An approach for detecting profile cloning in online social networks

Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,997

This Paper With 13 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ECDC07_066

تاریخ نمایه سازی: 9 تیر 1392

Abstract:

Online social networks (OSNs) are websites that allow users to build connections and relationships to other Internet users. Social networks store information remotely, rather than ona user’s personal computer. They can be used to keep in touch with friends, make new contacts and find people with similar interests and ideas. Nowadays the popularity of online social networks is growing rapidly. Many people besides friends and acquaintances are interested inthe information people post on social networks. Identity thieves, scam artists, debt collectors, stalkers, and corporations looking for a market advantage are using social networks to gather information about consumers. Companies that operate social networks are themselvescollecting a variety of data about their users, both to personalize the services for the users and to sell to advertisers. The concern of leakage of privacy and security is extremely growing in social networks in these days .The identity theft attacks (ICAs) by creating clone identities inOSNs try to steal users’ personal information and nowadays it is very important in cyberspace.If no protection mechanism is applied it effects on users’ activity, trust and reliance relationsthat establish with other users. In this paper, first profile cloning and identity theft attack areintroduced, and then a framework for detection suspicious identity is proposed. This approach is based on attribute similarity and friend network similarity. According to similarity measures which are computed in each step and by having predetermined threshold, it will be decidedwhich profile is clone which one is genuine.

Authors

Mohammad Reza Khayyambashi

University of Isfahan, Isfahan, Iran

Fatemeh Salehi Rizi

Master student in Sheikh Bahaei University, Isfahan, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Akcora. C. G, B. Carminati & E. Ferrari (2011). 'Network ...
  • Bhumiratana B (2011). 'A Model for Automating Persistent Identity Clone ...
  • Bilge. L, T. Strufe, D. Balzarotti & E. Kirda (2009). ...
  • Buede, D. (2009). The engineering design of systems models and ...
  • Gao. H, Jun Hu , T. Huang , J. Wang ...
  • Gross. R & A. Acquisti (2005). 'Information Revelation and Privacy ...
  • Jin. L, H .Takabi & J. Joshi (2011). "Towards Active ...
  • Kontaxis. G, I. Polakis, S. Loannidis & E. Markatos (2011). ...
  • Motoyama. M & G. Varghese (2009). I Seek you: Searching ...
  • Saeid. M, A. A. Ghani & Hassan Selamt (2011). 'Ranked ...
  • Srinivas. G. J., N. Tandon &V. Varma (2010). 'A Weighted ...
  • Zhang. C, J. Sun, X. Zhu & Y. Fang (2010). ...
  • نمایش کامل مراجع