Social Media Identity Deception Detection

@article{AlHarbi2021SocialMI,
  title={Social Media Identity Deception Detection},
  author={Ahmed AlHarbi and Hai Dong and X. Yi and Zahir Tari and Ibrahim Khalil},
  journal={ACM Computing Surveys (CSUR)},
  year={2021},
  volume={54},
  pages={1 - 35}
}
Social media have been growing rapidly and become essential elements of many people’s lives. Meanwhile, social media have also come to be a popular source for identity deception. Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception. This survey analyzes various identity deception attacks, which can be categorized into fake profile, identity theft, and identity cloning. This survey provides a… Expand
1 Citations

Figures and Tables from this paper

Privacy-Aware Identity Cloning Detection based on Deep Forest
TLDR
This approach leverages non-privacy-sensitive user profile data gathered from social networks and a powerful deep learning model to perform cloned identity detection and significantly outperforms state-of-the-art identity cloning detection techniques and the other popular identity deception detection models atop a real-world dataset. Expand

References

SHOWING 1-10 OF 147 REFERENCES
Knowledge‐based approaches for identity management in online social networks
TLDR
The problem is defined, a taxonomy of related attacks is provided, and the available solutions and approaches for knowledge‐based identity management in OSNs are discussed. Expand
Towards active detection of identity clone attacks on online social networks
TLDR
A detection framework that is focused on discovering suspicious identities and then validating them and two approaches based on attribute similarity and similarity of friend networks are proposed. Expand
A Case Study of Sockpuppet Detection in Wikipedia
This paper presents preliminary results of using authorship attribution methods for the detection of sockpuppeteering in Wikipedia. Sockpuppets are fake accounts created by malicious users to bypassExpand
A Survey on Data Collection for Machine Learning: A Big Data - AI Integration Perspective
TLDR
This survey performs a comprehensive study of data collection from a data management point of view, providing a research landscape of these operations, guidelines on which technique to use when, and identify interesting research challenges. Expand
  • 2019
A Time-Series Sockpuppet Detection Method for Dynamic Social Relationships
TLDR
A weight representation method is designed to record the dynamic growth of sockpuppet’s social relationships and then transferred to a similarity time-series analysis problem, which obtains excellent detection performance, significantly outperforming previous methods. Expand
Identification of credulous users on Twitter
TLDR
This paper focuses on identifying credulous users on Twitter starting from those involved in any social relation with a bot, and relies on an existing bot detector along with its dataset of genuine users and bots that is extended with additional information about the friends of each genuine user. Expand
Sockpuppet Detection in Social Network via Propagation Tree
TLDR
This work proposes a propagation-structure based method to tackle sockpuppet detection problem and demonstrates that this method is more robust and outperforms previous methods. Expand
Spammer Detection and Fake User Identification on Social Networks
TLDR
A taxonomy of the Twitter spam detection approaches is presented that classifies the techniques based on their ability to detect: (i) fake content, (ii) spam based on URL, (iii) spam in trending topics, and (iv) fake users. Expand
...
1
2
3
4
5
...