A fusion fuzzy model for detecting phony accounts in social networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In online social network’s phony account detection is one of the major task among the ability of genuine user from forged user account. The fundamental objective of detection of phony account framework is to detect fake account and removal technique in Social network user sites. This work concentrates on detection of phony account in which it depends on normal basis framework, transformative Algorithms and fuzzy technique. Initially, the most essential attributes including personal attributes, comparability techniques and various real user review, tweets, or comments are extricated. A direct blend of these attributes demonstrates the significance of each reviews tweets comments etc. To compute closeness measure, a consolidated strategy in view of artificial honey bee state Algorithm and fuzzy technique are utilized. Second approach is proposed to alter the best weights of the normal user attributes utilizing the social network activities/transaction and inherited Algorithm. Finally, a normal rank rationale framework is utilized to calculate the final scoring of normal user activities. The decision making of proposed approach to find phony account are variation with existing techniques user behavioral analysis using data sets and machine learning techniques such as crowdflower_sample and genuine_accounts_sample dataset of facebook and Twitter. The outcomes demonstrate that proposed strategy overcomes the previously mentioned strategies.

     


  • Keywords


    Datasets; Fuzzy modeling; Machine Learning; Online Social Network; Phony Account;

  • References


      [1] Adewole, Kayode Sakariyah, et al. "Malicious accounts: dark of the social networks." Journal of Network and Computer Applications 79 (2017): 41-67.

      [2] Alarifi, Abdulrahman, Mansour Alsaleh, and AbdulMalik Al-Salman. "Twitter turing test: Identifying social machines." Information Sciences 372 (2016): 332-346.

      [3] Beato, Filipe, Stijn Meul, and Bart Preneel. "Practical identity-based private sharing for online social networks." Computer Communications 73 (2016): 243-250.

      [4] Boshmaf, Yazan, et al. "Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs." Computers & Security 61 (2016): 142-168.

      [5] Chakraborty, Manajit, et al. "Recent developments in social spam detection and combating techniques: A survey." Information Processing & Management 52.6 (2016): 1053-1073.

      [6] Dufner, Michael, Ruben C. Arslan, and Jaap JA Denissen. "The unconscious side of Facebook: Do online social network profiles leak cues to users’ implicit motive dispositions?." Motivation and Emotion 42.1 (2018): 79-89.

      [7] Fatima, Mehwish, et al. "Multilingual author profiling on Facebook." Information Processing & Management 53.4 (2017): 886-904.

      [8] K Purna Chand, G Narsimha,“Dynamic ontology based model for text classification”, International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 11, Number 7(2016) pp;4917- 4921.

      [9] Kaushal, Vishal, and Manasi Patwardhan. "Emerging Trends in Personality Identification Using Online Social Networks—A Literature Survey." ACM Transactions on Knowledge Discovery from Data (TKDD) 12.2 (2018): 15.

      [10] Kaushal, Vishal, and Manasi Patwardhan. "Emerging Trends in Personality Identification Using Online Social Networks—A Literature Survey." ACM Transactions on Knowledge Discovery from Data (TKDD) 12.2 (2018): 15.

      [11] Kayes, Imrul, and Adriana Iamnitchi. "Privacy and security in online social networks: A survey." Online Social Networks and Media 3 (2017): 1-21.

      [12] Luo, Entao, et al. "Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks." Future Generation Computer Systems 68 (2017): 222-233.

      [13] M V Narayana, G Narsimha, SSVN Sarma, “Secure- ZHLS: Secure Zone Based Hierarchical Link State Routing Protocol using Digital Signature”, International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 10, Number 9 (2015) pp. 22927-22940.

      [14] Miller, Zachary, et al. "Twitter spammer detection using data stream clustering." Information Sciences 260 (2014): 64-73.

      [15] Rathore, Shailendra, Vincenzo Loia, and Jong Hyuk Park. "SpamSpotter: an efficient spammer detection framework based on intelligent decision support system on facebook." Applied Soft Computing (2017).

      [16] Singh, Monika, Divya Bansal, and Sanjeev Sofat. "Who is Who on Twitter–Spammer, Fake or Compromised Account? A Tool to Reveal True Identity in Real-Time." Cybernetics and Systems (2018): 1-25.

      [17] Tsay-Vogel, Mina, James Shanahan, and Nancy Signorielli. "Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users." new media & society 20.1 (2018): 141-161.

      [18] Viejo, Alexandre, and Jordi Castellà-Roca. "Using social networks to distort users’ profiles generated by web search engines." Computer Networks 54.9 (2010): 1343-1357.

      [19] Wessel, Michael, Ferdinand Thies, and Alexander Benlian. "The emergence and effects of fake social information: Evidence from crowdfunding." Decision Support Systems 90 (2016): 75-85.

      [20] Xie, Wenjing, and Cheeyoun Kang. "See you, see me: Teenagers’ self-disclosure and regret of posting on social network site." Computers in Human Behavior 52 (2015): 398-407.

      [21] Zhang, Zhongbao, et al. "Identifying the same person across two similar social networks in a unified way: Globally and locally." Information Sciences 394 (2017): 53-67.


 

View

Download

Article ID: 17345
 
DOI: 10.14419/ijet.v7i4.17345




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.