Open Access
Subscription Access
Open Access
Subscription Access
Reinforcing and Detecting Clone Profiles in Online Social Networks
Subscribe/Renew Journal
Online Social Networking (OSN) has brought real lives of people into the virtual world, lending itself to a wide variety of uses, but at the same time leaving its users vulnerable. OSN users make a great deal of personal information public in their profiles, often neglecting security precautions. An attacker takes advantage of the fact and creates clone profiles. When these clone profiles become active, the attacker sends friend requests to the victims’ friends, inviting them to join the clone’s network. If they do so, the attacker is in a position to cause annoyance and mischief to the genuine user. It is extremely difficult for other users to identify clone identities, as most of the attribute values are identical between genuine and clone profiles. This paper focuses on and seeks to contribute to the solution of the problem of profile clone attacks. It does so in two steps. First, it presents a potential form of clone attack called ‘reinforced snowball sampling clone attack’. The experimental results of reinforced snowball sampling performed on Facebook showed that in-out friend networks, with the highest acceptance level for friend requests, are more susceptible to attack when request message is sent in native language. The paper goes on to present a novel framework of a clone recognizer called Clone Detector which depicts three effectual clone identification techniques. The Clone Detector uses a combination of content related and content free techniques to efficiently detect clone accounts on various social networks.
Keywords
Content Free Techniques, Content Related, Online Social Network, Profile Clone Attack, Reinforced Snowball Sampling Clone Attack.
Subscription
Login to verify subscription
User
Font Size
Information
- L. Jin, X. Long, H. Takabi, and J. B. D. Joshi, “Sybil attacks vs. identity clone attacks in online social networks,” In Proceedings 6th International Conference on Information Security and Assurance, Shanghai, China, pp. 28-30, April 2012.
- K. Gani, H. Hacid, and R. Skraba, “Towards multiple identity detection in social networks,” In Proceedings of the 21st International Conference Companion on World Wide Web, USA, pp. 503-504, 2012.
- M. Egele, G. Stringhini, C. Kruegel, and G. Vigna, “COMPA: Detecting compromise accounts on social networks,” In Proceedings of the 2013 ISOC Network and Distributed System Security Symposium, 2013.
- D. M. Boyd, and N. B. Ellison, “Social network sites: Definition, history, and scholarship,” Journal of Computer- Mediated Communication, vol. 13, no. 1, pp. 210-230, 2007.
- Z. Shan, H. Cao, J. Lv, C. Yan, and A. Liu, “Enhancing and identifying cloning attacks in online social networks,” In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, Article No. 59, ACM, Kota Kinabalu, Malaysia, pp.17-19, 2013.
- L. Jin, H. Takabi, and J. B. D. Joshi, “Towards active detection of identity clone attacks on online social networks,” In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, USA, pp. 27-38, February, 2011.
- L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are belong to us: Automated identity theft attacks on social networks,” In Proceedings of the 18th International Conference on World Wide Web ACM, New York, USA, pp. 551-560, 2009.
- G. Kontaxis, I. Polakis, S. Ioannidis, and E. P. Markatos, “Detecting social network profile cloning,” In Proceedings of the 3rd International Workshop on Security and Social Networking, pp. 295-300, 2011.
- L. Jin, H. Takabi, and J. B. D. Joshi, “Towards active detection of identity clone attacks on online social networks,” In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, USA, pp.27-38, February 2011.
- M. Conti, R. Poovendran, and M. Secchiero, “FakeBook: Detecting fake profiles in on-line social networks,” In Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining, pp. 1071-1078, 2012.
- C. M. Zhang, and V. Paxson, “Detecting and analyzing automated activity on twitter,” In Proceedings of the 12th International Conference on Passive and Active Measurement Springer-Verlag Berlin Heidelberg, pp. 102-111, 2011.
- M. Egele, G. Stringhini, C. Kruegel, and G. Vigna, “COMPA: Detecting compromised accounts on social networks,” Proceedings of the 2013 ISOC Network and Distributed Systems Symposium, San Diego, CA, pp. 24-27 February 2013.
Abstract Views: 226
PDF Views: 0