Abstract
With the widespread use of computers, communications infrastructure, and the Internet, online social networks (OSN) have gained a huge popularity in recent years. Unfortunately, the very nature and popularity of OSN have brought about its own share of frauds and misuse. Frauds in OSN refer to activities that result in harassment, loss of money, loss of reputation of a person or an entity, loss of trust in the system or an individual, etc. Due to the complex structure, and information flow in OSN, as well as the relative anonymity of the identity, detection, control and prevention of frauds in OSN is difficult, time-consuming, error-prone and demands an unusually high level of technical finesse from the investigators. In this paper, we begin with a simple typology of OSN frauds and then follow up by describing in detail the nature of each fraud and by reviewing some of the state-of-the-art research done so far (mostly in machine learning, data mining, and text mining) to detect them. Where possible, we stress on the scale and impact of these frauds. We identify manipulation of identities and diffusion of misinformation as two important aspects in the modus operandi of most types of OSN frauds. We identify manipulation of identities and diffusion of misinformation as two important aspects in the modus operandi of most types of OSN frauds.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
References
N. Abdelhamid, A. Ayesh, F. Thabtah, Phishing detection based associative classification data mining. Expert Syst. Appl. 41(13), 5948–5959 (2014)
N.A. Adawi, Social networking and “brand-jacking”–is it infringement? (2010)
A. Aggarwal, A. Rajadesingan, P. Kumaraguru, Phishari: automatic realtime phishing detection on twitter, in Proceedings of IEEE eCrime Researchers Summit (2012)
E. Aïmeur, D. Schőnfeld, The ultimate invasion of privacy: identity theft, in 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST) (IEEE, New York, 2011), pp. 24–31
S.F.H. Allison, A.M. Schuck, K.M. Lersch, Exploring the crime of identity theft: prevalence, clearance rates, and victim/offender characteristics. J. Crim. Just. 33(1), 19–29 (2005)
L. Bilge, T. Strufe, D. Balzarotti, E. Kirda, All your contacts are belong to us: automated identity theft attacks on social networks, in Proceedings of the 18th International Conference on World Wide Web (ACM, New York, 2009), pp. 551–560
M. Burmester, P. Henry, L.S. Kermes, Tracking cyberstalkers: a cryptographic approach. ACM SIGCAS Comput. Soc. 35(3), 2 (2005)
C. Castillo, M. Mendoza, B. Poblete, Information credibility on twitter, in Proceedings of the 20th International Conference on World Wide Web (ACM, New York, 2011), pp. 675–684
T. Chang, P.Y. Hsu, M.S. Cheng, C.Y. Chung, Y.L. Chung, Detecting fake review with rumor model—case study in hotel review, in International Conference on Intelligent Science and Big Data Engineering (Springer, Berlin, 2015), pp. 181–192
M. Dadvar, F.M.G. de Jong, R.J.F. Ordelman, R.B. Trieschnigg, Improved cyberbullying detection using gender information (2012)
G. Danezis, P. Mittal, Sybilinfer: detecting sybil nodes using social networks, in NDSS, San Diego, CA (2009)
K. Dinakar, R. Reichart, H. Lieberman, Modeling the detection of textual cyberbullying. Soc. Mob. Web 11(02), 11–17 (2011)
H. Dreßing, J. Bailer, A. Anders, H. Wagner, C. Gallas, Cyberstalking in a large sample of social network users: prevalence, characteristics, and impact upon victims. Cyberpsychol. Behav. Soc. Netw. 17(2), 61–67 (2014)
M. Egele, G. Stringhini, C. Kruegel, G. Vigna, Compa: detecting compromised accounts on social networks, in Proceedings of Symposium on Network and Distributed System Security (NDSS) (2013)
S. Egelman, L.F. Cranor, J. Hong, You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (ACM, New York, 2008), pp. 1065–1074
S. Feng, L. Xing, A. Gogar, Y. Choi, Distributional footprints of deceptive product reviews. ICWSM 12, 98–105 (2012)
I. Fette, N. Sadeh, A. Tomasic, Learning to detect phishing emails, in Proceedings of the International Conference on World Wide Web (WWW2007) (2007), pp. 55–56
S. Garera, N. Provos, M. Chew, A.D. Rubin, A framework for detection and measurement of phishing attacks, in Proceedings of (WORM 2007) (2007)
A.T. Hadgu, K. Garimella, I. Weber, Political hashtag hijacking in the U.S. (2013)
C.J. Hoofnagle, Identity theft: making the known unknowns known. Harv. J. Law Technol. 21, 97 (2007)
T.N. Jagatic, N.A. Johnson, M. Jakobsson, F. Menczer, Social phishing. Commun. ACM 50(10), 94–100 (2007)
N. Jain, P. Agarwal, J. Pruthi, Hashjacker-detection and analysis of hashtag hijacking on twitter. Int. J. Comput. Appl. 114(19), 17–20 (2015)
F. Jin, E. Dougherty, P. Saraf, Y. Cao, N. Ramakrishnan, Epidemiological modeling of news and rumors on twitter, in Proceedings of the 7th Workshop on Social Network Mining and Analysis (ACM, New York, 2013), p. 8
N. Jindal, B. Liu, Opinion spam and analysis, in Proceedings of the 2008 International Conference on Web Search and Data Mining (ACM, New York, 2008), pp. 219–230
N. Jindal, B. Liu, E.-P. Lim, Finding unusual review patterns using unexpected rules, in Proceedings of the 19th ACM International Conference on Information and Knowledge Management (ACM, New York, 2010), pp. 1549–1552
M. Khonji, Y. Iraqi, A. Jones, Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4), 2091–2121 (2013)
H. Lamba, M.M. Malik, J. Pfeffer, A tempest in a teacup? analyzing firestorms on twitter, in 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (IEEE, New York, 2015), pp. 17–24
T. Lappas, Fake reviews: the malicious perspective, in International Conference on Application of Natural Language to Information Systems (Springer, Berlin, 2012), pp. 23–34
E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, H.W. Lauw, Detecting product review spammers using rating behaviors, in Proceedings of the 19th ACM International Conference on Information and Knowledge Management (ACM, New York, 2010), pp. 939–948
J. Liu, Y. Cao, C.-Y. Lin, Y. Huang, M. Zhou, Low-quality product review detection in opinion summarization, in EMNLP-CoNLL, vol. 7 (2007), pp. 334–342
C. Ludl, S. McAllister, E. Kirda, C. Kruegel, On the effectiveness of techniques to detect phishing sites, in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (Springer, Berlin, 2007), pp. 20–39
M. Lukasik, T. Cohn, K. Bontcheva, Classifying tweet level judgements of rumours in social media, in Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP2015) (2015), pp. 2590–2595
J. Ma, L.K. Saul, S. Savage, G.M. Voelker, Beyond blacklists: learning to detect malicious web sites from suspicious urls, in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, New York, 2009), pp. 1245–1254
R.T. Mercuri, Scoping identity theft. Commun. ACM 49(5), 17–21 (2006)
A. Mukherjee, B. Liu, N. Glance, Spotting fake reviewer groups in consumer reviews, in Proceedings of the 21st International Conference on World Wide Web (ACM, New York, 2012), pp. 191–200
G.R. Newman, M.M. McNally, Identity theft literature review. US Department of Justice Document No. 210459 (2005)
S. Sedhai, A. Sun, Hspam14: a collection of 14 million tweets for hashtag-oriented spam research, in Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (ACM, New York, 2015), pp. 223–232
D.N. Tran, B. Min, J. Li, L. Subramanian, Sybil-resilient online content voting, in NSDI, vol. 9 (2009), pp. 15–28
L. Von Ahn, B. Maurer, C. McMillen, D. Abraham, M. Blum, recaptcha: human-based character recognition via web security measures. Science 321(5895), 1465–1468 (2008)
D. Wang, A. Musaev, C. Pu, Information diffusion analysis of rumor dynamics over a social-interaction based model, in 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) (IEEE, New York, 2016), pp. 312–320
L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, X. Deng, Detection of phishing webpages based on visual similarity, in Proceedings of the International Conference on World Wide Web(WWW2005) (2005), pp. 1060–1061
C. Whittaker, B. Ryner, M. Nazif, Large-scale automatic classification of phishing pages, in NDSS, vol. 10 (2010)
S.-H. Wu, M.-J. Chou, C.-H. Tseng, Y.-J. Lee, K.-T. Chen, Detecting in-situ identity fraud on social network services: a case study with facebook, in Proceedings of the 23rd International Conference on World Wide Web(WWW2014) (2014), pp. 401–402
K. Wu, S. Yang, K.Q. Zhu, False rumors detection on sina weibo by propagation structures. In 2015 IEEE 31st International Conference on Data Engineering (ICDE) (IEEE, New York, 2015), pp. 651–662
Y. Yang, M. Manoharan, K.S. Barber, Modelling and analysis of identity threat behaviors through text mining of identity theft stories, in Proceedings of IEEE Joint Intelligence and Security Informatics Conference (JISIC) (2014), pp. 184–191
Z. Yang, C. Wilson, X. Wang, T. Gao, B.Y. Zhao, Y. Dai, Uncovering social network sybils in the wild. ACM Trans. Knowl. Discov. Data 8(1), 2 (2014)
D. Yin, Z. Xue, L. Hong, B.D. Davison, A. Kontostathis, L. Edwards, Detection of harassment on web 2.0, in Proceedings of the Content Analysis in the WEB 2.0 (CAW2.0) Workshop at WWW2009 (2009)
H. Yu, M. Kaminsky, P.B. Gibbons, A. Flaxman, Sybilguard: defending against sybil attacks via social networks, in ACM SIGCOMM Computer Communication Review, vol. 36 (ACM, New York, 2006), pp. 267–278
H. Yu, P.B. Gibbons, M. Kaminsky, F. Xiao, Sybillimit: a near-optimal social network defense against sybil attacks, in IEEE Symposium on Security and Privacy, 2008. SP 2008 (IEEE, New York, 2008), pp. 3–17
Y. Zhang, S. Egelman, L. Cranor, J. Hong, Phinding phish: evaluating anti-phishing tools (2006)
Q. Zhang, S. Zhang, J. Dong, J. Xiong, X. Cheng, Automatic detection of rumor on social network, in National CCF Conference on Natural Language Processing and Chinese Computing (Springer, Berlin, 2015), pp. 113–122
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Apte, M., Palshikar, G.K., Baskaran, S. (2019). Frauds in Online Social Networks: A Review. In: Özyer, T., Bakshi, S., Alhajj, R. (eds) Social Networks and Surveillance for Society. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-78256-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-78256-0_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78255-3
Online ISBN: 978-3-319-78256-0
eBook Packages: Social SciencesSocial Sciences (R0)