Skip to main content
Log in

SybilSort algorithm - a friend request decision tracking recommender system in online social networks

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Sybils are detected and prevented from making friends on Online Social Networks (OSN) by the proposed SybilSort algorithm. SybilSort operates in the following manner: Task 1 (OSN registration): In order to register with OSN, a person must upload a Government Identity (GI). Task 2 (sort model): OSN is randomly clustered into equal-sized clusters. When one person receives a friend request from another, the decision to accept or reject is based on the dynamic thresholds determined by the cluster members and Cluster Monitor (CM). The person can then decide whether to accept or reject the request. If the variation is detected, the CM tracks the decision taken despite the recommendation, and the second suggestion is presented as an alert, along with proof of convergence, Sybil similarity, and priority assignment scores. Task 3 (cluster shuffle): The cluster is examined, and if there are any Sybil activities, the cluster is shuffled. To establish cluster shuffle, the cumulative difference is calculated using Belief Level Deviation (BLD), the Jaccard coefficient, and the Hamming distance. The research goal is to avoid the creation of the Sybil profile, to remove vote collisions, to track decisions after recommendation, and to avoid Sybil density. The proposed SybilSort is compared to existing Sybil detection algorithms using performance evaluations for varying numbers of persons and average network sizes. Using the 2019 Facebook dataset, the precision, recall, F1-score, and Region Of Curve (ROC) metrics are examined. The final results reveal that the proposed SybilSort algorithm significantly outperforms the already validated Sybil detection algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Poornima N, Murugan M (2020) Natural disaster resilience approach (NDRA) to online social networks. J Ambient Intell Humaniz Comput 12:5651–5678. https://doi.org/10.1007/s12652-020-02644-1

    Article  Google Scholar 

  2. Zhou Q, Chen G (2020) An efficient victim prediction for Sybil detection in online social network. IEEE Access 8:123228–123237. https://doi.org/10.1109/ACCESS.2020.3007458

    Article  Google Scholar 

  3. Valliyammai C, Devakunchari R (2019) Distributed and scalable Sybil identification based on nearest neighbour approximation using big data analysis techniques. Clust Comput 22:14461–14476. https://doi.org/10.1007/s10586-018-2314-9

    Article  Google Scholar 

  4. Yang Z, Xue J, Yang X, Wang X, Dai Y (2016) VoteTrust: Leveraging Friend Invitation Graph to Defend Against Social Network Sybils. IEEE Transactions on Dependable and Secure Computing 13(4):488–501

    Article  Google Scholar 

  5. Da'u A, Salim N, Rabiu I, Osman A (2020) Weighted aspect-based opinion mining using deep learning for recommender system. Expert Syst Appl 140:112871. https://doi.org/10.1016/j.eswa.2019.112871

    Article  Google Scholar 

  6. Seo Y, Kim Y, Lee E, Baik D (2017) Personalized recommender system based on friendship strength in social network services. Expert Syst Appl 69:135–148. https://doi.org/10.1016/j.eswa.2016.10.024

    Article  Google Scholar 

  7. Halgin DS, Borgatti SP, Huang Z (2019) Prismatic effects of negative ties. Soc Networks 60:26–33 Elesvier

    Article  Google Scholar 

  8. Liang H, Chen Z, Wu J (2018) Dynamic reputation information propagation based malicious account detection in OSNs. Wirel Netw. Springer. https://doi.org/10.1007/s11276-018-1795-z

  9. Al-Qurishi M, Alrubaian M, Rahman SMM, Alamri A, Hassan MM (2018) A prediction system of Sybil attack in social network using deep-regression model. Futur Gener Comput Syst 87:743–753

    Article  Google Scholar 

  10. Gao P, Wang B, Gong N Z,Kulkarni S,Thomas K,Mittal P (2018). SybilFuse: combining local attributes with global structure to perform robust Sybil detection. IEEE Conference on Communications and Network Security

  11. Wang B, Jia J, Zhang L, Gong N Z (2018). Structure-based Sybil detection in social networks via local rule-based propagation. IEEE Transactions on Network Science and Engineering

  12. Ramalingam D, Chinnaiah V (2018) Fake profile detection techniques in large-scale online social networks: a comprehensive review. Comput Electr Eng 65:165–177 Elsevier

    Article  Google Scholar 

  13. Vasudeva A, Sood M (2018) Survey on Sybil attack defense mechanisms in wireless ad-hoc networks. J Netw Comput Appl 120:78–118

    Article  Google Scholar 

  14. Lin J, Fournier-Viger P, Wu L, Gan W, Djenouri Y and Zhang J (2018). PPSF: An Open-Source Privacy-Preserving and Security Mining Framework. IEEE International Conference on Data Mining Workshops (ICDMW). Available: https://doi.org/10.1109/icdmw.2018.00208

  15. Wang B, Zhang L, Gong N Z (2017). SybilSCAR: Sybil detection in online social networks via local rule based propagation. IEEE INFOCOM 2017 - IEEE Conference on Computer Communications. DOI: https://doi.org/10.1109/INFOCOM.2017.8057066

  16. Devineni P, Koutra D, Faloutsos M, Faloutsos C (2017) Facebook wall posts: A Model of User Behaviors. Soc Netw Anal Min 7(1):6. https://doi.org/10.1007/s13278-017-0422-9

    Article  Google Scholar 

  17. Jia J, Wang B, and Gong N Z (2017) Random walk based fake account detection in online social networks. 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). DOI: https://doi.org/10.1109/dsn.2017.55

  18. Ruan Y, Zhang P, Alfantoukh L, Durresi A (2017) Measurement theory-based trust management framework for online social communities. ACM Trans Internet Technol 17(2):24

    Article  Google Scholar 

  19. Fu H, Xie X, Rui Y, Gong NZ, Sun G, Chen E (2017) Robust spammer detection in microblogs: leveraging user carefulness. ACM Transactions on Intellgent Systems and Technology(TIST) 8(6):1–31

    Article  Google Scholar 

  20. Wu CF, Fujita H, Herrera-Viedma E (2017) A visual interaction consensus model for social network group decision making with trust propagation. Knowl-Based Syst 122:39–50. https://doi.org/10.1016/j.knosys.2017.01.031

    Article  Google Scholar 

  21. Cheng S, Zhang B, Zou G, Huang M, Zhang Z (2019) Friend Recommendation in Social Networks Based on Multi-Source Information Fusion. Int J Mach Learn Cybern 10:1003–1024. https://doi.org/10.1007/s13042-017-0778-1

    Article  Google Scholar 

  22. Cai C, Xu H (2019) A topic sentiment based method for friend recommendation in online social networks via matrix factorization. J Vis Commun Image Represent 65:102657. https://doi.org/10.1016/j.jvcir.2019.102657

    Article  Google Scholar 

  23. Aivazoglou M, Roussos AO, Margaris D, Vassilakis C, Ioannidis S, Polakis J, Spiliotopoulos D (2019) A fine-grained social network recommender system. Soc Netw Anal Min 10(1). https://doi.org/10.1007/s13278-019-0621-7

  24. Ning H, Dhelim S, Aung N (2019) PersoNet: Friend Recommendation System Based on Big - Five Personality Traits and Hybrid Filtering. IEEE Transactions on Computational Social Systems 6(3):394–402. https://doi.org/10.1109/TCSS.2019.2903857

    Article  Google Scholar 

  25. Xu Y, Zhou D, Ma J (2019) Scholar-Friend Recommendation in Online Academic Communities: An Approach Based on Heterogeneous Network. Decis Support Syst 119:1–13. https://doi.org/10.1016/j.dss.2019.01.004

    Article  Google Scholar 

  26. Mezhuyev V, Sadat S, Rahman M, Refat N, Asyhari A (2019) Evaluation of the likelihood of friend request acceptance in online social networks. IEEE Access 7:75318–75329. https://doi.org/10.1109/access.2019.2921219

    Article  Google Scholar 

  27. Lasmar E, de Paula F, Rosa R, Abrahao J, Rodriguez D (2019) RsRS: Ridesharing Recommendation System Based on Social Networks to Improve the User’s QoE. IEEE Trans Intell Transp Syst 20(12):4728–4740. https://doi.org/10.1109/tits.2019.2945793

    Article  Google Scholar 

  28. de Lira V, Macdonald C, Ounis I, Perego R, Renso C, Times V (2019) Event Attendance Classification in Social Media. Inf Process Manag 56(3):687–703. https://doi.org/10.1016/j.ipm.2018.11.001

    Article  Google Scholar 

  29. Pasricha H, Solanki S (2019) A new approach for book recommendation using opinion leader mining. In: Emerging research in electronics, computer science and technology. Springer, Singapore, pp 501–515. https://doi.org/10.1007/s13278-019-0621-7

    Chapter  Google Scholar 

  30. Sangeetha J, Prakash V (2019) Improved feature-specific collaborative filtering model for the aspect-opinion based product recommendation. In: Advances in big data and cloud computing. Springer, Singapore, pp 275–289. https://doi.org/10.1007/s13278-019-0621-7

    Chapter  Google Scholar 

  31. Wang X, Xu Z, Gou X (2019) Nested probabilistic-numerical linguistic term sets in two-stage multi-attribute group decision making. Appl Intell 49:2582–2602. https://doi.org/10.1007/s10489-018-1392-y

    Article  Google Scholar 

  32. Dong Y, Zha Q, Zhang H, Kou G, Fujita H, Chiclana F, Herrera-Viedma E (2018) Consensus reaching in social network group decision making: research paradigms and challenges. Knowl-Based Syst 162:3–13. https://doi.org/10.1016/j.knosys.2018.06.036

    Article  Google Scholar 

  33. Zheng X, Luo Y, Sun L, Zhang J, Chen F (2018) A Tourism Destination Recommender System Using Users’ Sentiment and Temporal Dynamics. J Intell Inf Syst 51(3):557–578. https://doi.org/10.1007/s10844-018-0496-5

    Article  Google Scholar 

  34. Tran V, Hwang D, Nguyen N (2018) Hashtag Recommendation Approach Based on Content and User Characteristics. Cybern Syst 49(5–6):368–383. https://doi.org/10.1080/01969722.2017.1418724

    Article  Google Scholar 

  35. Pedrycz W, Chen SM (2016) Sentiment analysis and ontology engineering. An environment of computational intelligence. SCI, vol 639. Springer

  36. Wang H, Yu L, Tian S, Peng Y, Pei X (2019) Bidirectional LSTM malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network. Appl Intell 49(8):3016–3026

    Article  Google Scholar 

  37. Khan I, Pi D, Khan N, Khan Z, Hussain Y, Nawaz A, Ali F (2021) A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious Behaviours in cyber-physical power networks. Appl Intell. https://doi.org/10.1007/s10489-021-02222-8

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Poornima Nedunchezhian.

Ethics declarations

No funding was received to assist with the preparation of this manuscript.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nedunchezhian, P., Mahalingam, M. SybilSort algorithm - a friend request decision tracking recommender system in online social networks. Appl Intell 52, 3995–4014 (2022). https://doi.org/10.1007/s10489-021-02578-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-021-02578-x

Keywords

Navigation