Skip to main content

Privacy-Aware Identity Cloning Detection Based on Deep Forest

  • Conference paper
  • First Online:
Service-Oriented Computing (ICSOC 2021)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 13121))

Included in the following conference series:

Abstract

We propose a novel method to detect identity cloning of social-sensor cloud service providers to prevent the detrimental outcomes caused by identity deception. This approach leverages non-privacy-sensitive user profile data gathered from social networks and a powerful deep learning model to perform cloned identity detection. We evaluated the proposed method against the state-of-the-art identity cloning detection techniques and the other popular identity deception detection models atop a real-world dataset. The results show that our method significantly outperforms these techniques/models in terms of Precision and F1-score.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.nytimes.com/2018/04/25/technology/fake-mark-zuckerberg-facebook.html.

  2. 2.

    https://www.abc.net.au/news/2018-11-29/twitter-suspends-account-impersonating-vladimir-putin/10569064.

  3. 3.

    https://help.twitter.com/en/rules-and-policies/twitter-impersonation-policy.

  4. 4.

    https://help.instagram.com/446663175382270.

  5. 5.

    https://developer.twitter.com/en/docs.

  6. 6.

    https://impersonation.mpi-sws.org/.

  7. 7.

    https://huggingface.co/sentence-transformers/paraphrase-distilroberta-base-v1.

References

  1. Aamir, T., Dong, H., Bouguettaya, A.: Social-sensor composition for tapestry scenes. IEEE Trans. Serv. Comput. (2020)

    Google Scholar 

  2. Aamir, T., Bouguettaya, A., Dong, H., et al.: Social-sensor cloud service selection. In: Proceedings of IEEE ICWS, pp. 508–515 (2017)

    Google Scholar 

  3. Aamir, T., Bouguettaya, A., Dong, H., Mistry, S., Erradi, A.: Social-sensor cloud service for scene reconstruction. In: Maximilien, M., Vallecillo, A., Wang, J., Oriol, M. (eds.) ICSOC 2017. LNCS, vol. 10601, pp. 37–52. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69035-3_3

    Chapter  Google Scholar 

  4. Al-Qurishi, M., Al-Rakhami, M., Alamri, A., et al.: Sybil defense techniques in online social networks: a survey. IEEE Access 5, 1200–1219 (2017)

    Article  Google Scholar 

  5. Alharbi, A., Dong, H., Yi, X., Abeysekara, P.: NPS-AntiClone: identity cloning detection based on non-privacy-sensitive user profile data. In: Proceedings of IEEE ICWS (2021)

    Google Scholar 

  6. Alharbi, A., Dong, H., Yi, X., et al.: Social media identity deception detection: a survey. CSUR 54(3), 1–35 (2021)

    Article  Google Scholar 

  7. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of WWW, pp. 551–560 (2009)

    Google Scholar 

  8. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)

    Article  Google Scholar 

  9. Carroll, J.D.: Generalization of canonical correlation analysis to three or more sets of variables. In: Proceedings of APA Convention, pp. 227–228 (1968)

    Google Scholar 

  10. Christen, P.: Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31164-2

    Book  Google Scholar 

  11. Cohen, W.W., Ravikumar, P., Fienberg, S.E.: A comparison of string distance metrics for name-matching tasks. In: Proceedings of IIWeb, pp. 73–78 (2003)

    Google Scholar 

  12. Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805 (2018)

  13. Devmane, M., Rana, N.: Detection and prevention of profile cloning in online social networks. In: Proceedings of ICRAIE, pp. 1–5 (2014)

    Google Scholar 

  14. Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3–42 (2006)

    Article  Google Scholar 

  15. Goga, O., Venkatadri, G., Gummadi, K.P.: The Doppelgänger bot attack: exploring identity impersonation in online social networks. In: Proceedings of IMC, pp. 141–153 (2015)

    Google Scholar 

  16. Grover, A., Leskovec, J.: Node2Vec: scalable feature learning for networks. In: Proceedings of SIGKDD, pp. 855–864 (2016)

    Google Scholar 

  17. Hotelling, H.: Relations between two sets of variates. In: Breakthroughs in Statistics, pp. 162–190 (1992)

    Google Scholar 

  18. Jin, L., Takabi, H., Joshi, J.B.: Towards active detection of identity clone attacks on online social networks. In: Proceedings of CODASPY, pp. 27–38 (2011)

    Google Scholar 

  19. Kamhoua, G.A., Pissinou, N., Iyengar, S., et al.: Preventing colluding identity clone attacks in online social networks. In: Proceedings of ICDCSW, pp. 187–192 (2017)

    Google Scholar 

  20. Kontaxis, G., Polakis, I., Ioannidis, S. Markatos, E.P.: Detecting social network profile cloning. In: Proceedings of PERCOM Workshops, pp. 295–300 (2011)

    Google Scholar 

  21. Masood, F., Almogren, A., Abbas, A., et al.: Spammer detection and fake user identification on social networks. IEEE Access 7, 68140–68152 (2019)

    Article  Google Scholar 

  22. Najafabadi, M.M., Villanustre, F., Khoshgoftaar, T.M., Seliya, N., Wald, R., Muharemagic, E.: Deep learning applications and challenges in big data analytics. J. Big Data 2(1), 1–21 (2015). https://doi.org/10.1186/s40537-014-0007-7

    Article  Google Scholar 

  23. Reimers, N., Gurevych, I.: Sentence-BERT: sentence embeddings using Siamese BERT-networks. In: Proceedings of EMNLP-IJCNLP (2019)

    Google Scholar 

  24. Robinson, P.M.: Generalized canonical analysis for time series. JMVA 3(2), 141–160 (1973)

    MathSciNet  MATH  Google Scholar 

  25. Rosi, A., Mamei, M., Zambonelli, F., et al.: Social sensors and pervasive services: approaches and perspectives. In: Proceedings of PERCOM Workshops, pp. 525–530 (2011)

    Google Scholar 

  26. Tenenhaus, A., Tenenhaus, M.: Regularized generalized canonical correlation analysis. Psychometrika 76(2), 257 (2011)

    Article  MathSciNet  Google Scholar 

  27. Zheng, X., Zeng, Z., Chen, Z., et al.: Detecting spammers on social networks. Neurocomputing 159, 27–34 (2015)

    Article  Google Scholar 

  28. Zhou, Z.H.: Ensemble Methods: Foundations and Algorithms. CRC Press, Boca Raton (2012)

    Book  Google Scholar 

  29. Zhou, Z.H., Feng, J.: Deep forest: towards an alternative to deep neural networks. In: Proceedings of IJCAI, pp. 3553–3559 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hai Dong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alharbi, A., Dong, H., Yi, X., Abeysekara, P. (2021). Privacy-Aware Identity Cloning Detection Based on Deep Forest. In: Hacid, H., Kao, O., Mecella, M., Moha, N., Paik, Hy. (eds) Service-Oriented Computing. ICSOC 2021. Lecture Notes in Computer Science(), vol 13121. Springer, Cham. https://doi.org/10.1007/978-3-030-91431-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91431-8_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91430-1

  • Online ISBN: 978-3-030-91431-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics