An Automated Model to Detect Fake Profiles and botnets inOnline Social Networks Using Steganography Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: At the present time, hundreds of millions of active users all around the world are using online socialnetwork, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most welllikedand accepted services on the Internet. With the quick development of information technology andnetworking, the users became able to share many things on the web such as pictures, videos, their dailyactivities, attended events and even their location. Nonetheless, the majorities of social networks have weak userto user authentication method, which is based on some basic information like displayed name, photo. Theseweaknesses make it effortless to misuse user’s information and do identity cloning attack to form fake profile. Currently, Facebook has 955 million active users. Of this whole, approximately 8.7 percent (which is equal to83 million users) is fake accounts. Fakes can introduce spam, manipulate online rating, or exploit knowledgeextracted from the network. This enormous number of fake profiles can cause hazards for privacy and securitysuch as spying, misusing personal information, identity thievery, and compromise privacy of users and theirfamilies. This paper will be discussing data hiding techniques to hide some information in profile pictures inorder to detect botnets and fake profiles and finally will propose an automated model to detect fake profiles andbotnets instead of current manual method which is costly and labor-intensive.
Authors and Affiliations
Ehsan Ahmadizadeh , Erfan Aghasian , Hossein Pour Taheri , Roohollah Fallah Nejad
Thorny Issues of Stakeholder Identification and Prioritization in Requirement Engineering Process
Identifying the stakeholder in requirement engineering process is one of the critical issues. It performs a remarkable part for successful project completion. The software project largely depends on several  ...
Content Evocation Using Web Scraping and Semantic Illustration
Abstract: Web scraping is the process of automatically collecting information from the World Wide Web. It is a field with active developments, sharing a common goal with the semantic web vision, an ambitious initi...
Comparative Analysis, Security Aspects & Optimization ofWorkload in Gfs Based Map Reduce Framework in Cloud System
Abstract: This paper discusses a propose cloud infrastructure that combines On-Demand allocation ofresources with improved utilization, opportunistic provisioning of cycles from idle cloud nodes to otherprocesses I...
Fetching the hidden information of web through specific Domains
Abstract: Now days, most of the people find the information over the internet by visiting various number of web pages and also by following the links under those web pages. A user has the ability to browse for data...
Security Implication of Social Networking in the Corporate Environment
Abstract: Social media offers basic business inclinations to associations and affiliations, furthermore has most likely comprehended security perils. With a particular finished objective to reduce these security risks an...