both human and machine knowledge. Experiments are performed on randomly generated social networks to validate the potential of this framework. Results show that the variation of trust over time can able to differentiate between clusters of fake users from clusters of real users.

Notes

Acknowledgments

This work was partially supported by the National Science Foundation under Grant No. 1547411 and by the U.S. Department of Agriculture (USDA) National Institute of Food and Agriculture (NIFA) (Award Number 2017-67003-26057) via an interagency partnership between USDA-NIFA and the National Science Foundation (NSF) on the research program Innovations at the Nexus of Food, Energy and Water Systems.

References

  1. 1.
    Zhang, P., Durresi, A.: Trust management framework for social networks. In: 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, pp. 1042–1047 (2012)Google Scholar
  2. 2.
    Zhang, P., Durresi, A., Barolli, L.: Survey of trust management on various networks. In: 2011 International Conference on Complex, Intelligent, and Software Intensive Systems, Seoul, pp. 219–226 (2011)Google Scholar
  3. 3.
    Ruan, Y., Durresi, A., Uslu, S.: Trust assessment for internet of things in multi-access edge computing. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, pp. 1155–1161 (2018)Google Scholar
  4. 4.
    Ruan, Y., Durresi, A., Alfantoukh, L.: Using Twitter trust network for stock market analysis. Knowl.-Based Syst. 145, 207–218 (2018)CrossRefGoogle Scholar
  5. 5.
    Ruan, Y., Zhang, P., Alfantoukh, L., Durresi, A.: Measurement theory-based trust management framework for online social communities. ACM Trans. Internet Technol. 17(2), 24 (2017). Article 16CrossRefGoogle Scholar
  6. 6.
    Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities – trust modeling, trust inference and attacks. Knowl.-Based Syst. 106, 150–163 (2016)CrossRefGoogle Scholar
  7. 7.
    Ruan, Y., Durresi, A., Alfantoukh, L.: Trust management framework for internet of things. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, pp. 1013–1019 (2016)Google Scholar
  8. 8.
    Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI 2012), p. 15. USENIX Association, Berkeley (2012)Google Scholar
  9. 9.
    McAuley, J., Leskovec, J.: Learning to discover social circles in ego networks. In: Pereira, F., Burges, C.J.C., Bottou, L., Weinberger, K.Q. (eds.) Proceedings of the 25th International Conference on Neural Information Processing Systems - Volume 1, (NIPS 2012), vol. 1, pp. 539–547. Curran Associates Inc. (2012)Google Scholar
  10. 10.
    Fire, M., Katz, G., Elovici, Y.: Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies. Hum. J. 1(1), 26–39 (2012)Google Scholar
  11. 11.
    Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96–104 (2016)CrossRefGoogle Scholar
  12. 12.
    Xiao, C., Freeman, D.M., Hwa, T.: Detecting clusters of fake accounts in online social networks. In: Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. ACM (2015)Google Scholar
  13. 13.
    Zhang, Z., Kulkarni, S.R.: Detection of shilling attacks in recommender systems via spectral clustering. In: 2014 17th International Conference on Information Fusion (FUSION). IEEE (2014)Google Scholar
  14. 14.
    Kagan, D., Elovichi, Y., Fire, M.: Generic anomalous vertices detection utilizing a link prediction algorithm. Soc. Netw. Anal. Min. 8(1), 27 (2018)CrossRefGoogle Scholar
  15. 15.
    Hamlili, A.: Intelligibility of Erdös-Rényi random graphs and time varying social network modeling. In: ICSDE (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer and Information ScienceIndiana University Purdue UniversityIndianapolisUSA

Personalised recommendations