Skip to main content

Fake Profile Detection in Facebook

  • Conference paper
  • First Online:
Advances in Smart Grid and Renewable Energy (ETAEERE 2020, ETAEERE 2020)

Abstract

The social network a crucial part of our life is plagued by online impersonation and fake accounts. Facebook, Instagram, Snapchat are the most well-known informal communities’ sites. The informal organization an urgent piece of our life is tormented by online pantomime and phony records. Fake profiles are for the most part utilized by the gatecrashers to complete malevolent exercises, for example, hurting individual, data fraud, and security interruption in online social network (OSN). Hence, recognizing a record is certified or counterfeit is one of the basic issues in OSN. Right now, propose a model that could be utilized to group a record as phony or certified. This model uses random forest method as an arrangement strategy and can process an enormous dataset of records on the double, wiping out the need to assess each record physically. Our concern can be said to be a characterization or a bunching issue. As this is a programmed recognition strategy, it very well may be applied effectively by online interpersonal organizations which have a large number of profiles, whose profiles cannot be inspected physically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Z. Halim, M. Gul, N. ul Hassan, R. Baig, S. Rehman, F. Naz, Malicious users’ circle detection in social network based on spatiotemporal co-occurrence, in 2011 International Conference on Computer Networks and Information Technology (ICCNIT), pp. 35–390

    Google Scholar 

  2. T.P. Jacob, A. Pravin, P. Asha, Arduino object follower with augmented reality. Int. J. Eng. Technol. 7(3.27), 108–110 (2018)

    Google Scholar 

  3. K. Pradeep, T.P. Jacob, Comparative analysis of scheduling and load balancing algorithms in cloud environment, in 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (IEEE, 2016), pp. 526–531

    Google Scholar 

  4. G. Nagarajan, R.I. Minu, Fuzzy ontology based multi-modal semantic information retrieval. Procedia Comput. Sci. 48, 101–106 (2015)

    Article  Google Scholar 

  5. S. Monisha, S. Vigneshwari, A framework for ontology based link analysis for web mining. J. Theo. Appl. Inf. Technol. 73(2) (2015)

    Google Scholar 

  6. G. Nagarajan, R.I. Minu, A.J. Devi, Optimal nonparametric bayesian model-based multimodal BoVW creation using multilayer pLSA. Circ. Syst. Sign. Process. 39(2), 1123–1132 (2020)

    Article  Google Scholar 

  7. M. Fire, D. Kagan, A. Elyashar, Y. Elovici, Friend or foe? Fake profile identification in online social networks. Soc. Netw. Anal. Min. 1–23 (2014)

    Google Scholar 

  8. M.S. Rahman, T.K. Huang, H.V. Madhyastha, M. Faloutsos, Frappe: detecting malicious Facebook applications, in Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, (ACM, 2012), pp. 313–324

    Google Scholar 

  9. S. Abu-Nimeh, T.M. Chen, O. Alzubi, Malicious and spam posts in online social networks. Computer 44(9), 23–28 (2011)

    Article  Google Scholar 

  10. Q. Cao, M. Sirivianos, X. Yang, K. Munagala, Combating friend spam using social rejections, in IEEE 35th International Conference on Distributed Computing Systems, (IEEE, 2015), pp. 235–244

    Google Scholar 

  11. K.P.N. Puttaswamy, A. Sala, B.Y. Zhao, Starclique: guaranteeing user privacy in social networks against intersection attacks, in Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT ’09. (ACM, New York, NY, USA, 2009), pp. 157–168

    Google Scholar 

  12. Y. Liu, K. Gummadi, B. Krishnamurthy, A. Mislove, Analyzing Facebook privacy settings: User expectations vs. reality, in Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, (ACM, 2011), pp. 61–70

    Google Scholar 

  13. S. Mahmood, Y. Desmedt, Poster: preliminary analysis of google?’s privacy, in Proceedings of the 18th ACM Conference on Computer and Communications Security, (ACM, 2011), pp. 809–812

    Google Scholar 

  14. T. Stein, E. Chen, K. Mangla, Facebook immune system, in Proceedings of the 4th Workshop On Social Network Systems, (ACM, 2011), pp. 1–8

    Google Scholar 

  15. J. Kuzma, Account creation security of social network sites. Int. J. Appl. Sci. Technol. 1(3), 8–13 (2011)

    Google Scholar 

  16. H. Kwak, C. Lee, H. Park, S. Moon, What is Twitter, a social network or a news media? in International World Wide Web Conference Committee (IW3C2), (ACM, 2010), pp. 1–10

    Google Scholar 

  17. D. Debar, H. Wechsler, Using social network analysis for spam detection, in Proceedings of the 3rd International Conference on Social Computing, Behavioral Modeling, and Prediction (SBP’10). (Springer, Berlin, Heidelberg, 2010), pp. 62–69

    Google Scholar 

  18. W.J. Cukierski, B. Hamner, B. Yang, Graph based features for supervised link prediction, in IEEE International Joint Conference on Neural Networks (IJCNN), (IEEE 2011), pp. 1237–1244

    Google Scholar 

  19. G. Stringhini, C. Kruegel, G. Vigna, Detecting spammers on social networks, in ACSAC ’10: Proceedings of the 26th Annual Computer Security Applications Conference. (ACM Request Permissions, 2012), pp. 1–9

    Google Scholar 

  20. M. Anwar, P.W. Fong, A visualization tool for evaluating access control policies in Facebook-style social network systems, in Proceedings of the 27th annual ACM Symposium on Applied Computing, (ACM, 2012), pp. 1443–1450

    Google Scholar 

  21. M. Rahman, T. Huang, H. Madhyastha, M. Faloutsos, Efficient and scalable socware detection in online social networks, in Proceedings of the 21st USENIX Conference on Security Symposium 2012, USENIX Association, pp. 32–32

    Google Scholar 

  22. M. Fire, G. Katz, Y. Elovici, Strangers intrusion detection detecting spammers and fake profiles in social networks based on topology anomalies. ASE Hum. J. 1(1), 26–39 (2012)

    Google Scholar 

  23. F. Ahmed, M. Abulaish, An MCLBased approach for spam profile detection in online social networks, in IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (2012), pp. 1–7

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Ranjana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ranjana, S., Sathian, R., Kamalesh, M.D. (2021). Fake Profile Detection in Facebook. In: Sherpa, K.S., Bhoi, A.K., Kalam, A., Mishra, M.K. (eds) Advances in Smart Grid and Renewable Energy. ETAEERE ETAEERE 2020 2020. Lecture Notes in Electrical Engineering, vol 691. Springer, Singapore. https://doi.org/10.1007/978-981-15-7511-2_74

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7511-2_74

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7510-5

  • Online ISBN: 978-981-15-7511-2

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics