Open Access Open Access  Restricted Access Subscription or Fee Access

Analyzing Malicious users on Social Networks Using Smart Sense Methods

Luis Miguel Vaquero, Sergey Volkov

Abstract


In recent years, Online Social Networks (OSNs) have dramatically expanded in popularity around the world. According to the data in October 2012, Facebook has 1.01 billion people using the site each month.1 Moreover, the numbers of users in five popular OSNs are listed in Table 1. The rapid growth of OSNs has attracted a large number of researchers to explore and study this popular, ubiquitous, and large-scale service. In this article, we focus on understanding user behavior in OSNs. The tools for social media network analysis and visualization have been emerging from many research groups and startup companies. These pioneering network analysis tools often require programming skills and knowledge of technical network terminology, making it a challenge for those without programming skills to import and make sense of network data. In this paper a detailed study on identification of malicious users has been carried.


Keywords


Spammers Detection, Behaviour based Social Media Analysis,

Full Text:

PDF

References


Ahmed Abouollo and Sultan Almuhammadi, “Detecting Malicious User Account Using Canvas Fingerprint”, 8th International Conference on Information and Communication Systems, 2017.

C. Grier, K. Thomas, V. Paxson, and M. Zhang, “@spam: The underground on 140 characters or less,” in Proc. ACM Conf. Comput. Commun. Security, 2010, pp. 27–37.

C. Wilson, B. Boe, A. Sala, K. Puttaswamy, and B. Zhao, “User interactions in social networks and their implications,” in Proc. 26th Annu. Comput. Security Appl. Conf., 2010, pp. 11–20.

Dr. Nalini Priya and Asswini. M, A Survey on Vulnerable Attacks in Online Social Networks”, International Conference on Innovation Information in Computing Technologies (ICIICT), 2015.

Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeid, “Detecting Spammers on Twitter”, Seventh annual Collaboration, Electronic messaging, AntiAbuse and Spam Conference July 13-14, 2010

Gianluca Stringhini, Pierre Mourlanne and Gregoire Jacob, “EVILCOHORT:Detect-ing Communities of Malicious Accounts on Online Services”, in Proc. USENIX Security Symp., 2015.

Hugo Fonseca, Eduardo Rocha, Paulo Salvador and Antonio Nogueira, “Framework for Collecting Social Network Event”, 2014 IEEE.

K. Lee, J. Caverlee, and S. Webb, “Uncovering social spammers: Social honeypots + machine learning,” in Proc. Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2010, pp. 435–442.

K.K. Arthi and Dr. V.Thiagarasu, “A Study on Web Spam Classification and Algorithms”, International Journal of Computer Trends and Technology (IJCTT), volume 4 Issue 9– Sep 2013.

Myo Myo Swe and Nyein Nyein Myo, “Fake Accounts Detection on Twitter Using Blacklist”, IEEE 2018.

Neha M. Yadav and Prof. Dr. P. N. Chatur, “Compromised Account Detection and Prevention by Profiling Social Behavior and FASS Key Concept”, IEEE 2017.

Roshne Vasanthamohan, N.P.Revathi and Dr.V.Anjana Devi, “Detecting Fake Social Network Profiles based on Image-Watermarking”, International Journal of IJRCCE, Vol. 6, Issue 3, March 2018.

Sulabh.S and Siva Shankar.S, “Survey Paper for WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream”, International Journal of Engineering And Computer Science ISSN: 2319-7242 Volume 3 Issue 5, May 2014.

W. B. Cavnar and J. M. Trenkle, “N-gram-based text categorization,” in Proc. 3rd Annu. Symp. Document Anal. Inform. Retrieval, 2005, pp. 161–175.

Z. Cai and C. Jermaine, “The latent community model for detecting sybils in social networks” in Proc. Symp. Netw. Distrib. Syst. Secur++ity, 2012, pp. 563–578.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.