Abstract
The account registration steps in Online Social Networks (OSNs) are simple to facilitate users to join the OSN sites. Alongside, Personally Identifiable Information (PII) of users is readily available online. Therefore, it becomes trivial for a malicious user (attacker) to create a spoofed identity of a real user (victim), which we refer to as clone identity. While a victim can be an ordinary or a famous person, we focus our attention on clone identities of famous persons (celebrity clones). These clone identities ride on the credibility and popularity of celebrities to gain engagement and impact. In this work, we analyze celebrity clone identities and extract an exhaustive set of 40 features based on posting behavior, friend network and profile attributes. Accordingly, we characterize their behavior as benign and malicious. On detailed inspection, we find benign behaviors are either to promote the celebrity which they have cloned or seek attention, thereby helping in the popularity of celebrity. However, on the contrary, we also find malicious behaviors (misbehaviors) wherein clone celebrities indulge in spreading indecent content, issuing advisories and opinions on contentious topics. We evaluate our approach on a real social network (Twitter) by constructing a machine learning based model to automatically classify behaviors of clone identities, and achieve accuracies of 86%, 95%, 74%, 92% & 63% for five clone behaviors corresponding to promotion, indecency, attention-seeking, advisory and opinionated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
It is also referred as impersonation attack or identity clone attack.
- 2.
Fan identities are created by supporters of celebrities with benign intentions of popularizing the celebrity. They may also be created by celebrities themselves, however, we don’t delve into these issues, since our key focus is on behavior of clone identities.
- 3.
Verified Accounts on Twitter: https://help.twitter.com/en/managing-your-account/about-twitter-verified-accounts.
- 4.
- 5.
Narendra Modi, Shah Rukh Khan, Amitabh Bachchan, Salman Khan, Akshay Kumar, Sachin Tendulkar, Virat Kohli, Deepika Padukone, Hrithik Roshan and Aamir Khan.
- 6.
References
List of 723 bad words to blacklist & how to use facebook’s moderation tool. Front Gate Media (May 2014). https://www.frontgatemedia.com/a-list-of-723-bad-words-to-blacklist-and-how-to-use-facebooks-moderation-tool/, [Online; posted 12 May 2014]
What is facebook cloning and how can i protect myself from it? Hoax Slayer (July 2017). https://www.hoax-slayer.net/what-is-facebook-cloning-and-how-can-i-protect-myself-from-it/, [Online; posted 25 July 2017]
Aggarwal, A., Kumar, S., Bhargava, K., Kumaraguru, P.: The follower count fallacy: detecting twitter users with manipulated follower count (2018)
Author, C.: Magic marketing words you should be using. Vertical Response (September 2017). https://www.verticalresponse.com/blog/the-30-magic-marketing-words/, [Online; posted 19 September 2017]
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web, pp. 551–560. ACM (2009)
Buxton, M.: The social scam: for a-listers, imposters still loom large. Refinery29 (May 2018). https://www.refinery29.com/2018/05/195519/celebrity-impersonation-accounts-fake-instagram-twitter, [Online; posted 2 May 2018]
Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. pp. 15–15. USENIX Association (2012)
Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake twitter followers. Decis. Support Syst. 80, 56–71 (2015)
Glover, R.: Building a twitter clone. The Meteor Chef (August 2017). https://themeteorchef.com/tutorials/building-a-twitter-clone, [Online; posted 31 August 2017]
Goga, O., Venkatadri, G., Gummadi, K.P.: The doppelgänger bot attack: exploring identity impersonation in online social networks. In: Proceedings of the 2015 Internet Measurement Conference, pp. 141–153. ACM (2015)
Gupta, A., Kaushal, R.: Towards detecting fake user accounts in facebook. In: Asia Security and Privacy (ISEASP), ISEA 2017, pp. 1–6. IEEE (2017)
He, B.Z., Chen, C.M., Su, Y.P., Sun, H.M.: A defence scheme against identity theft attack based on multiple social networks. Expert Syst. Appl. 41(5), 2345–2352 (2014)
Jin, L., Takabi, H., Joshi, J.B.: Towards active detection of identity clone attacks on online social networks. In: Proceedings of the first ACM Conference on Data and Application Security and Privacy, pp. 27–38. ACM (2011)
Kharaji, M.Y., Rizi, F.S., Khayyambashi, M.R.: A new approach for finding cloned profiles in online social networks. arXiv preprint arXiv:1406.7377 (2014)
Lips, A.: Everyone wants to get verified on social media, but it’s not usually an easy process. Social Media Week (March 2018). https://socialmediaweek.org/blog/2018/03/can-i-get-verified-verification-guidelines-for-social-media/, [Online; posted 16 March 2018]
Parmar, B.: Protecting against spear-phishing. Comput. Fraud Secur. 2012(1), 8–11 (2012)
Sen, I., Aggarwal, A., Mian, S., Singh, S., Kumaraguru, P., Datta, A.: Worth its weight in likes: towards detecting fake likes on instagram. In: Proceedings of the 10th ACM Conference on Web Science, pp. 205–209. ACM (2018)
Slotkin, J.: Twitter ‘bots’ steal tweeters’ identities. Market Place (May 2013). https://www.marketplace.org/2013/05/27/tech/twitter-bots-steal-tweeters-identities, [Online; posted 27 May 2013]
Viswanath, B., et al.: Exploring the design space of social network-based sybil defenses. In: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–8. IEEE (2012)
Wang, G., et al.: Social turing tests: crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856 (2012)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: ACM SIGCOMM Computer Communication Review, vol. 36, pp. 267–278. ACM (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kaushal, R., Sharma, C., Kumaraguru, P. (2020). Detection of Misbehaviors in Clone Identities on Online Social Networks. In: B. R., P., Thenkanidiyoor, V., Prasath, R., Vanga, O. (eds) Mining Intelligence and Knowledge Exploration. MIKE 2019. Lecture Notes in Computer Science(), vol 11987. Springer, Cham. https://doi.org/10.1007/978-3-030-66187-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-66187-8_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66186-1
Online ISBN: 978-3-030-66187-8
eBook Packages: Computer ScienceComputer Science (R0)