Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Towards active detection of identity clone attacks on online social networks

Jin, L and Takabi, H and Joshi, JBD (2011) Towards active detection of identity clone attacks on online social networks. In: UNSPECIFIED.

[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)


Online social networks (OSNs) are becoming increasingly popular and Identity Clone Attacks (ICAs) that aim at creating fake identities for malicious purposes on OSNs are becoming a significantly growing concern. Such attacks severely affect the trust relationships a victim has built with other users if no active protection is applied. In this paper, we first analyze and characterize the behaviors of ICAs. Then we propose a detection framework that is focused on discovering suspicious identities and then validating them. Towards detecting suspicious identities, we propose two approaches based on attribute similarity and similarity of friend networks. The first approach addresses a simpler scenario where mutual friends in friend networks are considered; and the second one captures the scenario where similar friend identities are involved. We also present experimental results to demonstrate flexibility and effectiveness of the proposed approaches. Finally, we discuss some feasible solutions to validate suspicious identities. Copyright 2011 ACM.


Social Networking:
Share |


Item Type: Conference or Workshop Item (UNSPECIFIED)
Status: Published
CreatorsEmailPitt UsernameORCID
Jin, L
Takabi, H
Joshi, JBDjjoshi@pitt.eduJJOSHI0000-0003-4519-9802
Date: 24 March 2011
Date Type: Publication
Journal or Publication Title: CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
Page Range: 27 - 38
Event Type: Conference
DOI or Unique Handle: 10.1145/1943513.1943520
Institution: University of Pittsburgh
Schools and Programs: School of Information Sciences > Information Science
Refereed: Yes
ISBN: 9781450304665
Date Deposited: 12 Jul 2011 13:40
Last Modified: 11 Apr 2020 14:55


Monthly Views for the past 3 years

Plum Analytics

Actions (login required)

View Item View Item