Abstract
The social network a crucial part of our life is plagued by online impersonation and fake accounts. Facebook, Instagram, Snapchat are the most well-known informal communities’ sites. The informal organization an urgent piece of our life is tormented by online pantomime and phony records. Fake profiles are for the most part utilized by the gatecrashers to complete malevolent exercises, for example, hurting individual, data fraud, and security interruption in online social network (OSN). Hence, recognizing a record is certified or counterfeit is one of the basic issues in OSN. Right now, propose a model that could be utilized to group a record as phony or certified. This model uses random forest method as an arrangement strategy and can process an enormous dataset of records on the double, wiping out the need to assess each record physically. Our concern can be said to be a characterization or a bunching issue. As this is a programmed recognition strategy, it very well may be applied effectively by online interpersonal organizations which have a large number of profiles, whose profiles cannot be inspected physically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Z. Halim, M. Gul, N. ul Hassan, R. Baig, S. Rehman, F. Naz, Malicious users’ circle detection in social network based on spatiotemporal co-occurrence, in 2011 International Conference on Computer Networks and Information Technology (ICCNIT), pp. 35–390
T.P. Jacob, A. Pravin, P. Asha, Arduino object follower with augmented reality. Int. J. Eng. Technol. 7(3.27), 108–110 (2018)
K. Pradeep, T.P. Jacob, Comparative analysis of scheduling and load balancing algorithms in cloud environment, in 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (IEEE, 2016), pp. 526–531
G. Nagarajan, R.I. Minu, Fuzzy ontology based multi-modal semantic information retrieval. Procedia Comput. Sci. 48, 101–106 (2015)
S. Monisha, S. Vigneshwari, A framework for ontology based link analysis for web mining. J. Theo. Appl. Inf. Technol. 73(2) (2015)
G. Nagarajan, R.I. Minu, A.J. Devi, Optimal nonparametric bayesian model-based multimodal BoVW creation using multilayer pLSA. Circ. Syst. Sign. Process. 39(2), 1123–1132 (2020)
M. Fire, D. Kagan, A. Elyashar, Y. Elovici, Friend or foe? Fake profile identification in online social networks. Soc. Netw. Anal. Min. 1–23 (2014)
M.S. Rahman, T.K. Huang, H.V. Madhyastha, M. Faloutsos, Frappe: detecting malicious Facebook applications, in Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, (ACM, 2012), pp. 313–324
S. Abu-Nimeh, T.M. Chen, O. Alzubi, Malicious and spam posts in online social networks. Computer 44(9), 23–28 (2011)
Q. Cao, M. Sirivianos, X. Yang, K. Munagala, Combating friend spam using social rejections, in IEEE 35th International Conference on Distributed Computing Systems, (IEEE, 2015), pp. 235–244
K.P.N. Puttaswamy, A. Sala, B.Y. Zhao, Starclique: guaranteeing user privacy in social networks against intersection attacks, in Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT ’09. (ACM, New York, NY, USA, 2009), pp. 157–168
Y. Liu, K. Gummadi, B. Krishnamurthy, A. Mislove, Analyzing Facebook privacy settings: User expectations vs. reality, in Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, (ACM, 2011), pp. 61–70
S. Mahmood, Y. Desmedt, Poster: preliminary analysis of google?’s privacy, in Proceedings of the 18th ACM Conference on Computer and Communications Security, (ACM, 2011), pp. 809–812
T. Stein, E. Chen, K. Mangla, Facebook immune system, in Proceedings of the 4th Workshop On Social Network Systems, (ACM, 2011), pp. 1–8
J. Kuzma, Account creation security of social network sites. Int. J. Appl. Sci. Technol. 1(3), 8–13 (2011)
H. Kwak, C. Lee, H. Park, S. Moon, What is Twitter, a social network or a news media? in International World Wide Web Conference Committee (IW3C2), (ACM, 2010), pp. 1–10
D. Debar, H. Wechsler, Using social network analysis for spam detection, in Proceedings of the 3rd International Conference on Social Computing, Behavioral Modeling, and Prediction (SBP’10). (Springer, Berlin, Heidelberg, 2010), pp. 62–69
W.J. Cukierski, B. Hamner, B. Yang, Graph based features for supervised link prediction, in IEEE International Joint Conference on Neural Networks (IJCNN), (IEEE 2011), pp. 1237–1244
G. Stringhini, C. Kruegel, G. Vigna, Detecting spammers on social networks, in ACSAC ’10: Proceedings of the 26th Annual Computer Security Applications Conference. (ACM Request Permissions, 2012), pp. 1–9
M. Anwar, P.W. Fong, A visualization tool for evaluating access control policies in Facebook-style social network systems, in Proceedings of the 27th annual ACM Symposium on Applied Computing, (ACM, 2012), pp. 1443–1450
M. Rahman, T. Huang, H. Madhyastha, M. Faloutsos, Efficient and scalable socware detection in online social networks, in Proceedings of the 21st USENIX Conference on Security Symposium 2012, USENIX Association, pp. 32–32
M. Fire, G. Katz, Y. Elovici, Strangers intrusion detection detecting spammers and fake profiles in social networks based on topology anomalies. ASE Hum. J. 1(1), 26–39 (2012)
F. Ahmed, M. Abulaish, An MCLBased approach for spam profile detection in online social networks, in IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (2012), pp. 1–7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ranjana, S., Sathian, R., Kamalesh, M.D. (2021). Fake Profile Detection in Facebook. In: Sherpa, K.S., Bhoi, A.K., Kalam, A., Mishra, M.K. (eds) Advances in Smart Grid and Renewable Energy. ETAEERE ETAEERE 2020 2020. Lecture Notes in Electrical Engineering, vol 691. Springer, Singapore. https://doi.org/10.1007/978-981-15-7511-2_74
Download citation
DOI: https://doi.org/10.1007/978-981-15-7511-2_74
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7510-5
Online ISBN: 978-981-15-7511-2
eBook Packages: EnergyEnergy (R0)