SlideShare a Scribd company logo
1 of 51
Download to read offline
SRGE 2017 Intelligent Systems and Data Mining: Applications and Trends, 6 Dec. 2017
1
Social Networks Protection against
Fake Profiles and Social Bots Attacks
Presented By
Mohamed Torky
Assistant Lecturer in (HICIS) Institute, and a PHD candidate in Computer Science, Faculty of
Science, Menoufyia University, Egypt. Member in Scientific Research Group in Egypt (SRGE)
Agenda
2
1
• Introduction
2
• Identity Verification and Detecting Fake Profiles in OSNs
3
• Protection against Social Bots in OSNs
4
• Conclusion
5
• Acknowledgment
Agenda
3
1
• Introduction
2
• Identity Verification and Detecting Fake Profiles in OSNs
3
• Protection against Social Bots in OSNs
4
• Conclusion
5
• Acknowledgment
1- Introduction
4
Security and Privacy in Social Networks
Preserving security and privacy is an
important aspect of OSNs systems . The open
nature of OSNs platforms motivates the
adversaries to launch several attack patterns.
Hence, protecting users' profiles and
safeguarding its privacy represent a vital
security issue in online social networks.
12/7/2017
1- Introduction
6
(1) Fake Profiles and Identity Verification Problem
Since Many OSN platforms lack of proper
authentication mechanisms, The attacker can
easily create set of fake profiles , then send fake
requests to several users in the social graph. The
intruders are exploiting the tendency of users to
accept friend requests with out verifying the
identity of requesting profiles.
Facebook has announced that there are 170
million Fake profiles among 1.3 billion profiles.
1- Introduction
7
(2) Social Bot Problem
Social Bots are automated software tools able to
simulates human behavior in automated
interactions on social network sites such as
Facebook and Twitter. Social bots are designed to
pass Turing Tests (e.g. CAPTCHA puzzles) in order
to performing malicious activities such as :
Creating Fake Profiles, Sending fake requests,
Harvesting Personal Information, Auto Posting and
Sharing, etc.
12/7/2017
What is the novel way for
creating profiles identities
and detecting Fake Profiles
in OSNs??
What the novel anti-Bot
mechanism for Protecting
OSNs against the current
generation of Social Bots??
Research Questions
Agenda
9
1
• Introduction
2
• Identity Verification and Detecting Fake Profiles in OSNs
3
• Protection against Social Bots in OSNs
4
• Conclusion
5
• Acknowledgment
12/7/2017
2-1 Fake Profiles Recognizer Model (FPR)
11
Fake Profile Recognizer
(FPR)
Users’ Identity
Generator (UIG)
Identity Verifier Machine
(IVM)
2-1 Fake Profiles Recognizer Model (FPR)
12
2-1 Fake Profiles Recognizer Model (FPR)
Intelligent system and it's application, FCI, Sat 3-12-2016
13
Users’ Identity Generator (UIG) Model
2-1 Fake Profiles Recognizer Model (FPR)
14
Identity Verifier Machine (IVM) Model
2-1 Fake Profiles Recognizer Model (FPR)
15
FPR Algorithm
12/7/2017
2-2 Datasets Description
Intelligent system and it's application, FCI, Sat 3-12-2016
17
2-2 Datasets Description
Intelligent system and it's application, FCI, Sat 3-12-2016
18
2-2 Datasets Description
Intelligent system and it's application, FCI, Sat 3-12-2016
19
2-2 Datasets Description
Intelligent system and it's application, FCI, Sat 3-12-2016
20
2-3 Evaluation and Practical Results
21
Fig 1 Fig 2
Fig 3
Fig 4
2-4 Results Enhancement
Intelligent system and it's application, FCI, Sat 3-12-2016
22
2-4 Results Enhancement
Intelligent system and it's application, FCI, Sat 3-12-2016
23
AccuracyF-MeasureRecallPrecisionDataset
03.9589.7301.9588.9794.5388.9795.4988.97Facebook
94.7776.7494.4777.4194.2777.4195.2277.41Google+
94.9381.9894.9281.818.9481.8195.0581.81Twitter
94.9182.8894.8982.7394.5382.7395.2582.73AVG
AUCFNRFall-OutSpecificityDataset
06.9588.6647.511.0447.411.6653.9588.34Facebook
94.7875.615.7322.604.7326.1895.2773.82Google+
94.9580.485.218.204.9320.8695.0779.14Twitter
94.9381.585.4717.284.7119.5795.2980.43AVG
2-4 Results Enhancement
24
Fig 1 Fig 2
2-5 Comparison Results
25
Fig 1 Fig 2
Agenda
26
1
• Introduction
2
• Identity Verification and Detecting Fake Profiles in OSNs
3
• Protection against Social Bots in OSNs
4
• Conclusion
5
• Acknowledgment
12/7/2017
3-1 Necklace CAPTCHA Mechanism
28
DEFFINITION: (A Necklace Graph)
A Necklace graph of order n is a cyclic Graph G consist of n
Vertices. Such that the Cyclic (Right OR Left) Shifts rotation of n
vertices, Produce n Binary Strings of Length n
01010
00101
10010
01001
10100
3-1 Necklace CAPTCHA Mechanism
29
R-WordsL-Words
G4K@8
8G4K@
@8G4K
K@8G4
4K@8G
G8@K4
4G8@K
K4G8@
@K4G8
8@K4G
DEFFINITION: (The Modified Necklace Graph)
A Necklace graph of order n is a cyclic Graph G consist of n Vertices that labeled
with (numeric, alphabetic, or symbolic characters) Such that the Cyclic (Right AND
Left) Shifts rotation of n vertices, Produce 2n numeric, alphabetic ,or symbolic words
of Length n
3-1 Necklace CAPTCHA Mechanism
30
The Differences between the Classical Necklace Graph and the modified One
Classical Necklace Graph Modified Necklace Graph
3-1 Necklace CAPTCHA Mechanism
31
3-1 Necklace CAPTCHA Mechanism
32
Necklace CAPTCHA Architecture
12/7/2017
3-2 Usability Results
34
Effectiveness Efficiency Satisfaction
ISO/IEC 9126-4
Standard
100. 
N
SU
Eff 100.
1 1
1 1



 
 
R
i
N
J
ij
R
i
N
J
ijij
t
tn
Effcy
Questionnaire and
System Usability Scale
(SUS) Algorithm
T1
T2
T3T4T5T6T7
173 Participants
against SEVEN
Tests
3-2 Usability Results
35
Effectiveness Results Solution Time Results
3-2 Usability Results
36
Efficiency Results Satisfaction Results
3-3 Security Results
37
XNX
QP
XNX
N
XP 



)!(!
!
)(
!
)(
)(*
X
XP
XP 
(1)
(2)
Necklace Graph of order (3) 6 Words Necklace Graph of order (4) 8 Words
Necklace Graph of order (5) Necklace Graph of order (6)10 Words 12 Words
3-3 Security Results
38
3-3 Security Results
39
Fig 1 Fig 2
3-4 Comparison Results
40
3-4 Comparison Results
41
Agenda
42
1
• Introduction
2
• Identity Verification and Detecting Fake Profiles in OSNs
3
• Protection against Social Bots in OSNs
4
• Conclusion
5
• Acknowledgment
43
In this study, We introduced a novel detection mechanism
called Fake Profiles Recognizer (FPR) for detecting fake
profiles in OSNs. The functionality of FPR depends on
Regular Expression approach for generating and
representing users’ identities. In addition the Deterministic
Finite Automaton (DFA) is used to verify the identities of
profiles for detecting the fake ones. Our approach is
simulated on three types of social networks, the results
clarified Accuracy (94.91%) and low False Positive Rate
(4.71%) in detecting Fake Profiles .Compared with other
mechanisms in the literature, FPR is a competitive
mechanism in detecting fake profiles in OSNs.
44
In this Study We designed an developed a novel anti-bot
mechanism called Necklace CAPTCHA for protecting OSNs
against the smart generation of social bots. The major functionality
of Necklace CAPTCHA has depended on employing Necklace
graph model for generating the CAPTCHA tests. Our CAPTCHA
is evaluated against Usability and Robustness metrics, and the
results clarified that Necklace CAPTCHA is usable CAPTCHA to
solve by the human users , such that it achieved Effectiveness rate
80.6 % . It achieved efficiency rate 93.33% and can be solved
within 24s. In addition, the robustness results demonstrated that
Necklace CAPTCHA is a robust mechanism against social bots
compared with other CAPTCHAs in the literature, such that it
achieved low breaking rate about 1.65 %.
45
46
47
48
Agenda
49
1
• Introduction
2
• Identity Verification and Detecting Fake Profiles in OSNs
3
• Protection against Social Bots in OSNs
4
• Conclusion
5
• Acknowledgment
50
Acknowledgment
51

More Related Content

What's hot

Deepfakes - How they work and what it means for the future
Deepfakes - How they work and what it means for the futureDeepfakes - How they work and what it means for the future
Deepfakes - How they work and what it means for the futureJarrod Overson
 
Image classification using CNN
Image classification using CNNImage classification using CNN
Image classification using CNNNoura Hussein
 
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdfCYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdfKumbidiGaming
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websitesm srikanth
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKcodebangla
 
Content Sharing Website PPT
Content Sharing Website PPTContent Sharing Website PPT
Content Sharing Website PPTanushkashastri
 
Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow) Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow) Lalit Jain
 
4d and 4d visualization
4d and 4d visualization 4d and 4d visualization
4d and 4d visualization Rahul Nayan
 
Virtual Machine Forensics
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensicsprimeteacher32
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
 

What's hot (20)

Deepfakes - How they work and what it means for the future
Deepfakes - How they work and what it means for the futureDeepfakes - How they work and what it means for the future
Deepfakes - How they work and what it means for the future
 
Deepfake.pptx
Deepfake.pptxDeepfake.pptx
Deepfake.pptx
 
3D-Doctor
3D-Doctor3D-Doctor
3D-Doctor
 
Image classification using CNN
Image classification using CNNImage classification using CNN
Image classification using CNN
 
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdfCYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
3D- Doctor
3D- Doctor3D- Doctor
3D- Doctor
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Content Sharing Website PPT
Content Sharing Website PPTContent Sharing Website PPT
Content Sharing Website PPT
 
Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow) Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow)
 
4d and 4d visualization
4d and 4d visualization 4d and 4d visualization
4d and 4d visualization
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Virtual Machine Forensics
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensics
 
Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Spam identification fake profile
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 

Similar to Social networks protection against fake profiles and social bots attacks

Social Networks Protection against Fake Profiles and Social Bots Attacks
Social Networks Protection against Fake Profiles and Social Bots AttacksSocial Networks Protection against Fake Profiles and Social Bots Attacks
Social Networks Protection against Fake Profiles and Social Bots AttacksDr. Mohamed Torky
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceAnimesh Singh
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET Journal
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Alexander Decker
 
Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...IJECEIAES
 
Big social data analytics - social network analysis
Big social data analytics - social network analysis Big social data analytics - social network analysis
Big social data analytics - social network analysis Jari Jussila
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
 
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ijaia
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Reviewtheijes
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking SitesIRJET Journal
 
A Novel Approach for Non-Invertible Cryptographic Key Generation from Cancell...
A Novel Approach for Non-Invertible Cryptographic Key Generation from Cancell...A Novel Approach for Non-Invertible Cryptographic Key Generation from Cancell...
A Novel Approach for Non-Invertible Cryptographic Key Generation from Cancell...Sreenivas Pallapu
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGIRJET Journal
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
The next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environmentThe next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environmentYuriy Kargapolov
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
 
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...ijtsrd
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature IJECEIAES
 
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...Prasanth Jayakumar
 

Similar to Social networks protection against fake profiles and social bots attacks (20)

Social Networks Protection against Fake Profiles and Social Bots Attacks
Social Networks Protection against Fake Profiles and Social Bots AttacksSocial Networks Protection against Fake Profiles and Social Bots Attacks
Social Networks Protection against Fake Profiles and Social Bots Attacks
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...
 
J1802035460
J1802035460J1802035460
J1802035460
 
Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...
 
Big social data analytics - social network analysis
Big social data analytics - social network analysis Big social data analytics - social network analysis
Big social data analytics - social network analysis
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
A Novel Approach for Non-Invertible Cryptographic Key Generation from Cancell...
A Novel Approach for Non-Invertible Cryptographic Key Generation from Cancell...A Novel Approach for Non-Invertible Cryptographic Key Generation from Cancell...
A Novel Approach for Non-Invertible Cryptographic Key Generation from Cancell...
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
The next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environmentThe next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environment
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature
 
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
 

More from Aboul Ella Hassanien

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdfAboul Ella Hassanien
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...Aboul Ella Hassanien
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...Aboul Ella Hassanien
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...Aboul Ella Hassanien
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxAboul Ella Hassanien
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdfAboul Ella Hassanien
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات Aboul Ella Hassanien
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي Aboul Ella Hassanien
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفالAboul Ella Hassanien
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالAboul Ella Hassanien
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىAboul Ella Hassanien
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية Aboul Ella Hassanien
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...Aboul Ella Hassanien
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةAboul Ella Hassanien
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى Aboul Ella Hassanien
 

More from Aboul Ella Hassanien (20)

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdf
 
SRGE photo.pdf
SRGE photo.pdfSRGE photo.pdf
SRGE photo.pdf
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفال
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
 
اقتصاد ميتافيرس
اقتصاد ميتافيرساقتصاد ميتافيرس
اقتصاد ميتافيرس
 

Recently uploaded

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Social networks protection against fake profiles and social bots attacks

  • 1. SRGE 2017 Intelligent Systems and Data Mining: Applications and Trends, 6 Dec. 2017 1 Social Networks Protection against Fake Profiles and Social Bots Attacks Presented By Mohamed Torky Assistant Lecturer in (HICIS) Institute, and a PHD candidate in Computer Science, Faculty of Science, Menoufyia University, Egypt. Member in Scientific Research Group in Egypt (SRGE)
  • 2. Agenda 2 1 • Introduction 2 • Identity Verification and Detecting Fake Profiles in OSNs 3 • Protection against Social Bots in OSNs 4 • Conclusion 5 • Acknowledgment
  • 3. Agenda 3 1 • Introduction 2 • Identity Verification and Detecting Fake Profiles in OSNs 3 • Protection against Social Bots in OSNs 4 • Conclusion 5 • Acknowledgment
  • 4. 1- Introduction 4 Security and Privacy in Social Networks Preserving security and privacy is an important aspect of OSNs systems . The open nature of OSNs platforms motivates the adversaries to launch several attack patterns. Hence, protecting users' profiles and safeguarding its privacy represent a vital security issue in online social networks.
  • 6. 1- Introduction 6 (1) Fake Profiles and Identity Verification Problem Since Many OSN platforms lack of proper authentication mechanisms, The attacker can easily create set of fake profiles , then send fake requests to several users in the social graph. The intruders are exploiting the tendency of users to accept friend requests with out verifying the identity of requesting profiles. Facebook has announced that there are 170 million Fake profiles among 1.3 billion profiles.
  • 7. 1- Introduction 7 (2) Social Bot Problem Social Bots are automated software tools able to simulates human behavior in automated interactions on social network sites such as Facebook and Twitter. Social bots are designed to pass Turing Tests (e.g. CAPTCHA puzzles) in order to performing malicious activities such as : Creating Fake Profiles, Sending fake requests, Harvesting Personal Information, Auto Posting and Sharing, etc.
  • 8. 12/7/2017 What is the novel way for creating profiles identities and detecting Fake Profiles in OSNs?? What the novel anti-Bot mechanism for Protecting OSNs against the current generation of Social Bots?? Research Questions
  • 9. Agenda 9 1 • Introduction 2 • Identity Verification and Detecting Fake Profiles in OSNs 3 • Protection against Social Bots in OSNs 4 • Conclusion 5 • Acknowledgment
  • 11. 2-1 Fake Profiles Recognizer Model (FPR) 11 Fake Profile Recognizer (FPR) Users’ Identity Generator (UIG) Identity Verifier Machine (IVM)
  • 12. 2-1 Fake Profiles Recognizer Model (FPR) 12
  • 13. 2-1 Fake Profiles Recognizer Model (FPR) Intelligent system and it's application, FCI, Sat 3-12-2016 13 Users’ Identity Generator (UIG) Model
  • 14. 2-1 Fake Profiles Recognizer Model (FPR) 14 Identity Verifier Machine (IVM) Model
  • 15. 2-1 Fake Profiles Recognizer Model (FPR) 15 FPR Algorithm
  • 17. 2-2 Datasets Description Intelligent system and it's application, FCI, Sat 3-12-2016 17
  • 18. 2-2 Datasets Description Intelligent system and it's application, FCI, Sat 3-12-2016 18
  • 19. 2-2 Datasets Description Intelligent system and it's application, FCI, Sat 3-12-2016 19
  • 20. 2-2 Datasets Description Intelligent system and it's application, FCI, Sat 3-12-2016 20
  • 21. 2-3 Evaluation and Practical Results 21 Fig 1 Fig 2 Fig 3 Fig 4
  • 22. 2-4 Results Enhancement Intelligent system and it's application, FCI, Sat 3-12-2016 22
  • 23. 2-4 Results Enhancement Intelligent system and it's application, FCI, Sat 3-12-2016 23 AccuracyF-MeasureRecallPrecisionDataset 03.9589.7301.9588.9794.5388.9795.4988.97Facebook 94.7776.7494.4777.4194.2777.4195.2277.41Google+ 94.9381.9894.9281.818.9481.8195.0581.81Twitter 94.9182.8894.8982.7394.5382.7395.2582.73AVG AUCFNRFall-OutSpecificityDataset 06.9588.6647.511.0447.411.6653.9588.34Facebook 94.7875.615.7322.604.7326.1895.2773.82Google+ 94.9580.485.218.204.9320.8695.0779.14Twitter 94.9381.585.4717.284.7119.5795.2980.43AVG
  • 26. Agenda 26 1 • Introduction 2 • Identity Verification and Detecting Fake Profiles in OSNs 3 • Protection against Social Bots in OSNs 4 • Conclusion 5 • Acknowledgment
  • 28. 3-1 Necklace CAPTCHA Mechanism 28 DEFFINITION: (A Necklace Graph) A Necklace graph of order n is a cyclic Graph G consist of n Vertices. Such that the Cyclic (Right OR Left) Shifts rotation of n vertices, Produce n Binary Strings of Length n 01010 00101 10010 01001 10100
  • 29. 3-1 Necklace CAPTCHA Mechanism 29 R-WordsL-Words G4K@8 8G4K@ @8G4K K@8G4 4K@8G G8@K4 4G8@K K4G8@ @K4G8 8@K4G DEFFINITION: (The Modified Necklace Graph) A Necklace graph of order n is a cyclic Graph G consist of n Vertices that labeled with (numeric, alphabetic, or symbolic characters) Such that the Cyclic (Right AND Left) Shifts rotation of n vertices, Produce 2n numeric, alphabetic ,or symbolic words of Length n
  • 30. 3-1 Necklace CAPTCHA Mechanism 30 The Differences between the Classical Necklace Graph and the modified One Classical Necklace Graph Modified Necklace Graph
  • 31. 3-1 Necklace CAPTCHA Mechanism 31
  • 32. 3-1 Necklace CAPTCHA Mechanism 32 Necklace CAPTCHA Architecture
  • 34. 3-2 Usability Results 34 Effectiveness Efficiency Satisfaction ISO/IEC 9126-4 Standard 100.  N SU Eff 100. 1 1 1 1        R i N J ij R i N J ijij t tn Effcy Questionnaire and System Usability Scale (SUS) Algorithm T1 T2 T3T4T5T6T7 173 Participants against SEVEN Tests
  • 35. 3-2 Usability Results 35 Effectiveness Results Solution Time Results
  • 36. 3-2 Usability Results 36 Efficiency Results Satisfaction Results
  • 37. 3-3 Security Results 37 XNX QP XNX N XP     )!(! ! )( ! )( )(* X XP XP  (1) (2) Necklace Graph of order (3) 6 Words Necklace Graph of order (4) 8 Words Necklace Graph of order (5) Necklace Graph of order (6)10 Words 12 Words
  • 42. Agenda 42 1 • Introduction 2 • Identity Verification and Detecting Fake Profiles in OSNs 3 • Protection against Social Bots in OSNs 4 • Conclusion 5 • Acknowledgment
  • 43. 43 In this study, We introduced a novel detection mechanism called Fake Profiles Recognizer (FPR) for detecting fake profiles in OSNs. The functionality of FPR depends on Regular Expression approach for generating and representing users’ identities. In addition the Deterministic Finite Automaton (DFA) is used to verify the identities of profiles for detecting the fake ones. Our approach is simulated on three types of social networks, the results clarified Accuracy (94.91%) and low False Positive Rate (4.71%) in detecting Fake Profiles .Compared with other mechanisms in the literature, FPR is a competitive mechanism in detecting fake profiles in OSNs.
  • 44. 44 In this Study We designed an developed a novel anti-bot mechanism called Necklace CAPTCHA for protecting OSNs against the smart generation of social bots. The major functionality of Necklace CAPTCHA has depended on employing Necklace graph model for generating the CAPTCHA tests. Our CAPTCHA is evaluated against Usability and Robustness metrics, and the results clarified that Necklace CAPTCHA is usable CAPTCHA to solve by the human users , such that it achieved Effectiveness rate 80.6 % . It achieved efficiency rate 93.33% and can be solved within 24s. In addition, the robustness results demonstrated that Necklace CAPTCHA is a robust mechanism against social bots compared with other CAPTCHAs in the literature, such that it achieved low breaking rate about 1.65 %.
  • 45. 45
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. Agenda 49 1 • Introduction 2 • Identity Verification and Detecting Fake Profiles in OSNs 3 • Protection against Social Bots in OSNs 4 • Conclusion 5 • Acknowledgment
  • 51. 51