Skip to main content

Detection of Misbehaviors in Clone Identities on Online Social Networks

  • Conference paper
  • First Online:
Mining Intelligence and Knowledge Exploration (MIKE 2019)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11987))

  • 231 Accesses

Abstract

The account registration steps in Online Social Networks (OSNs) are simple to facilitate users to join the OSN sites. Alongside, Personally Identifiable Information (PII) of users is readily available online. Therefore, it becomes trivial for a malicious user (attacker) to create a spoofed identity of a real user (victim), which we refer to as clone identity. While a victim can be an ordinary or a famous person, we focus our attention on clone identities of famous persons (celebrity clones). These clone identities ride on the credibility and popularity of celebrities to gain engagement and impact. In this work, we analyze celebrity clone identities and extract an exhaustive set of 40 features based on posting behavior, friend network and profile attributes. Accordingly, we characterize their behavior as benign and malicious. On detailed inspection, we find benign behaviors are either to promote the celebrity which they have cloned or seek attention, thereby helping in the popularity of celebrity. However, on the contrary, we also find malicious behaviors (misbehaviors) wherein clone celebrities indulge in spreading indecent content, issuing advisories and opinions on contentious topics. We evaluate our approach on a real social network (Twitter) by constructing a machine learning based model to automatically classify behaviors of clone identities, and achieve accuracies of 86%, 95%, 74%, 92% & 63% for five clone behaviors corresponding to promotion, indecency, attention-seeking, advisory and opinionated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    It is also referred as impersonation attack or identity clone attack.

  2. 2.

    Fan identities are created by supporters of celebrities with benign intentions of popularizing the celebrity. They may also be created by celebrities themselves, however, we don’t delve into these issues, since our key focus is on behavior of clone identities.

  3. 3.

    Verified Accounts on Twitter: https://help.twitter.com/en/managing-your-account/about-twitter-verified-accounts.

  4. 4.

    https://twittercounter.com/pages/100/.

  5. 5.

    Narendra Modi, Shah Rukh Khan, Amitabh Bachchan, Salman Khan, Akshay Kumar, Sachin Tendulkar, Virat Kohli, Deepika Padukone, Hrithik Roshan and Aamir Khan.

  6. 6.

    Twitter Search API: https://developer.twitter.com/en/docs/tweets/search/api-reference/get-search-tweets.html.

References

  1. List of 723 bad words to blacklist & how to use facebook’s moderation tool. Front Gate Media (May 2014). https://www.frontgatemedia.com/a-list-of-723-bad-words-to-blacklist-and-how-to-use-facebooks-moderation-tool/, [Online; posted 12 May 2014]

  2. What is facebook cloning and how can i protect myself from it? Hoax Slayer (July 2017). https://www.hoax-slayer.net/what-is-facebook-cloning-and-how-can-i-protect-myself-from-it/, [Online; posted 25 July 2017]

  3. Aggarwal, A., Kumar, S., Bhargava, K., Kumaraguru, P.: The follower count fallacy: detecting twitter users with manipulated follower count (2018)

    Google Scholar 

  4. Author, C.: Magic marketing words you should be using. Vertical Response (September 2017). https://www.verticalresponse.com/blog/the-30-magic-marketing-words/, [Online; posted 19 September 2017]

  5. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web, pp. 551–560. ACM (2009)

    Google Scholar 

  6. Buxton, M.: The social scam: for a-listers, imposters still loom large. Refinery29 (May 2018). https://www.refinery29.com/2018/05/195519/celebrity-impersonation-accounts-fake-instagram-twitter, [Online; posted 2 May 2018]

  7. Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. pp. 15–15. USENIX Association (2012)

    Google Scholar 

  8. Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake twitter followers. Decis. Support Syst. 80, 56–71 (2015)

    Article  Google Scholar 

  9. Glover, R.: Building a twitter clone. The Meteor Chef (August 2017). https://themeteorchef.com/tutorials/building-a-twitter-clone, [Online; posted 31 August 2017]

  10. Goga, O., Venkatadri, G., Gummadi, K.P.: The doppelgänger bot attack: exploring identity impersonation in online social networks. In: Proceedings of the 2015 Internet Measurement Conference, pp. 141–153. ACM (2015)

    Google Scholar 

  11. Gupta, A., Kaushal, R.: Towards detecting fake user accounts in facebook. In: Asia Security and Privacy (ISEASP), ISEA 2017, pp. 1–6. IEEE (2017)

    Google Scholar 

  12. He, B.Z., Chen, C.M., Su, Y.P., Sun, H.M.: A defence scheme against identity theft attack based on multiple social networks. Expert Syst. Appl. 41(5), 2345–2352 (2014)

    Article  Google Scholar 

  13. Jin, L., Takabi, H., Joshi, J.B.: Towards active detection of identity clone attacks on online social networks. In: Proceedings of the first ACM Conference on Data and Application Security and Privacy, pp. 27–38. ACM (2011)

    Google Scholar 

  14. Kharaji, M.Y., Rizi, F.S., Khayyambashi, M.R.: A new approach for finding cloned profiles in online social networks. arXiv preprint arXiv:1406.7377 (2014)

  15. Lips, A.: Everyone wants to get verified on social media, but it’s not usually an easy process. Social Media Week (March 2018). https://socialmediaweek.org/blog/2018/03/can-i-get-verified-verification-guidelines-for-social-media/, [Online; posted 16 March 2018]

  16. Parmar, B.: Protecting against spear-phishing. Comput. Fraud Secur. 2012(1), 8–11 (2012)

    Article  Google Scholar 

  17. Sen, I., Aggarwal, A., Mian, S., Singh, S., Kumaraguru, P., Datta, A.: Worth its weight in likes: towards detecting fake likes on instagram. In: Proceedings of the 10th ACM Conference on Web Science, pp. 205–209. ACM (2018)

    Google Scholar 

  18. Slotkin, J.: Twitter ‘bots’ steal tweeters’ identities. Market Place (May 2013). https://www.marketplace.org/2013/05/27/tech/twitter-bots-steal-tweeters-identities, [Online; posted 27 May 2013]

  19. Viswanath, B., et al.: Exploring the design space of social network-based sybil defenses. In: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–8. IEEE (2012)

    Google Scholar 

  20. Wang, G., et al.: Social turing tests: crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856 (2012)

  21. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: ACM SIGCOMM Computer Communication Review, vol. 36, pp. 267–278. ACM (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rishabh Kaushal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaushal, R., Sharma, C., Kumaraguru, P. (2020). Detection of Misbehaviors in Clone Identities on Online Social Networks. In: B. R., P., Thenkanidiyoor, V., Prasath, R., Vanga, O. (eds) Mining Intelligence and Knowledge Exploration. MIKE 2019. Lecture Notes in Computer Science(), vol 11987. Springer, Cham. https://doi.org/10.1007/978-3-030-66187-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66187-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66186-1

  • Online ISBN: 978-3-030-66187-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics