Affiliation:
1. University of Ghana, Ghana
Abstract
Successful profile cloning attacks have far-reaching consequences for the victims. People whose profiles are cloned suffer defamation, mistrust, loss of job, interdiction, public disgrace, dent of reputation, and defrauding. This chapter aims to identify and propose a model that detects profile cloning attacks on online social network platforms. The proposed model is based on unsupervised machine learning clustering and statistical similarity verification methods for the filtration of profiles. The model computes statistical values for attribute similarity measure (ASM) and friends network similarity measure (FNSM). The model has a precision score of 100%. The attribute weight and friends network similarity measures show percentile figures ranging from 0.45 to 1.00. Profile accounts that fall within this range for both ASM and FNSM measures are likely to turn out to be cloned. The higher the figures, the more the suspicion of being a fake account to the supposed original one. The strength of the model is that it exposes the actual clone using the outcome of the computation.
Reference64 articles.
1. Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)
2. Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices
3. Aldhafferi, N., Watson, C., & Sajeev, A. S. M. (2013). Personal information privacy settings of online social networks and their. 2(2), 1–17.
4. A Model for Evaluating Requirements Elicitation Techniques in Software Development Projects
5. Ali, M. K., Ali, M. K., & Hassan, K. A. (2020). Factors Affecting Information Privacy and Protection Behavior on Social Network Sites. VII(Ix), 406–418.