Skip to main content

On Complementary Effect of Blended Behavioral Analysis for Identity Theft Detection in Mobile Social Networks

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 747))

Abstract

User behavioral analysis is expected to act as a promising technique for identity theft detection in the Internet. The performance of this paradigm extremely depends on a good individual-level user behavioral model. Such a good model for a specific behavior is often hard to obtain due to the insufficiency of data for this behavior. The insufficiency of specific data is mainly led by the prevalent sparsity of users’ collectable behavioral footprints. This work aims to address whether it is feasible to effectively detect identify thefts by jointly using multiple unreliable behavioral models from sparse individual-level records. We focus on this issue in mobile social networks (MSNs) with multiple dimensions of collectable but sparse data of user behavior, i.e., making check-ins, posing tips and forming friendships. Based on these sparse data, we build user spatial distribution model, user post interest model and user social preference model, respectively. Here, as the arguments, we validate that there is indeed a complementary effect in multi-dimensional blended behavioral analysis for identity theft detection in MSNs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    One of the largest statistics portals, http://www.statista.com/.

  2. 2.

    The largest privately held cybersecurity organization based in the USA, operating globally across North America, EMEA and APAC, https://www.webroot.com/.

References

  1. De Montjoye, Y.A., Radaelli, L., Singh, V.K., et al.: Unique in the shopping mall: On the reidentifiability of credit card metadata. Science 347(6221), 536–539 (2015)

    Google Scholar 

  2. Bao, J., Zheng, Y., Mokbel, M.F.: Location-based and preference-aware recommendation using sparse geo-social networking data. In: International Conference on Advances in Geographic Information Systems, pp. 199–208 (2012)

    Google Scholar 

  3. Lichman, M., Smyth, P.: Modeling human location data with mixtures of kernel densities. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 35–44 (2014)

    Google Scholar 

  4. Zhang, J., Chow, C.: CRATS: an lda-based model for jointly mining latent communities, regions, activities, topics, and sentiments from geosocial network data. IEEE Trans. Knowl. Data Eng. 28(11), 2895–2909 (2016)

    Article  Google Scholar 

  5. Zhou, X., Liang, X., Zhang, H., Ma, Y.: Cross-platform identification of anonymous identical users in multiple social media networks. IEEE Trans. Knowl. Data Eng. 28(2), 411–424 (2016)

    Article  Google Scholar 

  6. Daz-Santiago, S., Rodrguez-Henrquez, L.M., Chakraborty, D.: A cryptographic study of tokenization systems. Int. J. Inf. Secur. 15(4), 413–432 (2016)

    Article  Google Scholar 

  7. Naini, F.M., Unnikrishnan, J., Thiran, P., Vetterli, M.: Where you are is who you are: User identification by matching statistics. IEEE Trans. Inf. Forensics Secur. 11(2), 358–372 (2016)

    Article  Google Scholar 

  8. Wang, C., Zhou, J., Yang, B.: From footprint to friendship: modeling user followership in mobile social networks from check-in data. In: SIGIR 2017, pp. 825–828 (2017)

    Google Scholar 

  9. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke based authentication system for smartphones. Secur. Commun. Networks 9(6), 542–554 (2016)

    Article  Google Scholar 

  10. Zuo, Y., Wu, J., Zhang, H., Lin, H., Wang, F., Xu, K., Xiong, H.: Topic modeling of short texts: a pseudo-document view. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August, pp. 2105–2114 (2016)

    Google Scholar 

  11. He, Y., Wang, C., Jiang, C.: Mining coherent topics with pre-learned interest knowledge in Twitter. IEEE Access 5, 10515–10525 (2017)

    Article  Google Scholar 

Download references

Acknowledgments

The research of authors is partially supported by the National Natural Science Foundation of China (NSFC) under Grants 61571331, Shuguang Program from Shanghai Education Development Foundation under Grant 14SG20, Fok Ying-Tong Education Foundation for Young Teachers in the Higher Education Institutions of China under Grant 151066, and the Shanghai Science and Technology Innovation Action Plan Project under Grant 16511100901.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, C., Luo, J., Yang, B., Jiang, C. (2018). On Complementary Effect of Blended Behavioral Analysis for Identity Theft Detection in Mobile Social Networks. In: Zhu, L., Zhong, S. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2017. Communications in Computer and Information Science, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-10-8890-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8890-2_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8889-6

  • Online ISBN: 978-981-10-8890-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics