An approach for detecting profile cloning in online social networks

سال انتشار: 1392
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 2,081

فایل این مقاله در 13 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ECDC07_066

تاریخ نمایه سازی: 9 تیر 1392

چکیده مقاله:

Online social networks (OSNs) are websites that allow users to build connections and relationships to other Internet users. Social networks store information remotely, rather than ona user’s personal computer. They can be used to keep in touch with friends, make new contacts and find people with similar interests and ideas. Nowadays the popularity of online social networks is growing rapidly. Many people besides friends and acquaintances are interested inthe information people post on social networks. Identity thieves, scam artists, debt collectors, stalkers, and corporations looking for a market advantage are using social networks to gather information about consumers. Companies that operate social networks are themselvescollecting a variety of data about their users, both to personalize the services for the users and to sell to advertisers. The concern of leakage of privacy and security is extremely growing in social networks in these days .The identity theft attacks (ICAs) by creating clone identities inOSNs try to steal users’ personal information and nowadays it is very important in cyberspace.If no protection mechanism is applied it effects on users’ activity, trust and reliance relationsthat establish with other users. In this paper, first profile cloning and identity theft attack areintroduced, and then a framework for detection suspicious identity is proposed. This approach is based on attribute similarity and friend network similarity. According to similarity measures which are computed in each step and by having predetermined threshold, it will be decidedwhich profile is clone which one is genuine.

نویسندگان

Mohammad Reza Khayyambashi

University of Isfahan, Isfahan, Iran

Fatemeh Salehi Rizi

Master student in Sheikh Bahaei University, Isfahan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Akcora. C. G, B. Carminati & E. Ferrari (2011). 'Network ...
  • Bhumiratana B (2011). 'A Model for Automating Persistent Identity Clone ...
  • Bilge. L, T. Strufe, D. Balzarotti & E. Kirda (2009). ...
  • Buede, D. (2009). The engineering design of systems models and ...
  • Gao. H, Jun Hu , T. Huang , J. Wang ...
  • Gross. R & A. Acquisti (2005). 'Information Revelation and Privacy ...
  • Jin. L, H .Takabi & J. Joshi (2011). "Towards Active ...
  • Kontaxis. G, I. Polakis, S. Loannidis & E. Markatos (2011). ...
  • Motoyama. M & G. Varghese (2009). I Seek you: Searching ...
  • Saeid. M, A. A. Ghani & Hassan Selamt (2011). 'Ranked ...
  • Srinivas. G. J., N. Tandon &V. Varma (2010). 'A Weighted ...
  • Zhang. C, J. Sun, X. Zhu & Y. Fang (2010). ...
  • نمایش کامل مراجع