Frauds in Online Social Networks: A Review

  • Manoj ApteEmail author
  • Girish Keshav Palshikar
  • Sriram Baskaran
Part of the Lecture Notes in Social Networks book series (LNSN)


With the widespread use of computers, communications infrastructure, and the Internet, online social networks (OSN) have gained a huge popularity in recent years. Unfortunately, the very nature and popularity of OSN have brought about its own share of frauds and misuse. Frauds in OSN refer to activities that result in harassment, loss of money, loss of reputation of a person or an entity, loss of trust in the system or an individual, etc. Due to the complex structure, and information flow in OSN, as well as the relative anonymity of the identity, detection, control and prevention of frauds in OSN is difficult, time-consuming, error-prone and demands an unusually high level of technical finesse from the investigators. In this paper, we begin with a simple typology of OSN frauds and then follow up by describing in detail the nature of each fraud and by reviewing some of the state-of-the-art research done so far (mostly in machine learning, data mining, and text mining) to detect them. Where possible, we stress on the scale and impact of these frauds. We identify manipulation of identities and diffusion of misinformation as two important aspects in the modus operandi of most types of OSN frauds. We identify manipulation of identities and diffusion of misinformation as two important aspects in the modus operandi of most types of OSN frauds.


Cyber Stalking Fake Account Hashtags Phishing Site Jack Brand 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    N. Abdelhamid, A. Ayesh, F. Thabtah, Phishing detection based associative classification data mining. Expert Syst. Appl. 41(13), 5948–5959 (2014)CrossRefGoogle Scholar
  2. 2.
    N.A. Adawi, Social networking and “brand-jacking”–is it infringement? (2010)Google Scholar
  3. 3.
    A. Aggarwal, A. Rajadesingan, P. Kumaraguru, Phishari: automatic realtime phishing detection on twitter, in Proceedings of IEEE eCrime Researchers Summit (2012)Google Scholar
  4. 4.
    E. Aïmeur, D. Schőnfeld, The ultimate invasion of privacy: identity theft, in 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST) (IEEE, New York, 2011), pp. 24–31Google Scholar
  5. 5.
    S.F.H. Allison, A.M. Schuck, K.M. Lersch, Exploring the crime of identity theft: prevalence, clearance rates, and victim/offender characteristics. J. Crim. Just. 33(1), 19–29 (2005)CrossRefGoogle Scholar
  6. 6.
    L. Bilge, T. Strufe, D. Balzarotti, E. Kirda, All your contacts are belong to us: automated identity theft attacks on social networks, in Proceedings of the 18th International Conference on World Wide Web (ACM, New York, 2009), pp. 551–560Google Scholar
  7. 7.
    M. Burmester, P. Henry, L.S. Kermes, Tracking cyberstalkers: a cryptographic approach. ACM SIGCAS Comput. Soc. 35(3), 2 (2005)Google Scholar
  8. 8.
    C. Castillo, M. Mendoza, B. Poblete, Information credibility on twitter, in Proceedings of the 20th International Conference on World Wide Web (ACM, New York, 2011), pp. 675–684Google Scholar
  9. 9.
    T. Chang, P.Y. Hsu, M.S. Cheng, C.Y. Chung, Y.L. Chung, Detecting fake review with rumor model—case study in hotel review, in International Conference on Intelligent Science and Big Data Engineering (Springer, Berlin, 2015), pp. 181–192Google Scholar
  10. 10.
    M. Dadvar, F.M.G. de Jong, R.J.F. Ordelman, R.B. Trieschnigg, Improved cyberbullying detection using gender information (2012)Google Scholar
  11. 11.
    G. Danezis, P. Mittal, Sybilinfer: detecting sybil nodes using social networks, in NDSS, San Diego, CA (2009)Google Scholar
  12. 12.
    K. Dinakar, R. Reichart, H. Lieberman, Modeling the detection of textual cyberbullying. Soc. Mob. Web 11(02), 11–17 (2011)Google Scholar
  13. 13.
    H. Dreßing, J. Bailer, A. Anders, H. Wagner, C. Gallas, Cyberstalking in a large sample of social network users: prevalence, characteristics, and impact upon victims. Cyberpsychol. Behav. Soc. Netw. 17(2), 61–67 (2014)CrossRefGoogle Scholar
  14. 14.
    M. Egele, G. Stringhini, C. Kruegel, G. Vigna, Compa: detecting compromised accounts on social networks, in Proceedings of Symposium on Network and Distributed System Security (NDSS) (2013)Google Scholar
  15. 15.
    S. Egelman, L.F. Cranor, J. Hong, You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (ACM, New York, 2008), pp. 1065–1074Google Scholar
  16. 16.
    S. Feng, L. Xing, A. Gogar, Y. Choi, Distributional footprints of deceptive product reviews. ICWSM 12, 98–105 (2012)Google Scholar
  17. 17.
    I. Fette, N. Sadeh, A. Tomasic, Learning to detect phishing emails, in Proceedings of the International Conference on World Wide Web (WWW2007) (2007), pp. 55–56Google Scholar
  18. 18.
    S. Garera, N. Provos, M. Chew, A.D. Rubin, A framework for detection and measurement of phishing attacks, in Proceedings of (WORM 2007) (2007)Google Scholar
  19. 19.
    A.T. Hadgu, K. Garimella, I. Weber, Political hashtag hijacking in the U.S. (2013)Google Scholar
  20. 20.
    C.J. Hoofnagle, Identity theft: making the known unknowns known. Harv. J. Law Technol. 21, 97 (2007)Google Scholar
  21. 21.
    T.N. Jagatic, N.A. Johnson, M. Jakobsson, F. Menczer, Social phishing. Commun. ACM 50(10), 94–100 (2007)CrossRefGoogle Scholar
  22. 22.
    N. Jain, P. Agarwal, J. Pruthi, Hashjacker-detection and analysis of hashtag hijacking on twitter. Int. J. Comput. Appl. 114(19), 17–20 (2015)Google Scholar
  23. 23.
    F. Jin, E. Dougherty, P. Saraf, Y. Cao, N. Ramakrishnan, Epidemiological modeling of news and rumors on twitter, in Proceedings of the 7th Workshop on Social Network Mining and Analysis (ACM, New York, 2013), p. 8Google Scholar
  24. 24.
    N. Jindal, B. Liu, Opinion spam and analysis, in Proceedings of the 2008 International Conference on Web Search and Data Mining (ACM, New York, 2008), pp. 219–230Google Scholar
  25. 25.
    N. Jindal, B. Liu, E.-P. Lim, Finding unusual review patterns using unexpected rules, in Proceedings of the 19th ACM International Conference on Information and Knowledge Management (ACM, New York, 2010), pp. 1549–1552Google Scholar
  26. 26.
    M. Khonji, Y. Iraqi, A. Jones, Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4), 2091–2121 (2013)CrossRefGoogle Scholar
  27. 27.
    H. Lamba, M.M. Malik, J. Pfeffer, A tempest in a teacup? analyzing firestorms on twitter, in 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (IEEE, New York, 2015), pp. 17–24Google Scholar
  28. 28.
    T. Lappas, Fake reviews: the malicious perspective, in International Conference on Application of Natural Language to Information Systems (Springer, Berlin, 2012), pp. 23–34Google Scholar
  29. 29.
    E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, H.W. Lauw, Detecting product review spammers using rating behaviors, in Proceedings of the 19th ACM International Conference on Information and Knowledge Management (ACM, New York, 2010), pp. 939–948Google Scholar
  30. 30.
    J. Liu, Y. Cao, C.-Y. Lin, Y. Huang, M. Zhou, Low-quality product review detection in opinion summarization, in EMNLP-CoNLL, vol. 7 (2007), pp. 334–342Google Scholar
  31. 31.
    C. Ludl, S. McAllister, E. Kirda, C. Kruegel, On the effectiveness of techniques to detect phishing sites, in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (Springer, Berlin, 2007), pp. 20–39CrossRefGoogle Scholar
  32. 32.
    M. Lukasik, T. Cohn, K. Bontcheva, Classifying tweet level judgements of rumours in social media, in Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP2015) (2015), pp. 2590–2595Google Scholar
  33. 33.
    J. Ma, L.K. Saul, S. Savage, G.M. Voelker, Beyond blacklists: learning to detect malicious web sites from suspicious urls, in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, New York, 2009), pp. 1245–1254Google Scholar
  34. 34.
    R.T. Mercuri, Scoping identity theft. Commun. ACM 49(5), 17–21 (2006)CrossRefGoogle Scholar
  35. 35.
    A. Mukherjee, B. Liu, N. Glance, Spotting fake reviewer groups in consumer reviews, in Proceedings of the 21st International Conference on World Wide Web (ACM, New York, 2012), pp. 191–200Google Scholar
  36. 36.
    G.R. Newman, M.M. McNally, Identity theft literature review. US Department of Justice Document No. 210459 (2005)Google Scholar
  37. 37.
    S. Sedhai, A. Sun, Hspam14: a collection of 14 million tweets for hashtag-oriented spam research, in Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (ACM, New York, 2015), pp. 223–232Google Scholar
  38. 38.
    D.N. Tran, B. Min, J. Li, L. Subramanian, Sybil-resilient online content voting, in NSDI, vol. 9 (2009), pp. 15–28Google Scholar
  39. 39.
    L. Von Ahn, B. Maurer, C. McMillen, D. Abraham, M. Blum, recaptcha: human-based character recognition via web security measures. Science 321(5895), 1465–1468 (2008)Google Scholar
  40. 40.
    D. Wang, A. Musaev, C. Pu, Information diffusion analysis of rumor dynamics over a social-interaction based model, in 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) (IEEE, New York, 2016), pp. 312–320Google Scholar
  41. 41.
    L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, X. Deng, Detection of phishing webpages based on visual similarity, in Proceedings of the International Conference on World Wide Web(WWW2005) (2005), pp. 1060–1061Google Scholar
  42. 42.
    C. Whittaker, B. Ryner, M. Nazif, Large-scale automatic classification of phishing pages, in NDSS, vol. 10 (2010)Google Scholar
  43. 43.
    S.-H. Wu, M.-J. Chou, C.-H. Tseng, Y.-J. Lee, K.-T. Chen, Detecting in-situ identity fraud on social network services: a case study with facebook, in Proceedings of the 23rd International Conference on World Wide Web(WWW2014) (2014), pp. 401–402Google Scholar
  44. 44.
    K. Wu, S. Yang, K.Q. Zhu, False rumors detection on sina weibo by propagation structures. In 2015 IEEE 31st International Conference on Data Engineering (ICDE) (IEEE, New York, 2015), pp. 651–662Google Scholar
  45. 45.
    Y. Yang, M. Manoharan, K.S. Barber, Modelling and analysis of identity threat behaviors through text mining of identity theft stories, in Proceedings of IEEE Joint Intelligence and Security Informatics Conference (JISIC) (2014), pp. 184–191Google Scholar
  46. 46.
    Z. Yang, C. Wilson, X. Wang, T. Gao, B.Y. Zhao, Y. Dai, Uncovering social network sybils in the wild. ACM Trans. Knowl. Discov. Data 8(1), 2 (2014)Google Scholar
  47. 47.
    D. Yin, Z. Xue, L. Hong, B.D. Davison, A. Kontostathis, L. Edwards, Detection of harassment on web 2.0, in Proceedings of the Content Analysis in the WEB 2.0 (CAW2.0) Workshop at WWW2009 (2009)Google Scholar
  48. 48.
    H. Yu, M. Kaminsky, P.B. Gibbons, A. Flaxman, Sybilguard: defending against sybil attacks via social networks, in ACM SIGCOMM Computer Communication Review, vol. 36 (ACM, New York, 2006), pp. 267–278Google Scholar
  49. 49.
    H. Yu, P.B. Gibbons, M. Kaminsky, F. Xiao, Sybillimit: a near-optimal social network defense against sybil attacks, in IEEE Symposium on Security and Privacy, 2008. SP 2008 (IEEE, New York, 2008), pp. 3–17Google Scholar
  50. 50.
    Y. Zhang, S. Egelman, L. Cranor, J. Hong, Phinding phish: evaluating anti-phishing tools (2006)Google Scholar
  51. 51.
    Q. Zhang, S. Zhang, J. Dong, J. Xiong, X. Cheng, Automatic detection of rumor on social network, in National CCF Conference on Natural Language Processing and Chinese Computing (Springer, Berlin, 2015), pp. 113–122Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Manoj Apte
    • 1
    Email author
  • Girish Keshav Palshikar
    • 1
  • Sriram Baskaran
    • 2
  1. 1.TCS ResearchTata Consultancy Services LimitedPuneIndia
  2. 2.University of Southern CaliforniaLos AngelesUSA

Personalised recommendations