Fake Profile Identification on Facebook Through SocialMedia App
In today’s life almost everyone is in association with the online social networks. These sites have made drastic changes in the way we pursue our social life. But with the rapid growth of social networks, many problems like fake profiles, online impersonation have also grown. Current announces indicate that OSNs are overspread with abundance of fake user’s profiles, which may menace the user’s security and privacy. In this paper, we propose a model to identify potential fake users on the basis of their activities and profile information. To show the effectiveness of our model, we have developed a Facebook canvas application called “SocialMedia” as a proof of concept. We also conducted an online evaluation of our application among Facebook users to show usability of such apps. The results of evaluation reported that the app successfully identified possible fake friend with accuracy 87.5%.
KeywordsOnline social networks (OSNs) Fake profile SocialMedia app Trust weight (TW)
- 1.Facebook, available: http://www.facebook.com/.
- 2.Google+, available: http://www.plus.google.com/.
- 3.LinkedIn, available: http://www.linkedin.com/.
- 4.Twitter, available: http://www.twitter.com/.
- 5.M. Fire, R. Goldschmidt, and Y. Elovici. Online social networks: Threat and solutions. Communications Surveys Tutorials, IEEE, 16(4):2019–2036 Fourthquarter 2014.Google Scholar
- 6.I. Facebook or 15(d) quarterly of the report pursuant to securities exchange Act section of 13 1934, url https://www.sec.gov/archives/edgar/data/1326801/000132680115000006/fb-12312014x10k.htm.
- 7.S Fong, Yan Zhuang, and Jiaying He. Not every friend on a social network Can be trusted: Classifying imposters using decision trees. In Future Generation Communication Technology (FGCT), 2012 International Conference on, pages 58–63. IEEE, 2012.Google Scholar
- 8.M. Conti, R. Poovendran and M. Secchiero. Fakebook: Detecting fake profiles in on-line social networks. In Proceedings of the 2012 International Conferenceon Advances in Social Networks Analysis And Mining (ASONAM 2012), ASONAM ’12, pages 1071–1078, Washington, DC, USA, 2012. IEEE Computer Society.Google Scholar
- 9.Wei Wei, F. Xu, C. C. Tan, and Qun Li. Sybildefender: Defend gainst A sybil attacks in large social networks. In INFOCOM, 2012 Proceedings IEEE, pages 1951–1959, March 2012.Google Scholar
- 10.M. Fire, Dima Kagan, Aviad Elyashar, and Yuval Elovici. Friend or foe? Fake profile identification in online social networks. Social Network Analysis and Mining, 4(1), 2014.Google Scholar
- 11.F. Ahmed and M. Abulaish Identification of Sybil communities Generating context – aware spam on online social networks. In Yoshiharu shikawa, Jianzhong Li, Wei Wang, Rui Zhang, and Wenjie Zhang, editors, Web Technologies and Applications, volume 7808 of Lecture Notes in ComputerScience, pages 268–279. Springer Berlin Heidelberg, 2013.Google Scholar
- 12.Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai. Uncovering social network sybils in the wild. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Con., IMC ’11, pages 259–268, New York, NY, USA, 2011. ACM.Google Scholar
- 13.Renren, available: http://www.renren.com/en/.
- 14.Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai. Uncovering social network sybils In the wild. ACM Trans. KnowlDiscov. Data, 8(1):2:1–2:29, February 2014.Google Scholar
- 15.Barracuda labs social network analysis on real people vs fake profiles, url = https://barracudalabs.com/research-resources/sample-page/.