Skip to main content

Identifying Users from Online Interactions in Twitter

  • Chapter
  • First Online:
Book cover Transactions on Computational Science XXVI

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 9550))

Abstract

In recent years, the mass growth of online social networks has introduced a completely new platform of analyzing human behavior. Human interactions via online social networks leave big trails of behavioral footprints, which have been investigated by many researchers for the purpose of targeted advertising and business. However, analysis of such online interactions is rarely seen for user identification. The main objective of this paper is to analyze individuals’ online interactions as biometric information. In this paper, we investigated how online interactions retain behavioral characteristics of users and how consistent they are over time. For this purpose, we proposed a novel method of identifying users from online interactions in Twitter. Identification performance has been evaluated on a database of 50 Twitter users over five different time periods. We obtained very promising results from experimentation, which demonstrate the potential of online interactions in aiding the authentication process of social network users’.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moskovitch, R., Feher, C., Messerman, A., Kirschnick, N., Mustafic, T., Camtepe, A., Lohlein, B., Heister, U., Möller, S., Rokach, L., Elovici, Y.: Identity theft, computers and behavioral biometrics. In: Proceedings of IEEE International Conference on in Intelligence and Security Informatics (ISI 2009), pp. 155–160. IEEE (2009)

    Google Scholar 

  2. Gavrilova, M.L., Monwar, M.: Multimodal biometrics and intelligent image processing for security systems. IGI Global (2013)

    Google Scholar 

  3. Yampolskiy, R.V., Govindaraju, V.: Behavioral biometrics: a survey and classification. Int. J. Biometrics 1(1), 81–113 (2008)

    Article  Google Scholar 

  4. Yampolskiy, R.V., Gavrilova, M.L.: Artimetrics: biometrics for artificial entities. IEEE Robot. Autom. Mag. 19(4), 48–58 (2012)

    Article  Google Scholar 

  5. Monwar, M., Gavrilova, M.L.: Multimodal biometric system using rank-level fusion approach. IEEE Trans. Syst. Man Cybern. B Cybern. 39(4), 867–878 (2009)

    Article  Google Scholar 

  6. Zhang, H., Li, M.: Security vulnerabilities of a remote password authentication scheme with smart card. In: Consumer Electronics, Communications, and Networks, pp. 698–701 (2011)

    Google Scholar 

  7. Paul, P.P., Gavrilova, M., Klimenko, S.: Situation awareness of cancelable biometric system. Vis. Comput. 30, 1–9 (2013)

    Google Scholar 

  8. Sultana, M., Paul, P.P., Gavrilova, M.: A concept of social behavioral biometrics: motivation, current developments, and future trends. In: CW Biometric Workshop (2013)

    Google Scholar 

  9. Sultana, M., Paul, P.P., Gavrilova, M.: On-line user interaction traits in web-based social biometrics. IGI Chapter, pp. 177–190 (2014)

    Google Scholar 

  10. Bringmann, B., Berlingerio, M., Bonchi, F., Gionis, A.: Learning and predicting the evolution of social networks. Intell. Syst. 25(4), 26–35 (2010)

    Article  Google Scholar 

  11. http://www.statisticbrain.com/twitter-statistics/. Accessed 25 March 2015

  12. Grant, T., Laboreiro, G., Maia, B., Oliveira, E., Sousa Silva, R., Sarmento, L.: ‘twazn me!!!;(’ automatic authorship analysis of micro-blogging messages. In: Muñoz, R., Montoyo, A., Métais, E. (eds.) NLDB 2011. LNCS, vol. 6716, pp. 161–168. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  13. https://support.twitter.com/articles/166337-the-twitter-glossary. Accessed 25 March 2015

  14. Carter, S., Tsagkias, M., Weerkamp, W.: Twitter hashtags: Joint Translation and Clustering, pp. 1–3 (2011)

    Google Scholar 

  15. Sourin, A.: Computer Graphics: From a Small Formula to Cyberworlds. Prentice-Hall Inc., Singapore (2006)

    Google Scholar 

  16. Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for authentication. In: Proceedings of 6th ACM Symposium on Information, Computer and Communications Security, pp. 476–482 (2011)

    Google Scholar 

  17. Bours, P.: Continuous keystroke dynamics: A different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 17(1), 36–43 (2012)

    Article  Google Scholar 

  18. Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2013)

    Article  Google Scholar 

  19. Guo, Y., Yang, L., Ding, X., Han, J., Liu, Y.: OpenSesame: unlocking smart phone through handshaking biometrics. In: Proceedings of IEEE INFOCOM, pp. 365–369. IEEE, April 2013

    Google Scholar 

  20. Feng, T., Zhao, X., Shi, W.: Investigating mobile device picking-up motion as a novel biometric modality. In: Proceedings of IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6 (2013)

    Google Scholar 

  21. Jiang, W., Xiang, J., Liu, L., Zha, D., Wang, L.: From mini house game to hobby-driven behavioral biometrics-based password. In: Proceedings of 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 712–719. IEEE, July 2013

    Google Scholar 

  22. Olejnik, L., Castelluccia, C.: Towards web-based biometric systems using personal browsing interests. In: Proceedings of Eighth International Conference on Availability, Reliability and Security (ARES), pp. 274–280. IEEE, September 2013

    Google Scholar 

  23. Fridman, A., Stolerman, A., Acharya, S., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: Decision fusion for multi-modal active authentication. IT Prof. 15(4), 29–33 (2013)

    Article  Google Scholar 

  24. Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43, 77–89 (2014)

    Article  Google Scholar 

  25. Cohen, W., Ravikumar, P., Fienberg, S.: A comparison of string metrics for matching names and records. In: Proceedings of KDD Workshop on Data Cleaning and Object Consolidation, vol. 3, pp. 73–78, August 2003

    Google Scholar 

  26. Ross, A., Jain, A.: Information fusion in biometrics. Pattern Recogn. Lett. 24(13), 2115–2125 (2003)

    Article  Google Scholar 

Download references

Acknowledgement

The authors would like to thank NSERC DISCOVERY program grant RT731064, URGC, NSERC ENGAGE, NSERC Vanier CGS, and Alberta Ingenuity for partial support of this project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madeena Sultana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Sultana, M., Paul, P.P., Gavrilova, M. (2016). Identifying Users from Online Interactions in Twitter. In: Gavrilova, M., Tan, C., Iglesias, A., Shinya, M., Galvez, A., Sourin, A. (eds) Transactions on Computational Science XXVI. Lecture Notes in Computer Science(), vol 9550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49247-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49247-5_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49246-8

  • Online ISBN: 978-3-662-49247-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics