Preventing malicious accounts based on mining with steganography in online
-
2018-06-08 https://doi.org/10.14419/ijet.v7i2.33.14848 -
Fake accounts, Secret text, Steganography, Watermarking. -
Abstract
On-line Social Networks (OSNs) are progressively exerting consequences on the way communication takes place among people through sites such as Twitter, Facebook, Google+ and LinkedIn, possessing millions of users. The Online Social Networks’ (OSN) users face security-privacy threats such as Profile cloning, privacy breach and malware attacks. By these attacks, the fake user steals the virtual identity of the original user which they use to interact with other online users. To prevent these attacks, the proposed system uses Steganography which is the process of hiding information within other non-secret text or data. Our proposed system utilizes Steganography by implementing Watermarking technique which hides a secret text inside an image invisibly. Moreover the system avoids the leakage of personal information and prevents the creation of fake accounts. Experimental results show that the proposed technique can effectively detect and prevent creating malicious accounts in comparison with the techniques reported previously.
Â
Â
-
References
[1] Benevenuto, Fabricio, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. "Detecting spammers on twitter." In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), vol. 6, no. 2010, p. 12. 2010.
[2] Cormack, Gordon V. "Email spam filtering: A systematic review." Foundations and Trends® in Information Retrieval 1, no. 4 (2008): 335-455.
[3] Crandall, David J., Lars Backstrom, Daniel Huttenlocher, and Jon Kleinberg. "Mapping the world's photos." In Proceedings of the 18th international conference on World Wide Web, pp. 761-770. ACM, 2009.
[4] Dalvi, Nilesh, Pedro Domingos, Sumit Sanghai, and Deepak Verma. "Adversarial classification." In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 99-108. ACM, 2004.
[5] David Ediger Karl Jiang, Courtney Corley Rob Farber, and William N. Reynolds. “Massive Social Network Analysis: Mining Twitter for Social Good†in 39th International Conference on Parallel Processing, 2010.
[6] Egele, Manuel, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. "Compa: Detecting compromised accounts on social networks." In NDSS. 2013.
[7] Felt, Adrienne, and David Evans. "Privacy protection for social networking APIs." 2008 Web 2.0 Security and Privacy (W2SP’08) (2008).
[8] Facebook Statistics: http: //www.facebook.com/press/info.php?statistics.
[9] Grier, Chris, Kurt Thomas, Vern Paxson, and Michael Zhang. "@ spam: the underground on 140 characters or less." In Proceedings of the 17th ACM conference on Computer and communications security, pp. 27-37. ACM, 2010.
[10] GAO, Hongyu, Yan Chen, Kathy Lee, Diana Palsetia, and Alok N. Choudhary. "Towards Online Spam Filtering in Social Networks." In NDSS, vol. 12, pp. 1-16. 2012.
[11] Georgios Kontaxis, Iasonas Polakis and Sotiris Ioannidis. “Detecting social network profile cloning†in IEEE International Conference, 2011.
[12] Heymann, Paul, Georgia Koutrika, and Hector Garcia-Molina. "Fighting spam on social web sites: A survey of approaches and future challenges." IEEE Internet Computing 11, no. 6 (2007).
[13] Huseyin Cavusoglu Ph.D, Huseyin Cavusoglu Ph.D, Srinivasan Raghunathan Ph.D. “The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers†in International Journal of Electronic Commerce, 2004.
[14] Jagatic, Tom N., Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. "Social phishing." Communications of the ACM 50, no. 10 (2007): 94-100.
[15] Kreibich, Christian, and Jon Crowcroft. "Honeycomb: creating intrusion detection signatures using honeypots." ACM SIGCOMM computer communication review 34, no. 1 (2004): 51-56.
[16] Lee, Kyumin, James Caverlee, and Steve Webb. "Uncovering social spammers: social honeypots+ machine learning." In Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, pp. 435-442. ACM, 2010.
[17] Lee, Sangho, and Jong Kim. "WarningBird: Detecting Suspicious URLs in Twitter Stream." In NDSS, vol. 12, pp. 1-13. 2012.
[18] [18]Lin, Yu-Ru, Hari Sundaram, Yun Chi, Junichi Tatemura, and Belle L. Tseng. "Splog detection using self-similarity analysis on blog temporal dynamics." In Proceedings of the 3rd international workshop on Adversarial information retrieval on the web, pp. 1-8. ACM, 2007.
[19] Linkedin: About us http://press.linkedin.com/about.
[20] Nazir, Atif, Saqib Raza, and Chen-Nee Chuah. "Unveiling facebook: a measurement study of social network based applications." In Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, pp. 43-56. ACM, 2008.
[21] Prince, Matthew B., Benjamin M. Dahl, Lee Holloway, Arthur M. Keller, and Eric Langheinrich. "Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot." In CEAS. 2005.
[22] Stringhini, Gianluca, Christopher Kruegel, and Giovanni Vigna. "Detecting spammers on social networks." In Proceedings of the 26th annual computer security applications conference, pp. 1-9. ACM, 2010.
[23] Sumathi C.P , Santanam Tand Umamaheswari G. “A Study of Various Steganographic Techniques Used for Information Hiding†in International Journal of Computer Science & Engineering Survey (IJCSES), December 2013.
[24] Thomas, Kurt, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song. "Design and evaluation of a real-time url spam filtering service." In Security and Privacy (SP), 2011 IEEE Symposium on, pp. 447-462. IEEE, 2011.
[25] Xu, Wei, Fangfang Zhang, and Sencun Zhu. "Toward worm detection in online social networks." In Proceedings of the 26th Annual Computer Security Applications Conference, pp. 11-20. ACM, 2010.
[26] Yung-Shen Lin, Jung-Yi Jiang, and Shie-Jue Lee. “A Similarity Measure for Text Classification and Clustering†in IEEE Transactions on Knowledge and Data Engineering, July 2014.
-
Downloads
-
How to Cite
K. Karpaga Priyaa, M., Lahari, K., Vasundhara, V., & Saranya, C. (2018). Preventing malicious accounts based on mining with steganography in online. International Journal of Engineering & Technology, 7(2.33), 615-618. https://doi.org/10.14419/ijet.v7i2.33.14848Received date: 2018-06-30
Accepted date: 2018-06-30
Published date: 2018-06-08