ArticlePDF Available

Fake Profiles Types of Online Social Networks: A Survey

Authors:

Abstract and Figures

Today, OSNs (Online Social Networks) considered the most platforms common on the Internet. It plays a substantial role for users of the internet to hold out their everyday actions such as news reading, content sharing, product reviews, messages posting, and events discussing etc. Unfortunately, on the OSNs some new attacks have been recognized. Different types of spammers are existing in these OSNs. These cyber-criminals containing online fraudsters, sexual predators, catfishes, social bots, and advertising campaigners etc.OSNs abuse in different ways especially by creating fake profiles to carry out scams and spread their content. The identities of all these malicious are so damaging to the service providers and the users. From the opinion of OSNs service providers, the loss of bandwidth moreover the overall reputation of the network is affected by fake profiles. Thus, needing more complex automated methods, and tremendous effort manpower to discover and stopping these harmful users.This paper explains different kinds of OSNs risk generators such as cloned profiles, compromised profiles, and online bots (spam-bots, chat-bots, and social-bots). In addition, it presents several classifications of features that have been used for training classifiers in order to discover fake profiles. We try to show different ways that used to detect every kind of these malicious profiles. Also, this paper trying to show what is the dangerous type of profile attacks and the most popular in OSNs.
Content may be subject to copyright.
Copyright ยฉ 2018 Authors. This is an open access article distributed under the Creative Commons Attribution License, which permits
unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
International Journal of Engineering & Technology, 7 (4.19) (2018) 919-925
International Journal of Engineering & Technology
Website: www.sciencepubco.com/index.php/IJET
Research paper
Fake Profiles Types of Online Social Networks: A Survey
Rafeef Kareem*1, Wesam Bhaya2
1,2 Information Networks Department, College of IT, University of Babylon, Iraq
*Corresponding Author E-mail: rafeef.kareem@yahoo.com
Abstract
Today, OSNs (Online Social Networks) considered the most platforms common on the Internet. It plays a substantial role for users of the
internet to hold out their everyday actions such as news reading, content sharing, product reviews, messages posting, and events
discussing etc. Unfortunately, on the OSNs some new attacks have been recognized. Different types of spammers are existing in these
OSNs. These cyber-criminals containing online fraudsters, sexual predators, catfishes, social bots, and advertising campaigners etc.
OSNs abuse in different ways especially by creating fake profiles to carry out scams and spread their content. The identities of all these
malicious are so damaging to the service providers and the users. From the opinion of OSNs service providers, the loss of bandwidth
moreover the overall reputation of the network is affected by fake profiles. Thus, needing more complex automated methods, and
tremendous effort manpower to discover and stopping these harmful users.
This paper explains different kinds of OSNs risk generators such as cloned profiles, compromised profiles, and online bots (spam-bots,
chat-bots, and social-bots). In addition, it presents several classifications of features that have been used for training classifiers in order to
discover fake profiles. We try to show different ways that used to detect every kind of these malicious profiles. Also, this paper trying to
show what is the dangerous type of profile attacks and the most popular in OSNs.
Keywords: Online Social Networks, OSNs, Fake Profile, Fake Account.
1. Introduction
OSNs, such as Twitter and Facebook, have become popular
increasingly in the last few yearsโ€™ social networks used by peoples
to share news, chat with friends or to make them in touch with
their families. With over time the user interactions with
colleagues, friends, people they consider trustworthy. This
communication formed a social graph that takes controls on how
to distribute the information in the social network. Generally, the
that users received distributed messages by the users they are
joined to is by the form of tweets, status updates or wall posts [1].
In the last few years, the social Web was threatened by fake
criminals who trying persistently to break the privacy of OSN
platforms users and attack them [2].
The attractiveness of criminals for social networking sites is
growing, when the popularity of social networking sites growth,
such as, the worms that exploit the old ideas that are applied to a
new technology, that specifically target Myspace and Facebook
users. Classic worms such as worm that used to spread the
contacts in a victimโ€™s Outlook address book. Many e-mail users
this type of tricks have already been seen now, but on social
networking sites, they are not as well-known. although such
attachments email might be increasing more suspicion [3].
The huge amount of user content that generated by OSNs is
always under attack of a spammer because the OSNs provided it
easily. The goals of cyber criminals are stealing professional,
social or financial information by exposing the users with
unwanted information on the web likes, pornography, or stealing
the userโ€™s personal, political, etc. so as to trick them. From the
usersโ€™ point of view, there is no more secure, professional,
personal, and even financial data.
Nowadays the attacker discovering a lot of ways to control on the
user account in a social network the purpose of them are to
exploiting these accounts in all ways that they can to do. In the
next section, we will discuss many types of the OSNs profile
account that exploited and created by the attacker to abuse them in
any way that helps his purposes. [4].
2. OSNs Profiles
In OSNs, there are several different profiles. This section provides
a classification of different legal and illegal profiles, with their
features and the popular way that used to detect them. Also at the
end of this paper, there is table presented summary of these typed,
Figure1 shows the types of social profile that we will discuss some
of them here.
Fig. 1: Types of OSNs profiles [4]
920
International Journal of Engineering & Technology
2.1 Legitimate Profiles
It is consisting of two type of profiles:
2.1.1 Compromised Profiles
A compromised account is each legal account that has been taken
over by an attacker. Because of compromised accounts are
actually real accounts but the owner of them lost the controlling
on them for any malware agent such as phisher, in another word
the owner doesnโ€™t have complete control on their own account.
So, the study considering that the Compromised accounts are the
most complexes and difficult kind of accounts. Recently the
studied have appeared that the spread of compromised profiles are
more than 97% rather than fake profiles [4].
As a result of the previous reason, the attackers have the ability to
control the owner's trusted relationships in his/her account, which
has already been, so the attackers began to exploit and to
compromised the legitimate accounts. There are many ways can
be used to make an account from compromised type, such as, by
exploiting the vulnerability of a cross-site scripting, or by stealing
the userโ€™s login credentials using a phishing scam. Compromised
accounts are the most valuable accounts to cybercriminals because
these type of account let the attackers to spread malicious content
more effectively by allowing them to have control of the trust
relationship and the account history. Sensitive institutional,
personal data and valuable computing resources are put at risk
when accounts are compromised. Even accounts with nothing
private or of value in email or personal files and limited or no
access to institutional data are valuable to hackers [1].
Finally, acquaintances and intruders are two types of hackers that
are used to make compromised accounts: the intruder is an
unknown third party, harmful or shares misleading information is
the way that an intruder work when compromises an account,
Spammers are considered one of intruderโ€™s type. while an
acquaintance is a relative, coworker, or friend of the original user
[5].
2.1.1.1 Ways of the Accounts Are Compromised
There are several ways how accounts are compromises, which are
[5]:
๏‚ท Password Stolen on Another Site. It means that your
password is Reusing on other different sites, that puts resources at
risk, especially when those your (umich.edu) email is your
username. Your account can be easily accessed if your account on
those sites is compromised.
๏‚ท Password Sharing. There is a time that you enforcing to
sharing your password with a family member or a friend, the
might exploit it to access to your account and misused it or they
might not have been careful on it as you are.
๏‚ท Weak Password. A simple or short password, can be
vulnerable to brute-force techniques or guess.
๏‚ท Unsecured Network. Remember always Use a Secure
Internet Connection. because If you log in to a website like
Wolverine Access while Wi-Fi network is not unprotected, your
information account might be stolen.
๏‚ท Phishing. Emails that send you asking to validate,
upgrade, or verify, your account by providing your password or
logging in to a webpage are most probably phishing scams.
๏‚ท Malware. Using a computer infected with a virus or using
a computer that not untrusted, or running a keyboard logger to
other compromised malicious system.
2.1.1.2 Types of Compromised
Compromised accounts have four Types of them; Forced Shares,
Pranks, Information Gathering, and Forced Follows, as follow [5]:
โ€ข Forced Share: When a hacker shares of malicious intent on the
social media site or content that is false misleading. That type
called a forced share compromised accounts
โ€ข Prank: The content that is shared by a hacker with others users
for laughs that type is called a prank. It is involving random
content, for example, confessions of love or song lyrics for the
hacker.
โ€ข Information Gathering: Hacker using a user account to learn
sensitive information about them, for example, spammers used
their password to compromise the original userโ€™s other accounts,
for instance. Bank account. hackers can share content by posts
messages on social media with other users, thatโ€™s for (pranks and
forced shares). The Forced Follows is harder to detect than Forced
Shares, because the Twitter API returns the current number of
followers of a user when the tweet was collected rather than when
the tweet was published to study detection of forced shares,
researchers need to know which accounts will be compromised in
the future, So That they need to keep track how the number of
followers changes over time. The information gathering is
considered as the harder one to detect, because of the hacker never
change anything about the posting or account.
โ€ข Forced Follow: This type happened when the user account is
forced by the hacker to follow other malicious or fake accounts.
2.1.2 Non Compromised Profiles
It means the account was not exploiting to be compromised profile
but maybe they exploited to create another fake profile.
2.2 Cloned Profiles
The stealing process for the private information victimโ€™s so as to
make one more profile that can get the private information of
victimโ€™s friends, is called a cloned profile. In other words, the
stealing of the existing userโ€™s profile identity and used it to create
a new fake profile is also known profile cloning. They also called
as (Identity Clone Attacks (ICAs)).[4]
The clone attack identity is discovered on OSNs that create fake
identities of specific users. Rising the trust among mutual friends
to do more tricks in the future and acquiring personal information
of victimโ€™s friendsโ€™ by appearing as the real user profile, that is the
original aim of the adversary in this attack. There are two type of
these attacks are defined already: the first one is cross-site profile
cloning, and the second one is single site profile cloning. they
discussed in the next subsection.[6]
2.2.1 Types of Cloned Profile
The clone profiles consisted of two types.
A. Single-Site Profile Cloning:
It also named Intra Site Profile Cloning. In the same social
network, the real user profile is duplicated by the adversary and
sending a friend request to usersโ€™ friends by using this cloned
profile. An unwitting user might believe that request is coming by
a familiar user so the user will validate it, that makes the adversary
accessing to user personal information very easy and starting to
exploiting it in a suspicious way. Adversaries able to make one
more account of an already existing user and pretend to be some
real user with the same name. Figure 2 shows how it works [6].
Fig. 2: Working of Single-Site Profile Cloning [4]
International Journal of Engineering & Technology
B. Cross-Site Cloning
In cross-site cloning (also called Intersite profile cloning), the
adversary detects a user account in network A, then make a clone
profile with that user account characteristics in network B which
real user until now does not create an account on it (Figure 3).
Friend requests are sending by the adversary to account of the
victimโ€™s friends in network B. The friends of the victim believe
that they know the requests sender and validate them, when that
friends validate the request, the adversary shell stealing their
private information. The adversary used this to steal information
to create many other clone profiles or to deceived some in the
future. because of service providers think this kind of attack is a
new user which is recording on these websites, so detecting it is
very difficult for profiles owners and service providers. Detecting
cloned profiles with more efficient methods can lead to more
protection for users that using social networks, and also movement
increasing for service providers to advance their level of security
they provide on their platforms in the services.[6]
Fig. 3: Working of Cross Site Cloning [6]
It becomes very hard to discover these types of attacks, because of
the Service Providers take it as a new register in these OSNs and
The users handling with it as a request friend coming from a legal
user. Discovering cloned profiles can improve the security level in
OSNs which in turn will keep users protected from any type of
illegal access.
2.3 Fake Profiles
The fake profiles are unlike of cloned profile in different ways. an
adversary makes one more account of the already existing one that
happens in case of cloned profiles, and that not the way of fake
profiles work Cloned Profiles are usually created to take out the
victim information or her/his friends but the Fake Profiles are used
for different working for example advertising, Spamming, etc.,
There is various purposed make people create the fake profile e.g.,
just to have one more account, or just to create multiple accounts
deliberately to enter into peopleโ€™s subgraph. The fake account has
three reasons to be created, and have two ways that used to create
it.: first: is created by manually creating one more account, and the
other is created by writing a script.
While the three main reasons for created fake profiles is: one: to
enhance the level of trust or popularity among the others. two: is
to distribute the content spam among the real users. Three: OSNs
service providers allow one account per email-id connection or per
mobile, and to get over this limitation, users made one more
account using various phone numbers or email-ids [4].
Because of Fake accounts are lack trusted connections, and they
are not central nodes in the graph and They also have no history or
unique data, so that they have limited virility. Because of these
reasons, compromised accounts are much more valuable to
attackers than fake account. The entities of the fake account are
existing in anywhere on the internet like a social network,
shopping sites, discussion blogs, forums, websites, online dating
websites, and banking systems, etc. Fake profiles are hurtful for
OSNs and can be riskier in the future if not discovering at an early
time. There is a different type of fake profiles in OSNs, we are
described some of the popular ones in the next subsections [7].
2.3.1 Sockpuppet
There are accounts on the Internet are created with the purpose to
exploiting them in different ways to deceive Internet users, for
example, used to convince people of a particular product or to
convince them of a particular company or to promote a tourist
destination, these accounts called Sockpuppet.
In different words, Sockpuppet is an account that is created for
the purpose of deceiving or promoting a something or for
someone on social networking sites, and discussion forums. Often,
in the case of social sites, blogs, users create new accounts called
the account sockpuppet. If There are two different accounts
belonging to the same person are found on any social network or
news blog or discussion forum, these accounts are called
Sockpuppet pair [8].
2.3.2 Sybil Attack
Our systems today are vulnerable to Sybil attacks, in which an
attacker injects multiple fake accounts into the system to
compromise security and privacy. Sybil attacks are becoming pose
a significant threat to online social systems because it increasingly
extended. An attacker can inject in the system multiple identities
colluding to compromise privacy and security. Latterly, the
widespread rising of OSNs let them to be for Sybil attacks like
attractive victims. In popular social networks such as Twitter and
Facebook, there are tens of millions of Sybil accounts and these
numbers are rising. Via propagating social malware, the Attackers
can leverage Sybil accounts to compromise system security in
addition to system privacy via learning usersโ€™ private information
[9].
In the design of distributed systems Avoiding Sybil or multiple
identities, attacks are known to be an essential problem. Multiple
influence and identities the working of systems that rely upon
open membership can create by Malicious attackers. Certification
authority provides usually the protections against the attacks Sybil
rely on trusted identities. But users' demands to view and present
these trusted identities are inconsistent with the open membership
that is the cause of the success of the system in the first place.
Latterly, there has been a study on the application of social
networks in the research community to mitigate Sybil attacks.
Unlike traditional solutions, a number of schemes have been
suggesting that attempt to protect against Sybilโ€™s in a social
network by using the property structure of the social networks.
These schemes require to rely on the trust that is embodied in
existing social relationships between users and donโ€™t require
central trusted identities. there are many methods, mechanisms
and algorithms ,Appear to detect Sybil nods, one approach to
preventing these โ€œSybil attacksโ€ is to
have a trusted agency certify identities[10], However we discuss
some of the method in the next subsection [11].
2.3.2.1. Sybil Community Detectors
There are algorithms that used for decentralized detection
performing of Sybil nodes on social graphs, these algorithms are
(Sybil Limit, Sybil Rank, Sybil Guard, and, Sybil Infer). Two
assumptions of normal and Sybil user behavior that the algorithms
are based on, (one) because of the friend requests from unknown
strangers didnโ€™t accept by normal users, that make The numbers of
edges between Sybilโ€™s and normal users will be limited. (Two)
Attackers can create unlimited edges and Sybilโ€™s between them.
Because of they make Sybilโ€™s appear more legitimate to normal
users, that make the edges between Sybilโ€™s are beneficial
depending on these assumptions, and because of the number of
edges between Sybilโ€™s is greater than the number of edges
connecting to normal users, Sybils tend to form tight-knit clusters.
922
International Journal of Engineering & Technology
The edges connecting Sybilโ€™s and normal users are called attack
edges, but we called the edges between Sybilโ€™s as Sybil edges.
The algorithms of Sybil detection used to locate the small number
of edge cuts that separate the Sybil region from the social graph to
identify Sybil clusters.
The max-flow approach is used by sumup uses, while Sybil
Guard, Sybil Limit, and Sybil Infer, walks for this purpose all
leverage specially engineered randomly. All of these algorithms
have appeared that all algorithms are generalize to the problem of
communities detecting Sybil nodes, although all of these
algorithms are implemented differently [12].
2.3.3 Bots as Fake Profiles
We called some of the computer programs that interact with
humans by producing some data, its especially interact with the
persons using the internet (netizens) in order to alter their
behavior, as a bot. Bots generated More than 60% of the total web
data. Online bot is also called as a web robots or simply bot, these
bots perform various tasks automatically and quickly that the
human never do it alone. Fundamentally, the bot was designed to
help humans to make their works automatic and speed up it The
basic purpose of bots was work as an automatic responder to
customer queries, act as a medical expert to resolve health-related
issues and automatic travel guide, and automatically aggregate
contents from various news sources. But in these days the bots are
exploiting by the public in different domains. Bots are used in
social networks, to retweet a post without validating its source so
as to make it virus-related(viral). Bots are used in online
multiplayer games, to gain the unfair benefits. Since the bot wants
to interact with humans and create social networks, which are
even more difficult to identify, so they act as automated avatars.
Bots also used to send friend requests in OSNs, posting messages
and, influence users. Sybil accounts are similar to bot but the basic
difference is that the bots are automated computer programs,
while Sybil accounts are handled by users manually. These online
computer programs used web data crawling to extracts and
identify the information from web servers at a higher speed which
was not possible by a human alone, and that is the main use of
bots. Bots become a serious threat to the internet because they
designed for malicious activities.
In a variety of ways, Bots was added to social media systems.
Depending on the social media system, a new account may be
created with the explicit intention of having a bot control it. This
may even be possible automatically, but the platforms of most
social network work to guaranty that only human can be creating
new accounts. Bots may also be added as followers to accounts
that the purchaser does not control. Bots can be of two kinds
malignant and benign. The designers of Malignant bot might have
many goals in their mind e.g. to support and spread fake, to
change person thought about a product, or to misdirect people, or
malicious news. So, depending on the function of them we divided
the bots into 5 categories as you see in the figure below. we show
three categories from them in the following subsections. Figure 4
shows the Bots types [4].
Fig. 4: type of bots
2.3.3.1 Spam Bots
It one of botโ€™s type that is designed for the purpose of malicious
activities only. The original goal of design the spam bots are to
spreading harmful content such as links, to influence a particular
article which is not that worthy, pornographic websites or pollutes
the network by creating a huge number of unwanted relationships,
paid contents, to shill for any person or organization, or
advertisements.
Normal bots are used in a different form than the Spam bots are
those bots which very extended unsolicited contents among users
without their authorization. But the normal bots are developed for
daily activities like social bots: which mimic a normal user, or
weather update (e.g. Twitter bots). Social bot software was used
with an OSN profile to instructed and developed a social bot
perform operations such as, writing and reading the creating social
interactions, social content(spam), joining the online social
communities, and behaving like real users [2].
2.3.3.2 Social Bots
A social bot is a computer program that considers as a new seed
that mimics real users and controls OSN accounts. social bots can
be used to influence OSN. In another word, the automation
software that has the ability to perform basic activities e.g.
sending a connection request and posting a message and controls
on a particular OSNs by an account is called as a social bot. since
the social bots behave like humans and keep users busy, so they
consider the higher complex computer programs. To reach and
infect a maximum number of users and exposed hosts, Bots are
announcing themselves like viruses.
A self-declared bots different from socialbot (for example.
โ€œTwitter bots that post up-to-date weather forecastsโ€) and
spambots is that it is designed to be stealthy the socialbot able to
compromising the social graph of a targeted OSN infiltrating (i.e.,
connecting to) its users so as to reach an influential position,
because socialbot able to passing itself as a human being. This
feature can be exploited to distribute the propaganda and wrong
information so as to prejudice the public opinion. As socialbots
sneak a targeted OSN, they can further be gathering the data of
private usersโ€™ e.g. phone numbers, email addresses, etc. like this
data are being valuable to an adversary, and can be large-scale
phishing campaigns, spam email, and used for online profiling
and. So not be shocked when that various type of socialbots are
being presented to selling with prices beginning from $29 and up
to $2,500 per multi-featured bot in the Internet black- market [13].
2.3.3.3 Chat Bots
We called a software that interactive to automate tasks for a
human with a chat service as a Chabot. The term bot, is a point to
programs automated, these programs do not need to an operator
human, and The bot term is short for the robot when the
engineering started to design the first-generation of Chatbots, was
for chat users guesting, for example, quote bots or quiz or to help
operate chat rooms. However, Chatbots are now sending chat
spam that is the main enterprise of it.
Because of the commercialization of the Internet via either links
user profile or links in chat messages the Chatbots deliver spam
URLs. the spam links are distributed in different chat rooms to
thousands of users, and the controlling on few hundred chat bots it
all do by single bot operator, that made bots chat to the operator
very helpful of the bot who is paid per-click through affiliate
programs.
There is many other abusing used to the bots, for example,
booting, similar malicious activities, spreading malware, and
phishing. The abuse of chat bots is defending by A few
countermeasures, but none of them are very effective. To avoid
botโ€™s chats linking rooms chat Yahoo! was use the CAPTCHA
tests. This defensing becomes ineffectual as botโ€™s chats bypass
International Journal of Engineering & Technology
captcha tests with human-assisted. We saw that even after the
deployment of CAPTCHA tests the bots continuing to join chat
rooms with the majority members of a chat room or with the chat
rooms. Depend on key phrases or Third-party chat clients filter out
chat bots, or keywords that are well- known to use by botโ€™s chats,
it couldnโ€™t catch those unknown bots chat that do not use the
known phrase or keywords, and this is the drawback with this
approach [14]. Table 1 shows different OSNs profile attacks.
Table 1: Summery of various OSNs profile
Cloned Profiles
Sybil Accounts
Compromised Profiles
Bots
Sock Puppets
Definition
Stealing the personality of a
userโ€™s profile that existing
before to generate a new
one considered as a fake
profile to the existing one to
employ it in all malicious
behavior such as publish
immoral sites, etc.
it is the accounts
created manually by
malware users to
attack the trusted
network. The hackers
can exploit these
accounts to discover
the security of the
specific system and
also the privacy of the
system by studying the
private information of
users.
it considered the complex
fake profile to discover
because it actually a realistic
account but its creator lose
all or partial control on it to a
phisher or any malicious
agent.
It is a software that
does different tasks
automatically and
quickly that the
human impossible do
it alone.
It created with a
purpose, that is to
cheat others or to
support something or
someone on social
networking sites,
blogs, etc.
Purpose
* joy and amusement
* blacken or cheating a
person
* theft peopleโ€™s private
information
*To compromise the
privacy and security,
and arrival to
resources, etc.
*discovering the
security of any
system.
* for a person blacken or
trick.
* To propagations malicious
content by using
the trusted network.
* To Legal abuse
*work as a competent
medical to issues
health treatment.
* To collect contents
automatically from
different sources
news.
* it acts to customer
queries as a
responder auto.
* To bypass a ban or
comment from a
website.
*To a Public Opinion
Juggle
* To support or
defend an
organization or a
person.
Target
Networks
Facebook, Myspace,
Twitter, LinkedIn.
LinkedIn, Twitter,
Facebook.
Twitter, Facebook, Online
Payment Systems, LinkedIn,
etc.
Twitter, Facebook,
LinkedIn.
Facebook, Wikipedia,
Twitter, LinkedIn.
Effected
Group
People without online,
online users, accounts, etc.
Politicians,
Organizations,
celebrities, Netizens,
etc.
user-friends, Real account
owners.
Bloggers, OSNs,
OSN users, etc.
Wikipedia users,
Researchers,
Bloggers.
Types
Intra profile cloning site,
Inter profile cloning site.
_____________
Complete-
Compromised(CC). Partial-
Compromised(PC).
Influential-bots,
Social-bots, Spam-
bots, and chat-bots.
Meat puppet, sock
puppet, Strawman.
References
[15][6][16]
[9] [17][11]
[1][18]
[12] [19]
[8] [19] [21]
2.3 Methods Used for Fake Profile Detection
In previous sections, we describe a different kind of OSNs profiles
and their properties. This section present, some of several numbers
of techniques that used by different researchers to discover fake
profiles.
In [6], researchers based on the similarities, divide the Facebook
network into smaller communities, so as to, check whether it is a
clone or not. All the profiles similar to the real profiles are
gathered to calculate the strength of the relationship.
In [16], for detecting social network profile cloning, the
researchers have suggested a method by system designing with
three constituents called information profile verifier, profile
hunter, and distiller. To uniquely identify the profile, the distiller
selects attributes which can be used and extracts from real user
profiles the information. Then the Profile hunter locates the
profiles of the user on different OSN and processes the
information passed by information distiller to generate a record
profile which contains links to all the profiles returned by the
result and link to the userโ€™s real profile. then the Profile verifier
gathering the score that similar between all the profiles and
display the result to the user.
In [15], demonstrate two profile cloning attacks type in OSN.
thereafter, the study defined profile similarity and strength of
relationship measures by using a new approach for detecting clone
identities. It will be decided which profile is a clone and which
one is genuine by a predetermined threshold, depending on similar
attributes and strength of relationship among users which are
computed in detection steps. Finally, to demonstrate the
effectiveness of the proposed approach the experimental results
are presented.
The authors of [22] avoid and stop the attack of cloning type
approach of an attacking methodology, during a conversation
between the clone and real profiles, Fake content is injected into
the network and an ICA is carried out to collect information.
The authors in [19] discuss out of four (support vector machine,
decision tree, neural networks, and K-nearest neighbor) techniques
classification, and found that the best one in predicting spam bots
in the Twitter network is a Bayesian classifier.
In [21], the authors display the natural language processing
techniques to be using in a sock puppet detection method for
Wikipedia network. they also defense of Sybil accounts and paid a
vital attention towards the detection and their respective attacks.
In [23], researchers have discussed the way to identifying
influential nodes in complex networks by using a semi-local
measure centrality as a tradeoff between other time-consuming
measures and the low relevant degree centrality.
The [24] show us a way to detect the Sybil profile by using anew,
a new structure based method that called Sybil scar, to perform
Sybil detection in OSNs.
The authors of [1] were used to detect compromised user accounts
in social networks. They apply it in two popular social networking
sites, Facebook and Twitter. They use anomaly detection to
identify accounts that experience a sudden change in behavior and
a composition of statistical modeling. They developed a tool,
called COMPA, that Implements their approach, and we ran it on
a dataset of 106 million Facebook messages as well as on a large-
scale dataset of more than 1.4 billion publicly-available Twitter
924
International Journal of Engineering & Technology
messages. COMPA was able to identify compromised accounts on
both social networks with high precision.
The [25] show the way to detect the profiles in twitter if they fake
profile or normal one by using technology called (Entropy
Minimization Discretization (EMD)) on numerical features and
analyzed the results of the Naรฏve Bayes algorithm).
The author in [26] used many type of classification algorithms to
detect the fake account in twitter like decision tree, nave base,
neural network, support vector machine and random forest .
Table 2 below explore the brief conclusion of the detection
techniques that it has been shown in this section.
Table 2: Explore Ways to Detect The Fake Profiles
Properties
Reference
Year
Clone Profile
Using a profile similarity algorithm to measure and detect possibly cloned identity in OSNs
through the use of social links and attributes.
[22]
2011
Designing a system that comprised three main components (Information distiller, Profile
Verifier, Profile Hunter)
[16]
2011
There are three steps to detect cloned profiles in a same social network, (Collecting Suspicious
Profiles, Profile Evaluation, Attribute Similarity Measure)
[15]
2014
Using an approach which consists of 6 steps (Discovering community the social network graph,
Extraction userโ€™s attribute, Search in the community, Selecting profile, Computing strength of the
relationship, Decision making)
[6]
2014
Compromised
Profile
It has been using a novel approach to detect compromised user accounts in social networks, they
approach uses a composition of statistical modeling and anomaly detection to identify accounts
that experience a sudden change in behavior.
[1]
2012
Sybil Profiles
It has been proposing a Sybil lascar, a new structure method to perform Sybil detection in OSNs.
[24]
2017
Sock Puppet
Uses authorship attribution methods for the detection of sock puppeteering in Wikipedia
[21]
2013
Spam Bots
It has been using four techniques of classification and found that the best one in predicting spam
bots in the Twitter network is a Bayesian classifier.
[19]
2010
Fake accounts
Used the nave base algorithm to detect if the accounts are fake or normal
[25]
2017
Used five type of classification algorithms to detect the fake account in twitter .
[26]
2016
3. Conclusions
In recent years, the use of the network has increased in general
and the social networking sites such as Facebook, Twitter, and
Instagram in particular. People created accounts on each social
network to communicate with family, friends or for scientific or
entertainment purposes. But because the registered user put his
private information, the attackers have started to create different
types of the fake account by exploiting this personal information
for cyber-criminal used. Various types of fake accounts have
appeared, such as Compromise (the most difficult and dangerous
type), Clone, Sybil, Bot fake account, etc. In the other site, many
algorithms and technologies were appeared, to detected the fake
accounts and to prevent the exploitation of real or personal
information to prevent exploit them by the attackers for malicious
purposes, but we couldnโ€™t tell any technologies are the best
because every one of them different in the speed of execution and
the rate of accuracy.
References
[1] M. Egele, C. Kruegel, and G. Vigna, โ€œC OMPAโ€ฏ: Detecting
Compromised Accounts on Social Networks,โ€ NDSS Sympoium,
2013.
[2] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, โ€œDesign
and analysis of a social botnet,โ€ Comput. Networks, vol. 57, pp.
556โ€“578, 2012.
[3] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, โ€œAll your contacts
are belong to us,โ€ Proc. 18th Int. Conf. World wide web - WWW
โ€™09, p. 551, 2009.
[4] M. A. Wani and S. Jabin, โ€œA sneak into the Devilโ€™s Colony - Fake
Profiles in Online Social Networks,โ€ eprint arXiv:1705.09929,
2017.
[5] C. VanDam, J. Tang, and P.-N. Tan, โ€œUnderstanding compromised
accounts on Twitter,โ€ Proc. Int. Conf. Web Intell. - WI โ€™17, pp.
737โ€“744, 2017.
[6] M. Y. Kharaji and F. S. Rizi, โ€œAn IAC Approach for Detecting
Profile Cloning in Online Social Networks,โ€ Int. J. Netw. Secur. Its
Appl. (IJNSA), vol. 6, no. 1, pp. 75โ€“90, 2014.
[7] T. Stein, E. Chen, and K. Mangla, โ€œFacebook immune system,โ€
Proc. 4th Work. Soc. Netw. Syst. - SNS โ€™11, vol. m, pp. 1โ€“8, 2011.
[8] X. Zheng, Y. M. Lai, K. P. Chow, L. C. K. Hui, and S. M. Yiu,
โ€œSockpuppet detection in online discussion forums,โ€ Proc. - 7th Int.
Conf. Intell. Inf. Hiding Multimed. Signal Process. IIHMSP 2011,
pp. 374โ€“377, 2011.
[9] P. Gao, N. Z. Gong, S. Kulkarni, K. Thomas, and P. Mittal,
โ€œSybilFrame: A Defense-in-Depth Framework for Structure-Based
Sybil Detection,โ€ Comput. Res. Repos., p. 17, 2015.
[10] J. R. Douceur, โ€œThe Sybil Attack,โ€ Springer-Verlag London, UK,
IPTPS '01 Revised Papers from the First International Workshop
on Peer-to-Peer Systems pp. 251โ€“260, 2002.
[11] B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, โ€œAn
analysis of social network-based Sybil defenses,โ€ Proc. ACM
SIGCOMM 2010 Conf. SIGCOMM - SIGCOMM โ€™10, p. 363,
2010.
[12] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai,
โ€œUncovering Social Network Sybils in the Wild,โ€ Internet Meas.
Conf., vol. 8, no. 1, 2011.
[13] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, โ€œThe
socialbot network: when bots socialize for fame and money,โ€ Acm,
p. 93, 2011.
[14] B. A. Shawar and E. Atwell, โ€œMeasurement and Classification of
Humans and Bots in Internet Chat,โ€ Bridg. Gap Acad. Ind. Res.
Dialog Technol. Work. Proc., no. August, pp. 89โ€“96, 2007.
[15] F. Salehi Rizi et al., โ€œA New Approach for Finding Cloned Profiles
in Online Social Networks,โ€ arXiv Prepr. arXiv1406.7377, vol. 6,
no. April, pp. 25โ€“37, 2014.
[16] G. Kontaxis, I. Polakis, S. Ioannidis, and E. P. Markatos,
โ€œDetecting social network profile cloning,โ€ 2011 IEEE Int. Conf.
Pervasive Comput. Commun. Work. PERCOM Work. 2011, pp.
295โ€“300, 2011.
[17] H. Yu et al., โ€œSybilGuard,โ€ Proc. 2006 Conf. Appl. Technol.
Archit. Protoc. Comput. Commun. - SIGCOMM โ€™06, vol. pages,
no. 3, p. 267, 2006.
[18] D. Savage, X. Zhang, X. Yu, P. Chou, and Q. Wang, โ€œAnomaly
detection in online social networks,โ€ Soc. Networks, vol. 39, no. 1,
pp. 62โ€“70, 2014.
[19] A. Wang, โ€œDetecting spam bots in online social networking sites: a
machine learning approach,โ€ Data Appl. Secur. Priv. XXIV, pp.
335โ€“342, 2010.
[20] Z. Bu, Z. Xia, and J. Wang, โ€œA sock puppet detection algorithm on
virtual spaces,โ€ Knowledge-Based Syst., vol. 37, pp. 366โ€“377,
2013.
[21] T. Solorio, R. Ha san, and M. Mizan, โ€œA Case Study of Sockpuppet
Detection in Wikipedia,โ€ Proc. Work. Lang. Anal. Soc. Media, no.
Lasm, pp. 59โ€“68, 2013.
[22] B. Bhumiratana, โ€œA model for automating persistent identity clone
in online social network,โ€ Proc. 10th IEEE Int. Conf. Trust. Secur.
Priv. Comput. Commun. Trust. 2011, 8th IEEE Int. Conf. Embed.
Softw. Syst. ICESS 2011, 6th Int. Conf. FCST 2011, pp. 681โ€“686,
2011.
International Journal of Engineering & Technology
[23] D. Chen, L. Lรผ, M. S. Shang, Y. C. Zhang, and T. Zhou,
โ€œIdentifying influential nodes in complex networks,โ€ Phys. A Stat.
Mech. its Appl., vol. 391, no. 4, pp. 1777โ€“1787, 2012.
[24] B. Wang, L. Zhang, and N. Z. Gong, โ€œSybilSCAR: Sybil detection
in online social networks via local rule based propagation,โ€ IEEE
INFOCOM 2017 - IEEE Conf. Comput. Commun., no. May, pp.
1โ€“9, 2017.
[25] B. ErลŸahin, ร–. AktaลŸ, D. Kilmรง, and C. Akyol, โ€œTwitter fake
account detection,โ€ 2nd Int. Conf. Comput. Sci. Eng. UBMK 2017,
pp. 388โ€“392, 2017.
[26] A. El Azab, A. M. Idrees, M. A. Mahmoud, and H. Hefny, โ€œFake
Account Detection in Twitter Based on Minimum Weighted
Feature set,โ€ Int. J. Comput. Electr. Autom. Control Inf. Eng., vol.
10, no. 1, pp. 13โ€“18, 2016.
... Some fake profiles impersonate someone in order to gain the trust of the victims [16]. The fake account can be found in different places on the internet, such as shopping websites, social media platforms, and banking systems [20]. However, because social media platforms have become increasingly popular for sharing news, chatting, marketing, 4 Wireless Communications and Mobile Computing 5 Wireless Communications and Mobile Computing advertising, etc., social media has become a top target for fake profile attacks. ...
... Several open-source tools, such as tcpdump for packet capture, Bro for traffic analysis, and TensorFlow, are used to construct the system. The topology of the proposed IDS-CNN system consists of the input layer, two convolution 20 Wireless Communications and Mobile Computing layers, two activation function layers, pooling layer, and two full connection layers, as well as a loss layer and output layer, which used TensorFlow to construct a CNN framework. The input picture is 6 * 6, the first convolution's feature map is 6 * 6, and the number of convolution kernels is 32. ...
Article
Full-text available
As social media use increases, the number of users has risen also. This has increased the volume of data carried over the network, making it more important to secure usersโ€™ data and privacy from threats. As users are unaware of hackers, social mediaโ€™s security flaws and new forms of attack will persist. Intrusion detection systems, therefore, are vital to identifying intrusion risks. This paper examines a variety of intrusion detection techniques used to detect cyberattacks on social media networks. The paper provides a summary of the prevalent attacks on social media networks, such as phishing, fake profiles, account compromise, and cyberbullying. Then, the most prevalent techniques for classifying network traffic, including statistical and artificial intelligence (AI) techniques, are addressed. The literature also demonstrates that because AI can manage vast, scalable networks, AI-based IDSs are more effective at classifying network traffic and detecting intrusions in complex social media networks. However, AI-based IDSs exhibit high computational and space complexities; therefore, despite their remarkable performance, they are more suitable for high computing power systems. Hybrid IDSs, utilizing statistical feature selection and shallow neural networks, may provide a compromise between computational requirements and efficiency. This investigation shows that accuracies of statistical techniques range from 90% to 97.5%. In contrast, AI and ML technique detection accuracy ranges from 78% to 99.95%. Similarly, swarm and evolutionary techniques achieved from 84% to 99.95% and deep learning-based detection techniques achieved from 45% to more than 99% detection rates. Convolutional neural network deep learning systems outperformed other methods due to their ability to automatically craft the features that would classify the network traffic with high accuracy.
... The attacker tries to capture the HyperText Transport Protocol (HTTP) headers. These headers contain the session cookies, the attacker copies the HTTP session to attain the retrieval of targeted people's accounts to get private data and info of users [5][6][7]. ...
Article
Full-text available
The Web has a huge amount of data accessible for internet users, and a large amount of data is also produced, thanks to the development and expansion of web technology. The Internet has become an online learning platform to exchange ideas and share views. Social networking services like Twitter, Facebook, and Google+ quickly acquire popularity since they enable users to exchange opinions on issues, talk with other groups or post messages worldwide. The expanded usage of Online Social Network (OSN) has become necessary to appear to grow Authorship Verification (AV), OSN is the environment in which users can connect with other users to discuss ideas of any topics then expand data and information. AV is considered as a resource of researches and information in different ways, as is the case Sentiment Analysis (SA). In this paper, the proposed technique is compared with the previous feature extraction technique which was inefficient in providing better results comprised of the Tweets API dataset. Twitter is a popular website for social networking users posting and interacting with "tweets". The new model is henceforth capable to provide better accuracy.
... According to Kareem, fake accounts are several types -Sockpuppet, Sybil accounts, Spam Bots, Social Bots, Chat Bots. They can be used for different purposes -from advertising to avoiding a ban [17]. ...
Article
Full-text available
Many teachers use social media in a different way in the learning process - to share learning resources, to assign homework, to organize observations and discussions, for teamwork, to conduct student opinion surveys, etc. However, the transfer of educational activities to a virtual social environment has its risks and negative consequences. They are many and varied - sharing low-quality digital educational resources, stealing intellectual property, identity theft for subsequent abuse, damaging the reputation of learners and educators, disrupting the mental health of learners, and others. On the other hand, many merchants in the education market are attracted to the idea of making quick profits. The low capital costs of starting such a business, the ability to create a cheap educational product, often based on free and low-quality educational resources, and the ability to reuse and sell digital content at almost zero cost make online training a very profitable business. The article reviews the main risks of using social media in training.
Conference Paper
All around the world, people are drawn to online social networks as Facebook or Twitter. Even so, the more frequently these social networks are used, the more security, integrity and confidentiality issues arise. Now, and more than ever, it important to make sure of following the right account or dealing with a real consumer on any online social network, to avoid dangerous and harmful situations. This paper proposes an approach for detecting fake profiles on social media. This approach is based on hybridation between a machine learning algorithm and a bio inspired algorithm. To detect fake profiles, the proposed approach makes use of a dataset from Facebook social network. The hybrid approach consists of two stages. The first stage is to use Satin Bowerbird Optimization algorithm which assures us of finding the best bower, which is used in stage two as an initial centroid within k-means clustering algorithm, that make sure of accurate profiles types detection. When the results of the proposed approach are compared with well-known machine learning algorithms, it outperforms them.
Article
Full-text available
This research aims to provide educational insight for netizens on how to get smart ways to counteract negative information on social media, especially Instagram as the object of this discussion. The method used by the author in this discussion is a literature study with the main sources being documentation, news, articles that are in accordance with the topic of study. The results of this study are that there are several groups of netizens who are easily influenced by negative news, they are also easily provoked based on social media behavior. Digital jihad strategies on Instagram accounts using the istihsan method as a step to combat misinformation or news; negative by verifying or "tabayyun", then filtering the news sources and measuring in terms of benefits and harm, so that valid conclusions can be found regarding the source of the news circulating on social media Instagram.
Article
Full-text available
Sybil detection in social networks is a basic security research problem. Structure-based methods have been shown to be promising at detecting Sybils. Existing structure-based methods can be classified into Random Walk (RW)-based methods and Loop Belief Propagation (LBP)-based methods. RW-based methods cannot leverage labeled Sybils and labeled benign users simultaneously, which limits their detection accuracy, and/or they are not robust to noisy labels. LBP-based methods are not scalable and cannot guarantee convergence. In this work, we propose SybilSCAR, a novel structure-based method to detect Sybils in social networks. SybilSCAR is Scalable, Convergent, Accurate, and Robust to label noise. We first propose a framework to unify RW-based and LBP-based methods. Under our framework, these methods can be viewed as iteratively applying a (different) local rule to every user, which propagates label information among a social graph. Second, we design a new local rule, which SybilSCAR iteratively applies to every user to detect Sybils. We compare SybilSCAR with state-of-the-art RW-based and LBP-based methods theoretically and empirically. Theoretically, we show that, with proper parameter settings, SybilSCAR has a tighter asymptotical bound on the number of Sybils that are falsely accepted into a social network than existing structure-based methods. Empirically, we perform evaluation using both social networks with synthesized Sybils and a large-scale Twitter dataset (41.7M nodes and 1.2B edges) with real Sybils. Our results show that 1) SybilSCAR is substantially more accurate and more robust to label noise than state-of-the-art RW-based methods; 2) SybilSCAR is more accurate and one order of magnitude more scalable than state-of-the-art LBP-based methods.
Article
Full-text available
Today, Online Social Networks such as Facebook, LinkedIn and Twitter are the most popular platforms on the Internet, on which millions of users register to share personal information with their friends. A large amount of data, social links and statistics about users are collected by Online Social Networks services and they create big digital mines of various statistical data. Leakage of personal information is a significant concern for social network users. Besides information propagation, some new attacks on Online Social Networks such as Identity Clone attack (ICA) have been identified. ICA attempts to create a fake online identity of a victim to fool their friends into believing the authenticity of the fake identity to establish social links in order to reap the private information of the victims friends which is not shared in their public profiles. There are some identity validation services that perform users identity validation, but they are passive services and they only protect users who are informed on privacy concerns and online identity issues. This paper starts with an explanation of two types of profile cloning attacks are explained and a new approach for detecting clone identities is proposed by defining profile similarity and strength of relationship measures. According to similar attributes and strength of relationship among users which are computed in detection steps, it will be decided which profile is clone and which one is genuine by a predetermined threshold. Finally, the experimental results are presented to demonstrate the effectiveness of the proposed approach.
Article
Full-text available
Nowadays, Online Social Networks are popular websites on the internet, which millions of users register on and share their own personal information with others. Privacy threats and disclosing personal information are the most important concerns of OSNs users. Recently, a new attack which is named Identity Cloned Attack is detected on OSNs. In this attack the attacker tries to make a fake identity of a real user in order to access to private information of the users friends which they do not publish on the public profiles. In today OSNs, there are some verification services, but they are not active services and they are useful for users who are familiar with online identity issues. In this paper, Identity cloned attacks are explained in more details and a new and precise method to detect profile cloning in online social networks is proposed. In this method, first, the social network is shown in a form of graph, then, according to similarities among users, this graph is divided into smaller communities. Afterwards, all of the similar profiles to the real profile are gathered (from the same community), then strength of relationship (among all selected profiles and the real profile) is calculated, and those which have the less strength of relationship will be verified by mutual friend system. In this study, in order to evaluate the effectiveness of proposed method, all steps are applied on a dataset of Facebook, and finally this work is compared with two previous works by applying them on the dataset.
Conference Paper
Social media has become a valuable tool for hackers to disseminate misinformation through compromised accounts. A compromised account is an account accessed by a third party without the user's knowledge. Previous studies have found 13% of online adults experienced their social media accounts compromised. Since compromised accounts can have a significant adverse impact on the social media sites, this has led to the growing research on detecting compromised accounts. However, previous works are limited as they either focus on the detection of hacked accounts for spamming and phishing activities or utilize only twitter content information. In this paper, we performed a systematic study on compromised accounts in Twitter by identifying who compromise the accounts; what information they share, and what patterns their tweets present. Our findings suggest that the accounts can be compromised by two different types of hackers and the content they post tend to follow several common themes. We also showed that, in addition to the text content of the tweets, there are other meta-information that can be exploited to help improve the detection of compromised accounts.
Article
Online Social Networks (OSNs) play an important role for internet users to carry out their daily activities like content sharing, news reading, posting messages, product reviews and discussing events etc. At the same time, various kinds of spammers are also equally attracted towards these OSNs. These cyber criminals including sexual predators, online fraudsters, advertising campaigners, catfishes, and social bots etc. exploit the network of trust by various means especially by creating fake profiles to spread their content and carry out scams. All these malicious identities are very harmful for both the users as well as the service providers. From the OSN service provider point of view, fake profiles affect the overall reputation of the network in addition to the loss of bandwidth. To spot out these malicious users, huge manpower effort and more sophisticated automated methods are needed. In this paper, various types of OSN threat generators like compromised profiles, cloned profiles and online bots (spam bots, social bots, like bots and influential bots) have been classified. An attempt is made to present several categories of features that have been used to train classifiers in order to identify a fake profile. Different data crawling approaches along with some existing data sources for fake profile detection have been identified. A refresher on existing cyber laws to curb social media based cyber crimes with their limitations is also presented.
Article
Sybil attacks are becoming increasingly widespread, and pose a significant threat to online social systems; a single adversary can inject multiple colluding identities in the system to compromise security and privacy. Recent works have leveraged the use of social network-based trust relationships to defend against Sybil attacks. However, existing defenses are based on oversimplified assumptions, which do not hold in real world social graphs. In this work, we propose SybilFrame, a defense-in-depth framework for mitigating the problem of Sybil attacks when the oversimplified assumptions are relaxed. Our framework is able to incorporate prior information about users and edges in the social graph. We validate our framework on synthetic and real world network topologies, including a large-scale Twitter dataset with 20M nodes and 265M edges, and demonstrate that our scheme performs an order of magnitude better than previous structure-based approaches.
Article
Anomalies in online social networks can signify irregular, and often illegal behaviour. Detection of such anomalies has been used to identify malicious individuals, including spammers, sexual predators, and online fraudsters. In this paper we survey existing computational techniques for detecting anomalies in online social networks. We characterise anomalies as being either static or dynamic, and as being labelled or unlabelled, and survey methods for detecting these different types of anomalies. We suggest that the detection of anomalies in online social networks is composed of two sub-processes; the selection and calculation of network features, and the classification of observations from this feature space. In addition, this paper provides an overview of the types of problems that anomaly detection can address and identifies key areas for future research.
Article
On virtual spaces, some individuals use multiple usernames or copycat/forge other users (usually called ldquosock puppetrdquo) to communicate with others. Those sock puppets are fake identities through which members of Internet community praise or create the illusion of support for the product or one's work, pretending to be a different person. A fundamental problem is how to identify these sock puppets.In this paper, we propose a sock puppet detection algorithm which combines authorship-identification techniques and link analysis. Firstly, we propose an interesting social network model in which links between two IDs are built if they have similar attitudes to most topics that both of them participate in; then, the edges are pruned according a hypothesis test, which consider the impact of their writing styles; finally, the link-based community detection for pruned network is performed. Compared to traditional methods, our approach has three advantages: (1) it conforms to the practical meanings of sock puppet community; (2) it can be applied in online situation; (3) it increases the efficiency of link analysis. In the experimental work, we evaluate our method using real datasets and compared our approach with several previous methods; the results have proved above advantages.[