skip to main content
research-article

Social Media Identity Deception Detection: A Survey

Authors Info & Claims
Published:17 April 2021Publication History
Skip Abstract Section

Abstract

Social media have been growing rapidly and become essential elements of many people’s lives. Meanwhile, social media have also come to be a popular source for identity deception. Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception. This survey analyzes various identity deception attacks, which can be categorized into fake profile, identity theft, and identity cloning. This survey provides a detailed review of social media identity deception detection techniques. It also identifies primary research challenges and issues in the existing detection techniques. This article is expected to benefit both researchers and social media providers.

Skip Supplemental Material Section

Supplemental Material

References

  1. Muhammad Al-Qurishi, Mabrook Al-Rakhami, Atif Alamri, Majed Alrubaian, Sk Md Mizanur Rahman, and M. Shamim Hossain. 2017. Sybil defense techniques in online social networks: A survey. IEEE Access 5 (2017), 1200--1219.Google ScholarGoogle ScholarCross RefCross Ref
  2. Muhammad Al-Qurishi, Majed Alrubaian, Sk Md Mizanur Rahman, Atif Alamri, and Mohammad Mehedi Hassan. 2018. A prediction system of Sybil attack in social network using deep-regression model. Future Gen. Comput. Syst. 87 (2018), 743--753.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Muhammad Al-Qurishi, Sk Md Mizanur Rahman, Atif Alamri, Mohamed A. Mostafa, Majed Al-Rubaian, M. Shamim Hossain, and B. B. Gupta. 2018. SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks. Concurr. Comput.: Pract. Exper. 30, 5 (2018), e4276.Google ScholarGoogle ScholarCross RefCross Ref
  4. Muhammad Al-Qurishi, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, Majed Alrubaian, Atif Alamri, Mabrook Al-Rakhami, and B. B. Gupta. 2018. An efficient key agreement protocol for Sybil-precaution in online social networks. Future Gen. Comput. Syst. 84 (2018), 139--148.Google ScholarGoogle ScholarCross RefCross Ref
  5. Jalal S. Alowibdi, Ugo A. Buy, S. Yu Philip, and Leon Stenneth. 2014. Detecting deception in online social networks. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’14). IEEE, 383--390.Google ScholarGoogle ScholarCross RefCross Ref
  6. Leila Bahri, Barbara Carminati, and Elena Ferrari. 2018. Knowledge-based approaches for identity management in online social networks. Wiley Interdisc. Rev.: Data Min. Knowl. Discov. 8, 5 (2018), e1260.Google ScholarGoogle ScholarCross RefCross Ref
  7. Alessandro Balestrucci, Rocco De Nicola, Omar Inverso, and Catia Trubiani. 2019. Identification of credulous users on Twitter. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. 2096--2103.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. 2010. Detecting spammers on Twitter. In Proceedings of the Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS’10), Vol. 6. 12.Google ScholarGoogle Scholar
  9. Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. 2009. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web. 551--560.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Stephen P. Borgatti and Martin G. Everett. 2006. A graph-theoretic perspective on centrality. Soc. Netw. 28, 4 (2006), 466--484.Google ScholarGoogle ScholarCross RefCross Ref
  11. Zhan Bu, Zhengyou Xia, and Jiandong Wang. 2013. A sock puppet detection algorithm on virtual spaces. Knowl.-Based Syst. 37 (2013), 366--377.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zhuhua Cai and Christopher Jermaine. 2012. The latent community model for detecting Sybil attacks in social networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS’12).Google ScholarGoogle Scholar
  13. Massimo Calabresi. 2017. Inside Russia’s Social Media War on America. Retrieved from https://time.com/4783932/inside-russia-social-media-war-america/.Google ScholarGoogle Scholar
  14. Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 477--488.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Loredana Caruccio, Domenico Desiato, and Giuseppe Polese. 2018. Fake account identification in social networks. In Proceedings of the IEEE International Conference on Big Data (BigData’18). IEEE, 5078--5085.Google ScholarGoogle ScholarCross RefCross Ref
  16. Chao Chen, Yu Wang, Jun Zhang, Yang Xiang, Wanlei Zhou, and Geyong Min. 2016. Statistical features-based real-time detection of drifted Twitter spam. IEEE Trans. Info. Forensics Secur. 12, 4 (2016), 914--925.Google ScholarGoogle ScholarCross RefCross Ref
  17. Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia. 2012. Detecting automation of Twitter accounts: Are you a human, bot, or cyborg? IEEE Trans. Depend. Secure Comput. 9, 6 (2012), 811--824.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mauro Conti, Radha Poovendran, and Marco Secchiero. 2012. Fakebook: Detecting fake profiles in on-line social networks. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. IEEE, 1071--1078.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Rosa María Coyotl-Morales, Luis Villaseñor-Pineda, Manuel Montes-y Gómez, and Paolo Rosso. 2006. Authorship attribution using word sequences. In Proceedings of the Iberoamerican Congress on Pattern Recognition. Springer, 844--853.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Erin Smith Crabb, Alan Mishler, Susannah Paletz, Brook Hefright, and Ewa Golonka. 2015. Reading between the lines: A prototype model for detecting Twitter Sockpuppet accounts using language-agnostic processes. In Proceedings of the International Conference on Human-Computer Interaction. Springer, 656--661.Google ScholarGoogle ScholarCross RefCross Ref
  21. Richard L. Daft and Robert H. Lengel. 1986. Organizational information requirements, media richness and structural design. Manage. Sci. 32, 5 (1986), 554--571.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Sudipto Das, Divyakant Agrawal, and Amr El Abbadi. 2010. G-store: A scalable data store for transactional multi key access in the cloud. In Proceedings of the 1st ACM Symposium on Cloud Computing. 163--174.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. A. Devmane and N. K. Rana. 2014. Detection and prevention of profile cloning in online social networks. In Proceedings of the International Conference on Recent Advances and Innovations in Engineering (ICRAIE’14). IEEE, 1--5.Google ScholarGoogle Scholar
  24. John P. Dickerson, Vadim Kagan, and V. S. Subrahmanian. 2014. Using sentiment to detect bots on Twitter: Are humans more opinionated than bots? In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’14). IEEE, 620--627.Google ScholarGoogle Scholar
  25. Changyu Dong, Giovanni Russello, and Naranker Dulay. 2011. Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19, 3 (2011), 367--397.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. John R. Douceur. 2002. The Sybil attack. In Proceedings of the International Workshop on Peer-to-peer Systems. Springer, 251--260.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2013. COMPA: Detecting compromised accounts on social networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS’13).Google ScholarGoogle Scholar
  28. Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016), 96--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Michael Fire, Roy Goldschmidt, and Yuval Elovici. 2014. Online social networks: Threats and solutions. IEEE Commun. Surveys Tutor. 16, 4 (2014), 2019--2036.Google ScholarGoogle ScholarCross RefCross Ref
  30. Max Fisher. 2013. Syrian hackers claim AP hack that tipped stock market by $136 billion. Is it terrorism? The Washington Post (Apr. 23, 2013).Google ScholarGoogle Scholar
  31. Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, and Prateek Mittal. 2018. SYBILFUSE: Combining local attributes with global structure to perform robust Sybil detection. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’18). IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  32. Erving Goffman et al. 1978. The Presentation of Self in Everyday Life. Harmondsworth London.Google ScholarGoogle Scholar
  33. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Supraja Gurajala, Joshua S. White, Brian Hudson, and Jeanna N. Matthews. 2015. Fake Twitter accounts: Profile characteristics obtained using an activity-based pattern detection approach. In Proceedings of the International Conference on Social Media and Society. 1--7.Google ScholarGoogle Scholar
  35. Isabelle Guyon and André Elisseeff. 2003. An introduction to variable and feature selection. J. Mach. Learn. Res. 3 (Mar. 2003), 1157--1182.Google ScholarGoogle Scholar
  36. Bing-Zhe He, Chien-Ming Chen, Yi-Ping Su, and Hung-Min Sun. 2014. A defence scheme against identity theft attack based on multiple social networks. Expert Syst. Appl. 41, 5 (2014), 2345--2352.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Tim Hwang, Ian Pearce, and Max Nanis. 2012. Socialbots: Voices from the fronts. Interactions 19, 2 (2012), 38--45.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Alexander T. Ihler, Alan S. Willsky, et al. 2005. Loopy belief propagation: Convergence and effects of message errors. J. Mach. Learn. Res. 6, May (2005), 905--936.Google ScholarGoogle Scholar
  39. Fire Eye Threat Intelligence. 2015. HAMMERTOSS: Stealthy tactics define a Russian cyber threat group. FireEye, Milpitas, CA.Google ScholarGoogle Scholar
  40. Jinyuan Jia, Binghui Wang, and Neil Zhenqiang Gong. 2017. Random walk based fake account detection in online social networks. In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’17). IEEE, 273--284.Google ScholarGoogle ScholarCross RefCross Ref
  41. Lei Jin, Hassan Takabi, and James B. D. Joshi. 2011. Towards active detection of identity clone attacks on online social networks. In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. 27--38.Google ScholarGoogle Scholar
  42. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. 2013. Detecting multiple aliases in social media. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’13). IEEE, 1004--1011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. D. Kalyani and R. Sridevi. 2016. Survey on identity based and hierarchical identity based encryption schemes. Int. J. Comput. Appl. 134, 14 (2016), 0975--8887.Google ScholarGoogle Scholar
  44. Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Charles Kamhoua, Brandon L. Hernandez, Laurent Njilla, and Alex Pissinou Makki. 2017. Preventing colluding identity clone attacks in online social networks. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW’17). IEEE, 187--192.Google ScholarGoogle ScholarCross RefCross Ref
  45. Andreas M. Kaplan and Michael Haenlein. 2010. Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons 53, 1 (2010), 59--68.Google ScholarGoogle ScholarCross RefCross Ref
  46. Payal Shrivastava Kapoor and Srinivas Gunta. 2016. Impact of anonymity and identity deception on social media eWOM. In Proceedings of the Conference on e-Business, e-Services and e-Society. Springer, 360--370.Google ScholarGoogle ScholarCross RefCross Ref
  47. Leo Katz. 1953. A new status index derived from sociometric analysis. Psychometrika 18, 1 (1953), 39--43.Google ScholarGoogle ScholarCross RefCross Ref
  48. Ravneet Kaur, Sarbjeet Singh, and Harish Kumar. 2018. AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique. Expert Syst. Appl. 113 (2018), 397--414.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Ravneet Kaur, Sarbjeet Singh, and Harish Kumar. 2018. Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches. J. Netw. Comput. Appl. 112 (2018), 53--88.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Sarah Khaled, Neamat El-Tazi, and Hoda M. O. Mokhtar. 2018. Detecting fake accounts on social media. In Proceedings of the IEEE International Conference on Big Data (BigData’18). IEEE, 3672--3681.Google ScholarGoogle Scholar
  51. Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis, and Evangelos P. Markatos. 2011. Detecting social network profile cloning. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM’11). IEEE, 295--300.Google ScholarGoogle Scholar
  52. Sneha Kudugunta and Emilio Ferrara. 2018. Deep neural networks for bot detection. Info. Sci. 467 (2018), 312--322.Google ScholarGoogle Scholar
  53. Solomon Kullback and Richard A. Leibler. 1951. On information and sufficiency. Ann. Math. Stat. 22, 1 (1951), 79--86.Google ScholarGoogle ScholarCross RefCross Ref
  54. Srijan Kumar, Justin Cheng, Jure Leskovec, and V. S. Subrahmanian. 2017. An army of me: Sockpuppets in online discussion communities. In Proceedings of the 26th International Conference on World Wide Web. 857--866.Google ScholarGoogle Scholar
  55. Priyanka Kumari and Nemi Chandra Rathore. 2018. Fake profile identification on Facebook through SocialMedia app. In Information and Communication Technology for Sustainable Development. Springer, 83--90.Google ScholarGoogle Scholar
  56. Daniel Leung, Rob Law, Hubert Van Hoof, and Dimitrios Buhalis. 2013. Social media in tourism and hospitality: A literature review. J. Travel Tour. Market. 30, 1--2 (2013), 3--22.Google ScholarGoogle ScholarCross RefCross Ref
  57. Jiacheng Li, Wei Zhou, Jizhong Han, and Songlin Hu. 2019. Sockpuppet detection in social network via propagation tree. In Proceedings of the International Conference on Computational Science. Springer, 507--513.Google ScholarGoogle ScholarCross RefCross Ref
  58. Dong Liu, Quanyuan Wu, Weihong Han, and Bin Zhou. 2016. Sockpuppet gang detection on social media sites. Front. Comput. Sci. 10, 1 (2016), 124--135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Therani Madhusudan. 2003. On a text-processing approach to facilitating autonomous deception detection. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  60. Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee. 2017. Detection of Sockpuppets in social media. In Companion of the ACM Conference on Computer Supported Cooperative Work and Social Computing. 243--246.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Faiza Masood, Ahmad Almogren, Assad Abbas, Hasan Ali Khattak, Ikram Ud Din, Mohsen Guizani, and Mansour Zuair. 2019. Spammer detection and fake user identification on social networks. IEEE Access 7 (2019), 68140--68152.Google ScholarGoogle ScholarCross RefCross Ref
  62. Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim. 2010. Measuring the mixing time of social graphs. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement. 383--389.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Alvaro E. Monge, Charles Elkan, et al. 1996. The field matching problem: Algorithms and applications. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD’96), Vol. 2. 267--270.Google ScholarGoogle Scholar
  64. Atif Nazir, Saqib Raza, Chen-Nee Chuah, Burkhard Schipper, and C. A. Davis. 2010. Ghostbusting Facebook: Detecting and characterizing phantom profiles in online social gaming applications. In Proceedings of the Workshop on Online Social Networks (WOSN’10).Google ScholarGoogle Scholar
  65. Savyan P. Velayudhan and Mary Saira Bhanu Somasundaram. 2019. Compromised account detection in online social networks: A survey. Concurr. Comput.: Pract. Exper. 31, 20 (2019).Google ScholarGoogle Scholar
  66. Devakunchari Ramalingam and Valliyammai Chinnaiah. 2018. Fake profile detection techniques in large-scale online social networks: A comprehensive review. Comput. Electric. Eng. 65 (2018), 165--177.Google ScholarGoogle ScholarCross RefCross Ref
  67. Yuji Roh, Geon Heo, and Steven Euijong Whang. 2019. A survey on data collection for machine learning: A Big Data-AI integration perspective. IEEE Trans. Knowl. Data Eng. 33, 4 (2019), 1328--1347.Google ScholarGoogle ScholarCross RefCross Ref
  68. Xin Ruan, Zhenyu Wu, Haining Wang, and Sushil Jajodia. 2015. Profiling online social behaviors for compromised account detection. IEEE Trans. Info. Forensics Secur. 11, 1 (2015), 176--187.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Jon Russell. 2017. Prominent Twitter Accounts Compromised After Third-party App Twitter Counter Hacked. Retrieved from https://techcrunch.com/2017/03/15/twitter-counter-hacked.Google ScholarGoogle Scholar
  70. Dominic Seyler, Lunan Li, and ChengXiang Zhai. 2018. Identifying compromised accounts on social media using statistical text analysis. Retrieved from https://arXiv:1804.07247.Google ScholarGoogle Scholar
  71. Jia Shen. 2012. Social comparison, social presence, and enjoyment in the acceptance of social shopping websites. J. Electron. Comm. Res. 13, 3 (2012), 198.Google ScholarGoogle Scholar
  72. John Short, Ederyn Williams, and Bruce Christie. 1976. The Social Psychology of Telecommunications. John Wiley & Sons.Google ScholarGoogle Scholar
  73. Teerapol Silawan and Chaodit Aswakul. 2017. SybilVote: Formulas to quantify the success probability of Sybil attack in online social network voting. IEEE Commun. Lett. 21, 7 (2017), 1553--1556.Google ScholarGoogle ScholarCross RefCross Ref
  74. Monika Singh, Divya Bansal, and Sanjeev Sofat. 2016. Behavioral analysis and classification of spammers distributing pornographic content in social media. Soc. Netw. Anal. Min. 6, 1 (2016), 41.Google ScholarGoogle ScholarCross RefCross Ref
  75. Monika Singh, Divya Bansal, and Sanjeev Sofat. 2018. Who is who on Twitter--spammer, fake or compromised account? A tool to reveal true identity in real-time. Cybernet. Syst. 49, 1 (2018), 1--25.Google ScholarGoogle ScholarCross RefCross Ref
  76. Thamar Solorio, Ragib Hasan, and Mainul Mizan. 2013. A case study of sockpuppet detection in Wikipedia. In Proceedings of the Workshop on Language Analysis in Social Media. 59--68.Google ScholarGoogle Scholar
  77. Frank Spitzer. 2013. Principles of Random Walk. Vol. 34. Springer Science & Business Media.Google ScholarGoogle Scholar
  78. Counter Threat Unit Research Team. 2017. The Curious Case of Mia Ash: Fake Persona Lures Middle Eastern Targets. Retrieved from https://www.secureworks.com/research/the-curious-case-of-mia-ash.Google ScholarGoogle Scholar
  79. Michail Tsikerdekis. 2016. Identity deception prevention using common contribution network data. IEEE Trans. Info. Forensics Secur. 12, 1 (2016), 188--199.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Michail Tsikerdekis. 2017. Real-time identity-deception detection techniques for social media: Optimizations and challenges. IEEE Internet Comput. 22, 5 (2017), 35--45.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Michail Tsikerdekis and Sherali Zeadally. 2014. Multiple account identity deception detection in social media using nonverbal behavior. IEEE Trans. Info. Forensics Secur. 9, 8 (2014), 1311--1321.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Michail Tsikerdekis and Sherali Zeadally. 2014. Online deception in social media. Commun. ACM 57, 9 (2014), 72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Michail Tsikerdekis and Sherali Zeadally. 2015. Detecting and preventing online identity deception in social networking services. IEEE Internet Comput. 19, 3 (2015), 41--49.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Estée Van Der Walt and Jan Eloff. 2018. Using machine learning to detect fake identities: Bots vs. humans. IEEE Access 6 (2018), 6540--6549.Google ScholarGoogle ScholarCross RefCross Ref
  85. Esther Villar-Rodríguez, Javier Del Ser, Ana I. Torre-Bastida, Miren Nekane Bilbao, and Sancho Salcedo-Sanz. 2016. A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines. Concurr. Comput.: Pract. Exper. 28, 4 (2016), 1385--1395.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Alex Hai Wang. 2010. Don’t follow me: Spam detection in Twitter. In Proceedings of the International Conference on Security and Cryptography (SECRYPT’10). IEEE, 1--10.Google ScholarGoogle Scholar
  87. Binghui Wang, Jinyuan Jia, Le Zhang, and Neil Zhenqiang Gong. 2018. Structure-based Sybil detection in social networks via local rule-based propagation. IEEE Trans. Netw. Sci. Eng. 6, 3 (2018), 523--537.Google ScholarGoogle ScholarCross RefCross Ref
  88. Cheng Wang and Bo Yang. 2018. Composite behavioral modeling for identity theft detection in online social networks. Retrieved from https://arXiv:1801.06825.Google ScholarGoogle Scholar
  89. Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, and Ben Y. Zhao. 2017. Clickstream user behavior models. ACM Trans. Web. 11, 4 (2017), 21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. G. Alan Wang, Student Member, Hsinchun Chen, Jennifer J. Xu, and Homa Atabakhsh. 2006. Deception: An adaptive detection algorithm. Techniques 36, 5 (2006), 988--999.Google ScholarGoogle Scholar
  91. Jingli Wang, Wei Zhou, Jiacheng Li, Zhou Yan, Jizhong Han, and Songlin Hu. 2018. An online sockpuppet detection method based on subgraph similarity matching. In Proceedings of the IEEE International Conference on Parallel and Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom’18). IEEE, 391--398.Google ScholarGoogle Scholar
  92. Xiaoyun Wang, Chun-Ming Lai, Yu-Cheng Lin, Cho-Jui Hsieh, S. Felix Wu, and Hasan Cam. 2018. Multiple accounts detection on Facebook using semi-supervised learning on graphs. In Proceedings of the IEEE Military Communications Conference (MILCOM’18). IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  93. William E. Winkler. 1990. String comparator metrics and enhanced decision rules in the Fellegi-Sunter model of record linkage. In Proceedings of the Section on Survey Research Methods. American Statistical Association, 354--359.Google ScholarGoogle Scholar
  94. Cao Xiao, David Mandell Freeman, and Theodore Hwa. 2015. Detecting clusters of fake accounts in online social networks. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 91--101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Zaher Yamak, Julien Saunier, and Laurent Vercouter. 2018. SocksCatch: Automatic detection and grouping of sockpuppets in social media. Knowl.-Based Syst. 149 (2018), 124--142.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Guang Yang, Shibo He, and Zhiguo Shi. 2016. Leveraging crowdsourcing for efficient malicious users detection in large-scale social networks. IEEE Internet Things J. 4, 2 (2016), 330--339.Google ScholarGoogle ScholarCross RefCross Ref
  97. Zhi Yang, Yusi Zhang, and Yafei Dai. 2018. Defending against social network sybils with interaction graph embedding. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’18). IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  98. Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao. 2008. Sybillimit: A near-optimal social network defense against sybil attacks. In Proceedings of the IEEE Symposium on Security and Privacy (SP’08). IEEE, 3--17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. 2006. Sybilguard: Defending against sybil attacks via social networks. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 267--278.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Razieh Nokhbeh Zaeem, Monisha Manoharan, Yongpeng Yang, and K. Suzanne Barber. 2017. Modeling and analysis of identity threat behaviors through text mining of identity theft stories. Comput. Secur. 65 (2017), 50--63.Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. ChengXiang Zhai and Sean Massung. 2016. Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining. Morgan & Claypool.Google ScholarGoogle Scholar
  102. Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan. 2016. The rise of social botnets: Attacks and countermeasures. IEEE Trans. Depend. Secure Comput. 15, 6 (2016), 1068--1082.Google ScholarGoogle ScholarCross RefCross Ref
  103. Xiaoying Zhang, Hong Xie, and John C. S. Lui. 2018. Sybil detection in social-activity networks: Modeling, algorithms and evaluations. In Proceedings of the IEEE 26th International Conference on Network Protocols (ICNP’18). IEEE, 44--54.Google ScholarGoogle Scholar
  104. Zhiyong Zhang and Brij B. Gupta. 2018. Social media security and trustworthiness: Overview and new direction. Future Gen. Comput. Syst. 86 (2018), 914--925.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Xueling Zheng, Yiu Ming Lai, Kam-Pui Chow, Lucas C. K. Hui, and Siu-Ming Yiu. 2011. Sockpuppet detection in online discussion forums. In Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 374--377.Google ScholarGoogle ScholarCross RefCross Ref
  106. Wei Zhou, Jingli Wang, Junyu Lin, Jiacheng Li, Jizhong Han, and Songlin Hu. 2019. A time-series sockpuppet detection method for dynamic social relationships. In Proceedings of the International Conference on Database Systems for Advanced Applications. Springer, 36--51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Yin Zhu, Xiao Wang, Erheng Zhong, Nathan N. Liu, He Li, and Qiang Yang. 2012. Discovering spammers in social networks. In Proceedings of the 26th AAAI Conference on Artificial Intelligence.Google ScholarGoogle Scholar

Index Terms

  1. Social Media Identity Deception Detection: A Survey

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 54, Issue 3
        April 2022
        836 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3461619
        Issue’s Table of Contents

        Copyright © 2021 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 April 2021
        • Accepted: 1 December 2020
        • Received: 1 October 2020
        Published in csur Volume 54, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format