Início
Conheça mais
Enviar pesquisa
Carregar
Entrar
Cadastre-se
Anúncio
Próximos SlideShares
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
Carregando em ... 3
1
de
4
Top clipped slide
IRJET- Identification of Clone Attacks in Social Networking Sites
13 de Nov de 2019
•
0 gostou
0 gostaram
×
Seja o primeiro a gostar disto
mostrar mais
•
29 visualizações
visualizações
×
Vistos totais
0
No Slideshare
0
De incorporações
0
Número de incorporações
0
Baixar agora
Baixar para ler offline
Denunciar
Engenharia
https://www.irjet.net/archives/V6/i7/IRJET-V6I7378.pdf
IRJET Journal
Seguir
Fast Track Publications
Anúncio
Anúncio
Anúncio
Recomendados
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
19 visualizações
•
4 slides
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
1.6K visualizações
•
6 slides
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
467 visualizações
•
8 slides
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
36 visualizações
•
5 slides
Social networks protection against fake profiles and social bots attacks
Aboul Ella Hassanien
1.1K visualizações
•
51 slides
An iac approach for detecting profile cloning
IJNSA Journal
386 visualizações
•
16 slides
Mais conteúdo relacionado
Apresentações para você
(19)
A Survey on Privacy in Social Networking Websites
IRJET Journal
•
59 visualizações
Learning to detect phishing ur ls
eSAT Publishing House
•
809 visualizações
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
ijcseit
•
47 visualizações
Phishing detection in ims using domain ontology and cba an innovative rule ...
ijistjournal
•
777 visualizações
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
•
45 visualizações
A Comparative Analysis of Different Feature Set on the Performance of Differe...
gerogepatton
•
97 visualizações
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET Journal
•
37 visualizações
762019109
IJRAT
•
56 visualizações
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
IJNSA Journal
•
49 visualizações
Integrated approach to detect spam in social media networks using hybrid feat...
IJECEIAES
•
103 visualizações
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
IJCNCJournal
•
65 visualizações
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Cybersecurity Education and Research Centre
•
2.8K visualizações
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
•
62 visualizações
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
•
20 visualizações
Automated Methods for Identity Resolution across Online Social Networks
Cybersecurity Education and Research Centre
•
2.6K visualizações
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
•
19 visualizações
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
ijaia
•
27 visualizações
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET Journal
•
22 visualizações
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
IJNSA Journal
•
121 visualizações
Similar a IRJET- Identification of Clone Attacks in Social Networking Sites
(20)
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
•
6 visualizações
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
•
84 visualizações
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET Journal
•
18 visualizações
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IJITE
•
151 visualizações
IRJET- Authentic News Summarization
IRJET Journal
•
49 visualizações
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
IRJET Journal
•
2 visualizações
Classification Methods for Spam Detection in Online Social Network
IRJET Journal
•
67 visualizações
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET Journal
•
14 visualizações
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET Journal
•
22 visualizações
A07010105
IJERD Editor
•
256 visualizações
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
•
36 visualizações
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
•
90 visualizações
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
•
203 visualizações
An IAC Approach for Detecting Profile Cloning in Online Social Networks
IJNSA Journal
•
42 visualizações
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
ijistjournal
•
3 visualizações
International Journal of Engineering Research and Development
IJERD Editor
•
389 visualizações
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
•
29 visualizações
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET Journal
•
19 visualizações
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
IRJET Journal
•
25 visualizações
An Anti-Phishing Framework Based on Visual Cryptography
IRJET Journal
•
94 visualizações
Anúncio
Mais de IRJET Journal
(20)
AN INVESTIGATION ON THE EFFICACY OF MARBLE DUST POWDER FOR STRENGTHENING THE ...
IRJET Journal
•
29 visualizações
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
IRJET Journal
•
9 visualizações
Thermal Analysis and Design Optimization of Solar Chimney using CFD
IRJET Journal
•
7 visualizações
Common Skin Disease Diagnosis and Prediction: A Review
IRJET Journal
•
42 visualizações
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
IRJET Journal
•
22 visualizações
Band structure of metallic single-walled carbon nanotubes
IRJET Journal
•
5 visualizações
IoT Based Assistive Glove for Visually Impaired People
IRJET Journal
•
10 visualizações
A SUPERVISED MACHINE LEARNING APPROACH USING K-NEAREST NEIGHBOR ALGORITHM TO ...
IRJET Journal
•
4 visualizações
An Overview of Traffic Accident Detection System using IoT
IRJET Journal
•
6 visualizações
Artificial Neural Network: A brief study
IRJET Journal
•
4 visualizações
Review Paper on Performance Analysis of LPG Refrigerator
IRJET Journal
•
6 visualizações
WOLBACHIA PIPIENTIS AND VARROA DESTRUCTOR MITE INFESTATION RATES OF NATIVE VE...
IRJET Journal
•
5 visualizações
Survey on Automatic Kidney Lesion Detection using Deep Learning
IRJET Journal
•
10 visualizações
A Review on Safety Management System in School Bus
IRJET Journal
•
10 visualizações
Design and Validation of a Light Vehicle Tubular Space Frame Chassis
IRJET Journal
•
7 visualizações
SMART BLIND STICK USING VOICE MODULE
IRJET Journal
•
12 visualizações
AUTOMATIC HYPODERMIC INFUSION REGULATOR
IRJET Journal
•
7 visualizações
Mobile Application of Pet Adoption System
IRJET Journal
•
11 visualizações
Literature Survey on “Crowdfunding Using Blockchain”
IRJET Journal
•
8 visualizações
Pricing Optimization using Machine Learning
IRJET Journal
•
12 visualizações
Último
(20)
21uh49.pdf
Chaitanya Jambotkar
•
0 visão
research article.ppt
CharuNangia
•
0 visão
Flight Inspection practical.pptx
ssuser1edd921
•
0 visão
asad_slide - Copy.pptx
AMANTUSHER
•
0 visão
Communication Skill.pptx
Itzsonya
•
0 visão
Nano Ceramic Roofing Tile.pptx
aqsamali1
•
0 visão
DS Unit-4-Communication .pdf
SantoshUpreti6
•
0 visão
What is Map.pptx
shucaybcabdi
•
0 visão
Fire Safety..pdf
JohnBosco117176
•
0 visão
ARTIFICIAL INTELEGENCE AYUSH NEGI_102023 (1).pptx
AyushNegi860870
•
0 visão
chapter 4.pptx
shucaybcabdi
•
0 visão
Presentation.pdf
JigneshGohil17
•
0 visão
Defining Moments.pdf
IsabelPitts2
•
0 visão
Shortcircuit-IEC.pdf
Wilfredo870952
•
0 visão
Tillage ppt.pdf
Sanket319948
•
0 visão
Machine Learning final project (Bitcoin Price Prediction).pdf
AunMustansarHussain1
•
0 visão
hje.pptx
MartinAnsong4
•
0 visão
Big Data Chapter1.pdf
SantoshUpreti6
•
0 visão
Panavia Tornado (Owners Workshop Manual).pdf
TahirSadikovi
•
0 visão
introduction-PMFME.pptx
Arlene Christina
•
0 visão
Anúncio
IRJET- Identification of Clone Attacks in Social Networking Sites
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 07 | JULY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3565 IDENTIFICATION OF CLONE ATTACKS IN SOCIAL NETWORKING SITES Nischitha G1, Mrs. Sheela N2 1M.tech Student Dept CS &E, JSS S &T U Mysuru. 2Assistant Professor Dept CS & E, JSS S&T U Mysuru. -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract- Social Networking Sites(SNS) is one of the most commonly used online platform by the people today, people use these applications to build a social relation and to stay connected with other user who shares the same interest, activity or real – life connection. Social Networking Sites have connected millions of people it is one the most popular internet activity today. Some of the popular Social Networking Sites are Facebook, Twitter, LinkedIn, Google Plus etc. As there are pros of these there are cons as well, as the people populate their online profile with a plethora of information that aims at offering a complete and correct information of themselves. Attackers use this information and form a fake account either in the same or different social networks and, therefore fool other users into forming trusting social relations with the faux profile. The Purpose of the paper is to identify the fake accounts and to compare different user activity algorithm in order to select the most appropriate. The proposed method address the problem by using two level of filtering, first level of filtering is done using Profile Matching using Fuzzy-sim algorithm, second level of filtering is User Activity Matching using three algorithms Predictive FP Growth Algorithm, Eclat, Apriori Algorithm and a comparative analysis is done to find most efficient algorithm among the FP growth, Eclat and Apriori. Keywords –online social network, social networking site, area of interest, social networking site 1, social networking site2 I. INTRODUCTION Social networking has ended up as everyday interest on the internet these days, the recognition of online social networking sites is getting higher every day due to the friendliness delivered in the websites and technological development.[1] Facebook has around 500 million users and suppressed Google, LinkedIn hosts profiles for more than 70 million individuals and 1 million for businesses. As the majority of customers are not acquainted with privateer issues, they frequently disclose a huge amount of private information‘s on their profiles that can be accessed by all the users in the network. [3] In profile cloning, where a person other than the legitimate owner of a profile creates a new profile in the same or other social networking site wherein he copies the information by means of doing so, he creates a fake profile impersonating the valid owner and invite the victim contacts to form a social link and may exchange messages, they establish a social link and they will have complete access to the other users private information’s. Users might also keep profiles in more than one social networking site, their contacts, especially the more distinct users have no way of knowing if a profile encountered in a social networking site has been created by the genuine user or not. A study [1] by Gross et al revealed that only 0.06%of the users hide visibility of information such as interests and relationship etc.. 99% twitter user had a default privacy setting. As online Social Networks consisting of Facebook and Google+ are getting progressively more embedded in people‘s daily lives, personal records turns into effortlessly uncovered and abused. Information harvesting, by the operator, malicious customers, and third party commercial business are being recognized as a great protection problem. The purpose of this project is to overcome this sort of attacks, the system uses two levels of filtering for identification of fake profiles the method considers two Social Networking Sites SNS1 and SNS2, it matches the user1 profile in SNS1 with user1 profile in SNS2. The method adapted uses two levels of filtering, first level is User’s Profile matching and the second level is User’s Activity Matching. Fuzzy Sim algorithm is used for profile matching and for User Activity matching three different algorithms are used they are predictive FP Growth algorithm which is modified from the original FP growth Algorithm, Eclat, Apriori algorithm are used and a comparative analysis is done to find the best suitable algorithm among the three for User Activity matching. Fig-1: System Design.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 07 | JULY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3566 II. LITERATURE SURVEY People who intend to clone a profile could use different techniques able manual cloning automatic cloning using information from the victims homepage in addition information like profile photo first name last name extra are usually available publicly as default account setting this helps the attacker to have easy access to the user profile details, attacker use this details and create fake profiles. The most dangerous is automated profile cloning which could create many clone accounts and collect much more confidential information. The automated tool had to first break the CAPTCHA, it is an image containing hidden sequence of letters or digits, it’s a computer program or system used to distinguish human from machine input. Unfortunately, many SNS allows many attempt to enter the captcha, and there many tools used to break them making it less secure and inefficient. One of the method presented in [2] describes a solution for profile cloning in linkedIn the solution has three main components Information distiller, Profile Hunter, ProfileVerifier. Information distiller extract Key information from the current profile of the user, the profile should contain unique attributes for each specific user this information is used by the query to find the similar profile which may be a clone profile. Profile Hunter searches for the similar profile in different social networking sites finally profile verifier is presented with the suspicious profile details where similarity is calculated by comparing it with the predefined threshold, the fake profiles where identified . But the drawback of this method was it was applied only on one social network. Other solution described in [4] using similarity comparisons the attributes were compared with fixed threshold, if result was less than the fix threshold then the profile were classified as clone profile else as genuine profile .Different methods were also used for similarity comparison such as attribute similarity based profile cloning detection, attribute similarity, dice’s coefficient methods. IP tracking methods were also employed the drawback was attacker could use the IP spoofing a common technique to change the IP address. III. METHODOLOGY The proposed system performs cross site profile cloning for identification of fake user, the profile of user1 in SNS1 is compared with User1 profile in SNS2, fuzzy- sim is used for Profile Matching, and three unsupervised techniques are applied for User Activity Matching namely Predictive FP growth, Eclat, Apriori .Predictive FP Growth is modified from the original FP Growth algorithm and finally comparative analysis is performed to find the best suitable algorithm for user activity matching. The method designed for this paper is discussed below, experiment was done using custom made social networking sites. A. User activity matching User Profile Matching (Fuzzy Sim) Step 1: Scan the User (SNS1 and SNS2) Database and Extract the Constraints or Parameters. Retrieve user profile details such as first name, last name, school, college, hometown, city etc. Step 2: Calculate the Similarity.. Compare 2 user constraints, S (1,2)=No of Characters Matching/Total no of characters in Constraint . Step 3: set threshold value to consider the constraints If (value >0.5) Consider those constraints. Step 4: Check if (constraints matching count>min_rec) Set the number of constraints to match for fake account prediction - min_rec =8 constraints ◦ Genuine else ◦ Fake B. User Activity Matching Predictive FP Growth Step1: Retrieve shared information from the database (User1 — OSN1). The information shared by the user is used for identifying the users area of interest. Step2: Tokenization [keyword extraction method – removing the stop words and retrieving the keywords] Get the user1 messages, remove the stop words, extract the keywords. Step 3: Clustering the messages shared by the users (grouping of similar objects) The keywords are compared with the predefined dataset (the set of keywords) the messages are clustered into different content type. Step 4: Check if(matching count>min _ rec) [number of messages to compare] A user must share minimum number of messages, for identification of his activity pattern. Step 5: Retrieve shared information from the other database (User2 — OSN2). Trace a user (OSN2) the area of interest, using the following steps Step 6: Tokenization [keyword extraction method – removing the stop words and retrieving the keywords]
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 07 | JULY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3567 Step 7: Clustering the messages shared by the users. By comparing with the predefined dataset (the set of keywords) Step 8: Check if(matching count>min_rec) A user must share minimum number of messages, for identification of his activity pattern. Step 9: Compare the present user Area of interest (AOI) OSN1 with the previous user AOI OSN2. If (AOI Matches) • Genuine else • Fake. Eclat STEP 1: Scan the dataset and form a transaction Id(tid) list The result forms C1 (Candidate one item set) for each of the datasets. STEP 2: Generate L1 (Frequent one item set). L1 is generated from C1, compare candidate set item‘s support count with minimum support count if support _ count of candidate set items is less than min_support then remove those items the rest of them forms L1. STEP 3: C2 (Combination of two items sets) is formed using L1. Intersecting the tidlist of {a} with the tidlist of all the other item, which forms the tidlist as {a, b},{a, c},{a, d}….={a} conditional database. STEP 4: Repeat the steps To form C3(combination of three items sets), L3,C4,L4.. till C becomes null set, i.e. with only three item set present in L3, C4 cannot be formed C4 is combination of four item sets. STEP 5: To form the Frequent item set (L). L is a super set of L1, L2, L3. For each item in the frequent item set generate non-empty subsets. STEP 6: To generate confidence Confidence (X->Y) = Number of records contain X Number of record contain both X and Y for each non empty subset confidence is generated if the confidence generated is less than the minimum confidence then remove those item set, else consider those to form the pattern (Strong Association Rule) Apriori STEP 1: Scan the data set and determine the support(s) of each item. C1 (candidate set) the table contains the support count of each item present in dataset. STEP 2: Generate L1 (Frequent one item set). Each candidate set item‘s support count is compared with minimum support count. If the support_count Of candidate set items is less than min_support then remove those items the rest forms L1 STEP 3: To generate C2. C2 is generated using L1 called the join step, the condition for joining lk-1 is joined with lk-1 to generate set of candidate K STEP 4: L2 is generated from C2 Compare C2 support count with minimum support count if less, then remove those item this gives the item set L2 STEP 5: To generate C3,L3,C4,L4.. Repeat the step until C becomes the null set, i.e., with only three item sets present in L3 ,C4 cannot be formed as C4 is combination of four items set. STEP 6: Generate Frequent item set(L). Is generated using all L1,L2,L3..for each item in the frequent item set in L generate non-empty subsets. STEP 7: Generate Confidence Confidence (X->Y) = Number of records contain X Number of record contain both X and Y For all non empty subset confidence is generated if the confidence generated is less than the minimum confidence then remove those item set, else consider those to form the pattern (Strong AssociationRule). IV. EXPERIMENTAL RESULTS AND SCREENSHOTS Fig-2: Shows the execution time taken by each algorithm.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 07 | JULY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3568 Predictive FP growth is the best suitable algorithm with least Execution time. The time taken by Predictive FP Growth algorithm is 181 milliseconds, Eclat takes 332 milliseconds, Apriori takes 633 milliseconds. The results prove predictive FP Growth is the best suitable algorithm for User Activity Matching. Fig- 3: Graphical representation of execution time. The figure shows the graph plotted for the execution time taken for each algorithm. The paper introduced the problem of colluding in Identity Clone Attack in OSNs. The solution applied has two levels of filtering, first an algorithm called Fuzzy-sim is used for the profile compassion. Second, algorithm called predictive FP Growth, Eclat, Apriori algorithms are used for pattern prediction of user activity. The Predictive FP Growth algorithm has few changes compared to the original FP growth Algorithm. Comparative analysis results prove, the best algorithm suitable algorithm for User Activity matching is the modified predictive FP Growth algorithm, next best is Eclat algorithm and then the Apriori Algorithm, the predictive FP Growth Algorithm takes the lest execution time among the three algorithm, then Eclat and Apriori with takes the maximum time for execution. Finally, the graph show the quality of the output of classifier. In future application could use some other algorithm which is more efficient than the algorithms used, and content classification can be applied on images and videos. VI. REFERENCES 1. Comparing the Performance of Frequent Pattern Mining Algorithms. Dr. Kanwal Garg Assistant Professor, Dept. of Computer Science and Applications, Kurukshetra University, Kurukshetra,Haryana,Deepak Kumar M.Tech Research Scholar, Dept.of Computer Science & Applications, Kurukshetra University, Kurukshetra, Haryana, India. 2. Detecting Social Network Profile Cloning. Markatos Institute of Computer Science Foundation for Research and Technology Hellas {kondax, polakis, sotiris, Markatos Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis and Evangelos P.. 3. Friend Recommendation Framework for Social. Networking Sites using User‘s Online BehaviorMd. Mehedi Hasan1, Noor Hussain Shaon 2, Ahmed Al Marouf 3, Md. Kamrul Hasan4, Hasan Mahmud5, and Md.Mohiuddin Khan6 Systems and Software Lab (SSL), Department of Computer Science and Engineering (CSE) Islamic University of Technology (IUT), Gazipur, Bangladesh{1shovon10, 2shaon007, 3samcit41, 4hasank, 5hasan, 6mohiuddin}@iut-dhaka.ed 4. Preventing Colluding Identity Clone Attacks in Online Social Networks. Georges A. Kamhoua1, Niki Pissinou1, S.S. Iyengar1, Jonathan Beltran1, Charles Kamhoua2, Brandon L Hernandez3, Laurent Njilla2, Alex Pissinou Makki4 1 School of Computing and Information Science, Florida International University, Miami, FL 33173 2 Air Force Research Lab, Cyber Assurance Branch 3 Computer Science, University of Texas at Rio Grande Valley, Brownsville, TX 78521 4Ransom Everglades School, Miami, FL 33133 {gkamh001, jbelt021, pissinou}@fiu.edu;{Charles.kamhoua.1,laurent.njilla}@u s.af.mil;iyengar@cis.fiu.edu; Brandon.l.hernandez01@utrgv.edu, 7amakki@randomeverglades.org 5. Profile Cloning Detection in Social Networks. Piotr Bródka, Mateusz SobasInstitute of Informatics Wrocaw University of Technology. V. CONCLUSIONS
Anúncio