Social Behavioural Profiles In Characteristic Different OSN Users

Amulya P., K.C. Pradeep

Abstract


We propose an arrangement of social behavioral elements that can successfully portray the client social activities on OSNs. We approve the viability of these behavioral components by gathering and dissecting genuine client click streams to an OSN site. In light of our estimation consider, we devise individual client's social behavioral profile by joining its particular behavioral component measurements. A social behavioral profile precisely mirrors a client's OSN action designs. While a credible proprietor fits in with its record's social behavioral profile automatically, it is hard and exorbitant for impostors to pretend. We assess the capacity of the social behavioral profiles in recognizing distinctive OSN clients, and our work demonstrate the social behavioral profiles can precisely separate individual OSN clients and identify traded off records.


References


250,000 Twitter Accounts Hacked. [Online]. Available:http://www.cnn.com/2013/02/01/tech/social-media/twitter-hacked,

accessed Sep. 2013.

50,000 Facebook Accounts Hacked. [Online]. Available:http://www.ktsm.com/news/thousands-of-facebook-accounts-hacked,

accessed Sep. 2013.

Detecting Suspicious Account Activity. [Online]. Available:http://googleonlinesecurity.blogspot.com/2010/03/detecting-suspiciousaccount-activity.html, accessed Sep. 2013.

Facebook Tracks the Location of Logins for Better Security. [Online].Available: http://www.zdnet.com/blog/weblife/facebook-adds-bettersecurity-tracks-the-location-of-your-logins/2010, accessed Sep. 2013.

Y. Bachrach, M. Kosinski, T. Graepel, P. Kohli, and D. Stillwell, “Personality and patterns of Facebook usage,” in Proc. 3rd Annu. ACM Web Sci. Conf. (WebSci), Evanston, IL, USA, 2012, pp. 24–32.

F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida, “Characterizing user behavior in online social networks,” in Proc. 9th ACM SIGCOMM Conf. Internet Meas. Conf. (IMC), Chicago, IL, USA, 2009, pp. 49–62.

Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, “Aiding the detection of fake accounts in large scale social online services,” in Proc. 9th USENIX Conf. Netw. Syst. Design Implement. (NSDI), San Jose, CA, USA, 2012, p. 15.

M. Egele, G. Stringhini, C. Kruegel, and G. Vigna, “COMPA: Detecting compromised accounts on social networks,” in Proc. Symp. Netw. Distrib. Syst. Secur. (NDSS), San Diego, CA, USA, 2013.

H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary, “Towards online spam filtering in social networks,” in Proc. Symp. Netw. Distrib. Syst. Secur. (NDSS), San Diego, CA, USA, 2012.

H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao, “Detecting and characterizing social spam campaigns,” in Proc. 10th ACM SIGCOMM Conf. Internet Meas. (IMC), Melbourne, VIC, Australia, 2010, pp. 35–47.

K.-I. Goh and A.-L. Barabási, “Burstiness and memory in complex systems,” Europhys. Lett., vol. 81, no. 4, p. 48002, 2008.

C. Grier, K. Thomas, V. Paxson, and M. Zhang, “@spam: The underground on 140 characters or less,” in Proc. 17th ACM Conf. Comput.Commun. Secur. (CCS), Chicago, IL, USA, 2010, pp. 27–37.

K. Lee, J. Caverlee, and S. Webb, “Uncovering social spammers: Social honeypots + machine learning,” in Proc. 33rd Int. ACM SIGIR Conf. Res. Develop. Inf. Retr. (SIGIR), Geneva, Switzerland, 2010, pp. 435–442.

C. Ross, E. S. Orr, M. Sisic, J. M. Arseneault, M. G. Simmering, and R. R. Orr, “Personality and motivations associated with Facebook use,” Comput. Human Behavior, vol. 25, no. 2, pp. 578–586, 2009.

F. Schneider, A. Feldmann, B. Krishnamurthy, and W.Willinger, “Understanding online social network usage from a network perspective,” in Proc. 9th ACM SIGCOMM Conf. Internet Meas. Conf. (IMC), Chicago, IL, USA, 2009, pp. 35–48.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.