Open Access   Article Go Back

Automatic Detection of Fake Profiles in Online Social Networks

R.V. Kotawadekar1 , A.S. Kamble2 , S.A. Surve3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-7 , Page no. 40-45, Jul-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i7.4045

Online published on Jul 31, 2019

Copyright © R.V. Kotawadekar, A.S. Kamble, S.A. Surve . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R.V. Kotawadekar, A.S. Kamble, S.A. Surve, “Automatic Detection of Fake Profiles in Online Social Networks,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.40-45, 2019.

MLA Style Citation: R.V. Kotawadekar, A.S. Kamble, S.A. Surve "Automatic Detection of Fake Profiles in Online Social Networks." International Journal of Computer Sciences and Engineering 7.7 (2019): 40-45.

APA Style Citation: R.V. Kotawadekar, A.S. Kamble, S.A. Surve, (2019). Automatic Detection of Fake Profiles in Online Social Networks. International Journal of Computer Sciences and Engineering, 7(7), 40-45.

BibTex Style Citation:
@article{Kotawadekar_2019,
author = {R.V. Kotawadekar, A.S. Kamble, S.A. Surve},
title = {Automatic Detection of Fake Profiles in Online Social Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {40-45},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4717},
doi = {https://doi.org/10.26438/ijcse/v7i7.4045}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.4045}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4717
TI - Automatic Detection of Fake Profiles in Online Social Networks
T2 - International Journal of Computer Sciences and Engineering
AU - R.V. Kotawadekar, A.S. Kamble, S.A. Surve
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 40-45
IS - 7
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
722 904 downloads 295 downloads
  
  
           

Abstract

In the present generation, the social life of everyone has become associated with the online social networks. These sites have made a drastic change in the way we pursue our social life. Making friends and keeping in contact with them and their updates has become easier. But with their rapid growth, many problems like fake profiles, online impersonation have also grown. There are no feasible solution exist to control these problems. In this project, we came up with a framework with which automatic detection of fake profiles is possible and is efficient. This framework uses classification techniques like Support Vector Machine, Naive Bayes and Decision trees to classify the profiles into fake or genuine classes. As, this is an automatic detection method, it can be applied easily by online social networks which has millions of profile whose profiles cannot be examined manually.

Key-Words / Index Term

Threats, Facebook Immune System, Classification, Training Datasets, Profile Attributes

References

[1] T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS, volume 11, page 8, 2011.
[2] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93{102. ACM, 2011.
[3] C. Wagner, S. Mitter, C. Korner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW, volume 12, 2012.
[4] G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295{300. IEEE, 2011.
[5] A. Wang. Detecting spam bots in online social networking sites: a machine learning approach. Data and Applications Security and Privacy XXIV, pages 335{342, 2010.
[6] G.K. Gupta. Introduction to Data Mining with Case Studies. Prentice Hall India, 2008.
[7] Spies create fake facebook account in nato chief`s name to steal personal details, http://in. news.yahoo.com/spies-create-fake-facebook-account-nato-chiefs-name-114824955.html.
[8] Man arrested for uploading obscene images of woman colleague, http://www.ndtv.com/ article/andhra-pradesh/man-arrested-for-uploading-obscene-images-of-woman-colleague-173266.
[9] How obamas internet campaign changed politics, /bits.blogs.nytimes.com/2008/11/07/how-obamas internet-campaign-changed-politics.
[10] M. Huber, M. Mulazzani, and E. Weippl. Who on earth is mr. cypher: Automated friend injection attacks on social networking sites. Security and Privacy{Silver Linings in the Cloud, pages 80{89, 2010.