Skip to main content

Frauds in Online Social Networks: A Review

  • Chapter
  • First Online:
Social Networks and Surveillance for Society

Abstract

With the widespread use of computers, communications infrastructure, and the Internet, online social networks (OSN) have gained a huge popularity in recent years. Unfortunately, the very nature and popularity of OSN have brought about its own share of frauds and misuse. Frauds in OSN refer to activities that result in harassment, loss of money, loss of reputation of a person or an entity, loss of trust in the system or an individual, etc. Due to the complex structure, and information flow in OSN, as well as the relative anonymity of the identity, detection, control and prevention of frauds in OSN is difficult, time-consuming, error-prone and demands an unusually high level of technical finesse from the investigators. In this paper, we begin with a simple typology of OSN frauds and then follow up by describing in detail the nature of each fraud and by reviewing some of the state-of-the-art research done so far (mostly in machine learning, data mining, and text mining) to detect them. Where possible, we stress on the scale and impact of these frauds. We identify manipulation of identities and diffusion of misinformation as two important aspects in the modus operandi of most types of OSN frauds. We identify manipulation of identities and diffusion of misinformation as two important aspects in the modus operandi of most types of OSN frauds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.forbes.com/sites/kashmirhill/2012/01/24/mcdstories-when-a-hashtag-becomes-a-bashtag/.

  2. 2.

    http://www.ftc.gov/sites/default/files/itadact.pdf/.

  3. 3.

    http://edition.cnn.com/2012/08/02/tech/social-media/facebook-fake-accounts/.

  4. 4.

    https://thenextweb.com/facebook/2014/02/03/facebook-estimates-5-5-11-2-accounts-fake/.

References

  1. N. Abdelhamid, A. Ayesh, F. Thabtah, Phishing detection based associative classification data mining. Expert Syst. Appl. 41(13), 5948–5959 (2014)

    Article  Google Scholar 

  2. N.A. Adawi, Social networking and “brand-jacking”–is it infringement? (2010)

    Google Scholar 

  3. A. Aggarwal, A. Rajadesingan, P. Kumaraguru, Phishari: automatic realtime phishing detection on twitter, in Proceedings of IEEE eCrime Researchers Summit (2012)

    Google Scholar 

  4. E. Aïmeur, D. Schőnfeld, The ultimate invasion of privacy: identity theft, in 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST) (IEEE, New York, 2011), pp. 24–31

    Google Scholar 

  5. S.F.H. Allison, A.M. Schuck, K.M. Lersch, Exploring the crime of identity theft: prevalence, clearance rates, and victim/offender characteristics. J. Crim. Just. 33(1), 19–29 (2005)

    Article  Google Scholar 

  6. L. Bilge, T. Strufe, D. Balzarotti, E. Kirda, All your contacts are belong to us: automated identity theft attacks on social networks, in Proceedings of the 18th International Conference on World Wide Web (ACM, New York, 2009), pp. 551–560

    Google Scholar 

  7. M. Burmester, P. Henry, L.S. Kermes, Tracking cyberstalkers: a cryptographic approach. ACM SIGCAS Comput. Soc. 35(3), 2 (2005)

    Google Scholar 

  8. C. Castillo, M. Mendoza, B. Poblete, Information credibility on twitter, in Proceedings of the 20th International Conference on World Wide Web (ACM, New York, 2011), pp. 675–684

    Google Scholar 

  9. T. Chang, P.Y. Hsu, M.S. Cheng, C.Y. Chung, Y.L. Chung, Detecting fake review with rumor model—case study in hotel review, in International Conference on Intelligent Science and Big Data Engineering (Springer, Berlin, 2015), pp. 181–192

    Google Scholar 

  10. M. Dadvar, F.M.G. de Jong, R.J.F. Ordelman, R.B. Trieschnigg, Improved cyberbullying detection using gender information (2012)

    Google Scholar 

  11. G. Danezis, P. Mittal, Sybilinfer: detecting sybil nodes using social networks, in NDSS, San Diego, CA (2009)

    Google Scholar 

  12. K. Dinakar, R. Reichart, H. Lieberman, Modeling the detection of textual cyberbullying. Soc. Mob. Web 11(02), 11–17 (2011)

    Google Scholar 

  13. H. Dreßing, J. Bailer, A. Anders, H. Wagner, C. Gallas, Cyberstalking in a large sample of social network users: prevalence, characteristics, and impact upon victims. Cyberpsychol. Behav. Soc. Netw. 17(2), 61–67 (2014)

    Article  Google Scholar 

  14. M. Egele, G. Stringhini, C. Kruegel, G. Vigna, Compa: detecting compromised accounts on social networks, in Proceedings of Symposium on Network and Distributed System Security (NDSS) (2013)

    Google Scholar 

  15. S. Egelman, L.F. Cranor, J. Hong, You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (ACM, New York, 2008), pp. 1065–1074

    Google Scholar 

  16. S. Feng, L. Xing, A. Gogar, Y. Choi, Distributional footprints of deceptive product reviews. ICWSM 12, 98–105 (2012)

    Google Scholar 

  17. I. Fette, N. Sadeh, A. Tomasic, Learning to detect phishing emails, in Proceedings of the International Conference on World Wide Web (WWW2007) (2007), pp. 55–56

    Google Scholar 

  18. S. Garera, N. Provos, M. Chew, A.D. Rubin, A framework for detection and measurement of phishing attacks, in Proceedings of (WORM 2007) (2007)

    Google Scholar 

  19. A.T. Hadgu, K. Garimella, I. Weber, Political hashtag hijacking in the U.S. (2013)

    Google Scholar 

  20. C.J. Hoofnagle, Identity theft: making the known unknowns known. Harv. J. Law Technol. 21, 97 (2007)

    Google Scholar 

  21. T.N. Jagatic, N.A. Johnson, M. Jakobsson, F. Menczer, Social phishing. Commun. ACM 50(10), 94–100 (2007)

    Article  Google Scholar 

  22. N. Jain, P. Agarwal, J. Pruthi, Hashjacker-detection and analysis of hashtag hijacking on twitter. Int. J. Comput. Appl. 114(19), 17–20 (2015)

    Google Scholar 

  23. F. Jin, E. Dougherty, P. Saraf, Y. Cao, N. Ramakrishnan, Epidemiological modeling of news and rumors on twitter, in Proceedings of the 7th Workshop on Social Network Mining and Analysis (ACM, New York, 2013), p. 8

    Google Scholar 

  24. N. Jindal, B. Liu, Opinion spam and analysis, in Proceedings of the 2008 International Conference on Web Search and Data Mining (ACM, New York, 2008), pp. 219–230

    Google Scholar 

  25. N. Jindal, B. Liu, E.-P. Lim, Finding unusual review patterns using unexpected rules, in Proceedings of the 19th ACM International Conference on Information and Knowledge Management (ACM, New York, 2010), pp. 1549–1552

    Google Scholar 

  26. M. Khonji, Y. Iraqi, A. Jones, Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4), 2091–2121 (2013)

    Article  Google Scholar 

  27. H. Lamba, M.M. Malik, J. Pfeffer, A tempest in a teacup? analyzing firestorms on twitter, in 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (IEEE, New York, 2015), pp. 17–24

    Google Scholar 

  28. T. Lappas, Fake reviews: the malicious perspective, in International Conference on Application of Natural Language to Information Systems (Springer, Berlin, 2012), pp. 23–34

    Google Scholar 

  29. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, H.W. Lauw, Detecting product review spammers using rating behaviors, in Proceedings of the 19th ACM International Conference on Information and Knowledge Management (ACM, New York, 2010), pp. 939–948

    Google Scholar 

  30. J. Liu, Y. Cao, C.-Y. Lin, Y. Huang, M. Zhou, Low-quality product review detection in opinion summarization, in EMNLP-CoNLL, vol. 7 (2007), pp. 334–342

    Google Scholar 

  31. C. Ludl, S. McAllister, E. Kirda, C. Kruegel, On the effectiveness of techniques to detect phishing sites, in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (Springer, Berlin, 2007), pp. 20–39

    Book  Google Scholar 

  32. M. Lukasik, T. Cohn, K. Bontcheva, Classifying tweet level judgements of rumours in social media, in Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP2015) (2015), pp. 2590–2595

    Google Scholar 

  33. J. Ma, L.K. Saul, S. Savage, G.M. Voelker, Beyond blacklists: learning to detect malicious web sites from suspicious urls, in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, New York, 2009), pp. 1245–1254

    Google Scholar 

  34. R.T. Mercuri, Scoping identity theft. Commun. ACM 49(5), 17–21 (2006)

    Article  Google Scholar 

  35. A. Mukherjee, B. Liu, N. Glance, Spotting fake reviewer groups in consumer reviews, in Proceedings of the 21st International Conference on World Wide Web (ACM, New York, 2012), pp. 191–200

    Google Scholar 

  36. G.R. Newman, M.M. McNally, Identity theft literature review. US Department of Justice Document No. 210459 (2005)

    Google Scholar 

  37. S. Sedhai, A. Sun, Hspam14: a collection of 14 million tweets for hashtag-oriented spam research, in Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (ACM, New York, 2015), pp. 223–232

    Google Scholar 

  38. D.N. Tran, B. Min, J. Li, L. Subramanian, Sybil-resilient online content voting, in NSDI, vol. 9 (2009), pp. 15–28

    Google Scholar 

  39. L. Von Ahn, B. Maurer, C. McMillen, D. Abraham, M. Blum, recaptcha: human-based character recognition via web security measures. Science 321(5895), 1465–1468 (2008)

    Google Scholar 

  40. D. Wang, A. Musaev, C. Pu, Information diffusion analysis of rumor dynamics over a social-interaction based model, in 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) (IEEE, New York, 2016), pp. 312–320

    Google Scholar 

  41. L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, X. Deng, Detection of phishing webpages based on visual similarity, in Proceedings of the International Conference on World Wide Web(WWW2005) (2005), pp. 1060–1061

    Google Scholar 

  42. C. Whittaker, B. Ryner, M. Nazif, Large-scale automatic classification of phishing pages, in NDSS, vol. 10 (2010)

    Google Scholar 

  43. S.-H. Wu, M.-J. Chou, C.-H. Tseng, Y.-J. Lee, K.-T. Chen, Detecting in-situ identity fraud on social network services: a case study with facebook, in Proceedings of the 23rd International Conference on World Wide Web(WWW2014) (2014), pp. 401–402

    Google Scholar 

  44. K. Wu, S. Yang, K.Q. Zhu, False rumors detection on sina weibo by propagation structures. In 2015 IEEE 31st International Conference on Data Engineering (ICDE) (IEEE, New York, 2015), pp. 651–662

    Google Scholar 

  45. Y. Yang, M. Manoharan, K.S. Barber, Modelling and analysis of identity threat behaviors through text mining of identity theft stories, in Proceedings of IEEE Joint Intelligence and Security Informatics Conference (JISIC) (2014), pp. 184–191

    Google Scholar 

  46. Z. Yang, C. Wilson, X. Wang, T. Gao, B.Y. Zhao, Y. Dai, Uncovering social network sybils in the wild. ACM Trans. Knowl. Discov. Data 8(1), 2 (2014)

    Google Scholar 

  47. D. Yin, Z. Xue, L. Hong, B.D. Davison, A. Kontostathis, L. Edwards, Detection of harassment on web 2.0, in Proceedings of the Content Analysis in the WEB 2.0 (CAW2.0) Workshop at WWW2009 (2009)

    Google Scholar 

  48. H. Yu, M. Kaminsky, P.B. Gibbons, A. Flaxman, Sybilguard: defending against sybil attacks via social networks, in ACM SIGCOMM Computer Communication Review, vol. 36 (ACM, New York, 2006), pp. 267–278

    Google Scholar 

  49. H. Yu, P.B. Gibbons, M. Kaminsky, F. Xiao, Sybillimit: a near-optimal social network defense against sybil attacks, in IEEE Symposium on Security and Privacy, 2008. SP 2008 (IEEE, New York, 2008), pp. 3–17

    Google Scholar 

  50. Y. Zhang, S. Egelman, L. Cranor, J. Hong, Phinding phish: evaluating anti-phishing tools (2006)

    Google Scholar 

  51. Q. Zhang, S. Zhang, J. Dong, J. Xiong, X. Cheng, Automatic detection of rumor on social network, in National CCF Conference on Natural Language Processing and Chinese Computing (Springer, Berlin, 2015), pp. 113–122

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manoj Apte .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Apte, M., Palshikar, G.K., Baskaran, S. (2019). Frauds in Online Social Networks: A Review. In: Özyer, T., Bakshi, S., Alhajj, R. (eds) Social Networks and Surveillance for Society. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-78256-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78256-0_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78255-3

  • Online ISBN: 978-3-319-78256-0

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics