Skip to main content

Trust-Based Security Mechanism for Detecting Clusters of Fake Users in Social Networks

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 927))

Abstract

Inspired by the ability of the trust mechanism which can capture human trust using measurement theory we have designed trust-based security mechanism to find clusters of fake users in social networks. Proposed framework enables us to take human and community knowledge into a loop by using a variation of trust to detect fake users. This framework will increase the accuracy of detecting fake users by using both human and machine knowledge. Experiments are performed on randomly generated social networks to validate the potential of this framework. Results show that the variation of trust over time can able to differentiate between clusters of fake users from clusters of real users.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhang, P., Durresi, A.: Trust management framework for social networks. In: 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, pp. 1042–1047 (2012)

    Google Scholar 

  2. Zhang, P., Durresi, A., Barolli, L.: Survey of trust management on various networks. In: 2011 International Conference on Complex, Intelligent, and Software Intensive Systems, Seoul, pp. 219–226 (2011)

    Google Scholar 

  3. Ruan, Y., Durresi, A., Uslu, S.: Trust assessment for internet of things in multi-access edge computing. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, pp. 1155–1161 (2018)

    Google Scholar 

  4. Ruan, Y., Durresi, A., Alfantoukh, L.: Using Twitter trust network for stock market analysis. Knowl.-Based Syst. 145, 207–218 (2018)

    Article  Google Scholar 

  5. Ruan, Y., Zhang, P., Alfantoukh, L., Durresi, A.: Measurement theory-based trust management framework for online social communities. ACM Trans. Internet Technol. 17(2), 24 (2017). Article 16

    Article  Google Scholar 

  6. Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities – trust modeling, trust inference and attacks. Knowl.-Based Syst. 106, 150–163 (2016)

    Article  Google Scholar 

  7. Ruan, Y., Durresi, A., Alfantoukh, L.: Trust management framework for internet of things. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, pp. 1013–1019 (2016)

    Google Scholar 

  8. Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI 2012), p. 15. USENIX Association, Berkeley (2012)

    Google Scholar 

  9. McAuley, J., Leskovec, J.: Learning to discover social circles in ego networks. In: Pereira, F., Burges, C.J.C., Bottou, L., Weinberger, K.Q. (eds.) Proceedings of the 25th International Conference on Neural Information Processing Systems - Volume 1, (NIPS 2012), vol. 1, pp. 539–547. Curran Associates Inc. (2012)

    Google Scholar 

  10. Fire, M., Katz, G., Elovici, Y.: Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies. Hum. J. 1(1), 26–39 (2012)

    Google Scholar 

  11. Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96–104 (2016)

    Article  Google Scholar 

  12. Xiao, C., Freeman, D.M., Hwa, T.: Detecting clusters of fake accounts in online social networks. In: Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. ACM (2015)

    Google Scholar 

  13. Zhang, Z., Kulkarni, S.R.: Detection of shilling attacks in recommender systems via spectral clustering. In: 2014 17th International Conference on Information Fusion (FUSION). IEEE (2014)

    Google Scholar 

  14. Kagan, D., Elovichi, Y., Fire, M.: Generic anomalous vertices detection utilizing a link prediction algorithm. Soc. Netw. Anal. Min. 8(1), 27 (2018)

    Article  Google Scholar 

  15. Hamlili, A.: Intelligibility of Erdös-Rényi random graphs and time varying social network modeling. In: ICSDE (2017)

    Google Scholar 

Download references

Acknowledgments

This work was partially supported by the National Science Foundation under Grant No. 1547411 and by the U.S. Department of Agriculture (USDA) National Institute of Food and Agriculture (NIFA) (Award Number 2017-67003-26057) via an interagency partnership between USDA-NIFA and the National Science Foundation (NSF) on the research program Innovations at the Nexus of Food, Energy and Water Systems.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arjan Durresi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaur, D., Uslu, S., Durresi, A. (2019). Trust-Based Security Mechanism for Detecting Clusters of Fake Users in Social Networks. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol 927. Springer, Cham. https://doi.org/10.1007/978-3-030-15035-8_62

Download citation

Publish with us

Policies and ethics