Skip to main content
Log in

A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Online Social Networks (OSN) such as Facebook, Instagram, Twitter, and others have seen rapid growth in recent years. Such applications provide attractive online social networks and communications with the opportunity to connect with relatives and acquaintances, meet new people, enter communities, talk, exchange photos, organize events, and network with others who are close to real-life; unfortunately, on the other hand, they also raise privacy and security issues. We identified OSN threats in this paper and recommended a digital face-processing authentication method as a double-factor authentication after entering the password using Matlab. After applying deep learning classification by attending to a real dataset from the live webcam to train the model, we achieved the best accuracy rate of 95%. However, such methods have yet to be deployed to all social networks, so we also mentioned the problem of fake accounts, which is one of the most significant problems in OSN. These are effective tools for executing spam campaigns and spreading malware and phishing attacks. Fake accounts could lead to the loss of money for businesses, loss of reputation, stealing information for malicious purposes, and much more. This study is related to detecting fake and legitimate profiles on OSN. For this purpose, we chose two datasets that contain fake and legitimate accounts on Facebook and Instagram. Each contains different features after applying machine learning using Naive Bayes, Logistic Regression, Support Vector Machines, K-Nearest Neighbour, Boosted Tree, Neural Networks, SVM Kernal, and Logistec Regression Kernal. SVM achieved the highest classification accuracy for the Fake Profiles detection datasets with 97.1%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

Data Availability

Data is available from the authors upon reasonable request.

References

  1. Abualigah L, Alfar HE, Shehab M, Hussein AMA (2020) Sentiment analysis in healthcare: a brief review. Recent Adv NLP Case Arabic Lang:129–141

  2. Abualigah L, Diabat A (2022) Chaotic binary reptile search algorithm and its feature selection applications. J Ambient Intell Humanized Comput:1–17

  3. Abualigah L, Kareem NK, Omari M, Elaziz MA, Gandomi AH (2021) Survey on twitter sentiment analysis: architecture, classifications, and challenges. In: Deep learning approaches for spoken and natural language processing. Springer, pp 1–18

  4. Abushanap SA, Abdalla AM, Tamimi AA, Alzu’bi S (2021) A survey of human face recognition for partial face view. In: 2021 International conference on information technology (ICIT), IEEE, pp 571–576

  5. Abusukhon A, AlZu’bi S (2020) New direction of cryptography: a review on text-to-image encryption algorithms based on rgb color value. In: 2020 Seventh international conference on software defined systems (SDS), IEEE, pp 235–239

  6. Al Hasib A (2009) Threats of online social networks. IJCSNS Int J Comput Sci Netw Security 9(11):288–93

    Google Scholar 

  7. Al-Arjan A, Rasmi M, AlZu’bi S, et al. (2021) Intelligent security in the era of ai: the key vulnerability of rc4 algorithm. In: 2021 International conference on information technology (ICIT), IEEE, pp 691–694

  8. Al-Zu’bi S, Hawashin B, Mughaid A, Baker T (2021) Efficient 3d medical image segmentation algorithm over a secured multimedia network. Multimed Tools Appl 80(11):16887–16905

    Article  Google Scholar 

  9. AlZu’bi S, Abu Zitar R, Hawashin B, Abu Shanab S, Zraiqat A, Mughaid A, Almotairi KH, Abualigah L (2022) A novel deep learning technique for detecting emotional impact in online education. Electronics 11(18):2964

    Article  Google Scholar 

  10. AlZu’bi S, Alsmadiv A, AlQatawneh S, Al-Ayyoub M, Hawashin B, Jararweh Y (2019) A brief analysis of amazon online reviews. In: 2019 Sixth international conference on social networks analysis, management and security (SNAMS). IEEE, pp 555–560

  11. AlZu’bi S, Alsmirat M, Al-Ayyoub M, Jararweh Y (2019) Artificial intelligence enabling water desalination sustainability optimization. In: 2019 7th International renewable and sustainable energy conference (IRSEC), IEEE, pp 1–4

  12. AlZu’bi S, Aqel D, Lafi M (2022) An intelligent system for blood donation process optimization-smart techniques for minimizing blood wastages. Clust Comput:1–11

  13. AlZu’bi S, Aqel D, Mughaid A, Jararweh Y (2019) A multi-levels geo-location based crawling method for social media platforms. In: 2019 Sixth international conference on social networks analysis, management and security (SNAMS), IEEE, pp 494–498

  14. AlZu’bi S, Hawashin B, EIBes M, Al-Ayyoub M (2018) A novel recommender system based on apriori algorithm for requirements engineering. In: 2018 Fifth international conference on social networks analysis, management and security (snams). IEEE, pp 323–327

  15. AlZu’bi S, Hawashin B, Mujahed M, Jararweh Y, Gupta BB (2019) An efficient employment of internet of multimedia things in smart and future agriculture. Multimed Tools Appl 78(20):29581–29605

    Article  Google Scholar 

  16. AlZu’bi S, Shehab M, Al-Ayyoub M, Jararweh Y, Gupta B (2020) Parallel implementation for 3d medical volume fuzzy segmentation. Pattern Recogn Lett 130:312–318

    Article  Google Scholar 

  17. Ala’M A-Z, Alqatawna J, Paris H (2017) Spam profile detection in social networks based on public features. In: 2017 8th International conference on information and communication systems (ICICS). IEEE, pp 130–135

  18. Albayati M, Altamimi A (2019) Mdfp: a machine learning model for detecting fake facebook profiles using supervised and unsupervised mining techniques. Int J Simulation Syst Sci Technol 20(1):1–10

    Google Scholar 

  19. Albayati MB, Altamimi AM (2019) Identifying fake facebook profiles using data mining techniques. J ICT Res Appl, vol 13(2)

  20. Alghamdi B, Watson J, Xu Y (2016) Toward detecting malicious links in online social networks through user behavior. In: 2016 IEEE/WIC/ACM international conference on web intelligence workshops (WIW). IEEE, pp 5–8

  21. Ali A, Zhu Y, Chen Q, Yu J, Cai H (2019) Leveraging spatio-temporal patterns for predicting citywide traffic crowd flows using deep hybrid neural networks. In: 2019 IEEE 25th international conference on parallel and distributed systems (ICPADS), IEEE, pp 125–132

  22. Ali A, Zhu Y, Zakarya M (2021) Exploiting dynamic spatio-temporal correlations for citywide traffic flow prediction using attention based neural networks. Inf Sci 577:852–870

    Article  MathSciNet  Google Scholar 

  23. Ali A, Zhu Y, Zakarya M (2021) A data aggregation based approach to exploit dynamic spatio-temporal correlations for citywide crowd flows prediction in fog computing. Multimed Tools Appl 80(20):31401–31433

    Article  Google Scholar 

  24. Ali A, Zhu Y, Zakarya M (2022) Exploiting dynamic spatio-temporal graph convolutional neural networks for citywide traffic flows prediction. Neural networks 145:233–247

    Article  Google Scholar 

  25. Alia MA, Hnaif AA, Al-Anie HK, Maria KA, Manasrah AM, Sarwar MI (2011) A novel header matching algorithm for intrusion detection systems, arXiv:1108.1417

  26. Alia MA, Maria KA, Alsarayreh MA, Maria EA, Almanasra S (2019) An improved video steganography: using random key-dependent. In: 2019 IEEE Jordan international joint conference on electrical engineering and information technology (JEEIT), IEEE, pp 234–237

  27. Alkhatib AA, Abu Maria K, Alzu’bi S, Abu Maria E (2022) Novel system for road traffic optimisation in large cities. IET Smart Cities

  28. Alkhatib AA, Alsabbagh A, Maraqa R, Alzubi S (2021) Load balancing techniques in cloud computing: extensive review. Adv Sci Technol Eng Syst J 6(2):860–870

    Article  Google Scholar 

  29. Alzu’bi S, Jararweh Y (2020) Data fusion in autonomous vehicles research, literature tracing from imaginary idea to smart surrounding community. In: 2020 Fifth international conference on fog and mobile edge computing (FMEC), IEEE, pp 306–311

  30. Alzubi S, Hawashin B, Mughaid A, Jararweh Y (2020) Whats trending? an efficient trending research topics extractor and recommender. In: 2020 11th International conference on information and communication systems (ICICS), IEEE, pp 191–196

  31. Aqel D, Al-Zubi S, Mughaid A, Jararweh Y (2022) Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. Clust Comput 25(3):2007–2020

    Article  Google Scholar 

  32. Avidan S, Butman M (2006) Blind vision. In: European conference on computer vision. Springer, pp 1–13

  33. Aydin I, Mehmet S, Salur MU (2018) Detection of fake twitter accounts with machine learning algorithms. In: 2018 International conference on artificial intelligence and data processing (IDAP), IEEE, pp 1–4

  34. Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web, pp 551–560

  35. Elbes M, Kanan T, Alia M, Ziad M (2022) Covd-19 detection platform from x-ray images using deep learning. Int J Adv Soft Comput Appl, vol 14(1)

  36. Fire M, Goldschmidt R, Elovici Y (2014) Online social networks: threats and solutions. IEEE Commun Surveys Tutorials 16(4):2019–2036

    Article  Google Scholar 

  37. Fire M, Katz G, Elovici Y (2012) Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies. Human J 1(1):26–39

    Google Scholar 

  38. Gross R, Sweeney L (2007) Towards real-world face de-identification. In: 2007 First IEEE international conference on biometrics: theory, applications, and systems. IEEE, pp 1–8

  39. Humphreys L (2007) Mobile social networks and social practice: a case study of dodgeball. J Comput-Mediated Commun 13(1):341–360

    Article  Google Scholar 

  40. Hussein F, Mughaid A, AlZu’bi S, El-Salhi SM, Abuhaija B, Abualigah L, Gandomi AH (2022) Hybrid clahe-cnn deep neural networks for classifying lung diseases from x-ray acquisitions. Electronics 11(19):3075

    Article  Google Scholar 

  41. Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S (2015) Face/off: preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 781–792

  42. Jia J, Wang B, Gong NZ (2017) Random walk based fake account detection in online social networks. In: 2017 47th Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 273–284

  43. Aydin I, Mehmet SEVİ, Salur MU (2022) Detection of fake twitter accounts with machine learning algorithms. In: 2018 International Conference on Artificial Intelligence and Data Processing (IDAP) (pp. 1–4). IEEE

  44. Liu Y, Gummadi KP, Krishnamurthy B, Mislove A (2011) Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, pp 61–70

  45. Mislove A, Viswanath B, Gummadi KP, Druschel P (2010) You are who you know: inferring user profiles in online social networks. In: Proceedings of the third ACM international conference on Web search and data mining, pp 251–260

  46. Mughaid A, Al-Zu’bi S, Al Arjan A, Al-Amrat R, Alajmi R, Zitar RA, Abualigah L (2022) An intelligent cybersecurity system for detecting fake news in social media websites. Soft Comput 26(12):5577–5591

    Article  Google Scholar 

  47. Mughaid A, AlZu’bi S, Alnajjar A, AbuElsoud E, Salhi SE, Igried B, Abualigah L (2022) Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches. Multimed Tools Appl:1–23

  48. Muhairat M, ALZu’bi S, Hawashin B, Elbes M, Al-Ayyoub M (2020) An intelligent recommender system based on association rule analysis for requirement engineering. J Univ Comput Sci 26(1):33–49

    Google Scholar 

  49. Newton EM, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 17(2):232–243

    Article  Google Scholar 

  50. O’Leary J (2013) Getting started with login verification. Twitter Blogs

  51. Obeidat I, Mughaid A, Alzoubi S (2016) A secure encrypted protocol for clients’ handshaking in the same network. Int J Interactive Mobile Technol (iJIM)

  52. Otair M, Ibrahim OT, Abualigah L, Altalhi M, Sumari P (2022) An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks. Wirel Netw 28(2):721–744

    Article  Google Scholar 

  53. Pallis G, Zeinalipour-Yazti D, Dikaiakos MD (2011) Online social networks: status and trends. New Direct Web Data Manag 1:213–234

    Article  Google Scholar 

  54. Ramadan R, Alqatawneh S, Ahalaiqa F, Abdel-Qader I, Aldahoud A, AlZoubi S (2019) The utilization of whatsapp to determine the obsessive-compulsive disorder (ocd): a preliminary study. In: 2019 Sixth international conference on social networks analysis, management and security (SNAMS), IEEE, pp 561–564

  55. Raturi R (2018) Machine learning implementation for identifying fake accounts in social network. Int J Pure Appl Math 118(20):4785–4797

    Google Scholar 

  56. Reddy V, Kolli N, Balakrishnan N (2021) Malware detection and classification using community detection and social network analysis. J Comput Virology Hacking Tech:1–14

  57. Safaldin M, Otair M, Abualigah L (2021) Improved binary gray wolf optimizer and svm for intrusion detection system in wireless sensor networks. J Ambient Intelligence Humanized Comput 12(2):1559–1576

    Article  Google Scholar 

  58. Sahoo SR, Gupta BB (2019) Classification of various attacks and their defence mechanism in online social networks: a survey. Enterprise Inf Syst 13 (6):832–864

    Article  Google Scholar 

  59. Siddiqui S, Khan MS, Ferens K, Kinsner W (2016) Detecting advanced persistent threats using fractal dimension based machine learning classification. In: Proceedings of the 2016 ACM on international workshop on security and privacy analytics, pp 64–69

  60. Song A (2011) Introducing login approvals. Tersedia: https://www.facebook.com/notes/facebook-engineering/introducinglogin-approvals/10150172618258920https://www.facebook.com/notes/facebook-engineering/introducinglogin-approvals/10150172618258920. Accessed 1 Jan 2021

  61. Stein T, Chen E, Mangla K (2011) Facebook immune system. In: Proceedings of the 4th workshop on social network systems, pp 1–8

  62. Sushama C, Kumar MS, Neelima P (2021) Privacy and security issues in the future: a social media. Materials today: proceedings

  63. Williams EJ, Hinds J, Joinson AN (2018) Exploring susceptibility to phishing in the workplace. Int J Human-Comput Studies 120:1–13

    Article  Google Scholar 

  64. Zhang Z, Gupta BB (2018) Social media security and trustworthiness: overview and new direction. Futur Gener Comput Syst 86:914–925

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laith Abualigah.

Ethics declarations

Ethics approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of Interests

The authors declare that there is no conflict of interest regarding the publication of this paper.

Additional information

Informed consent

Informed consent was obtained from all individual participants included in the study.

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mughaid, A., Obeidat, I., AlZu’bi, S. et al. A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks. Multimed Tools Appl 82, 26353–26378 (2023). https://doi.org/10.1007/s11042-023-14347-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14347-8

Keywords

Navigation