2020
DOI: 10.3390/fi12090148
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation

Abstract: Identity deception in online social networks is a pervasive problem. Ongoing research is developing methods for identity deception detection. However, the real-world efficacy of these methods is currently unknown because they have been evaluated largely through laboratory experiments. We present a review of representative state-of-the-art results on identity deception detection. Based on this analysis, we identify common methodological weaknesses for these approaches, and we propose recommendations that can in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…Deception-based defenses are potent weapons that have been proven to work in various domains. Their efficacy is based on the fact that they are programmed to exploit key biases to appear realistic but misleading substitutes to the hidden reality [ 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 , 108 ]. As a result, one will require a thorough understanding of both offensive and defensive trickery to implement a perfect Deception strategy.…”
Section: Discussionmentioning
confidence: 99%
“…Deception-based defenses are potent weapons that have been proven to work in various domains. Their efficacy is based on the fact that they are programmed to exploit key biases to appear realistic but misleading substitutes to the hidden reality [ 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 , 108 ]. As a result, one will require a thorough understanding of both offensive and defensive trickery to implement a perfect Deception strategy.…”
Section: Discussionmentioning
confidence: 99%
“…The major distinctive of the privacy and security matters of the social media network is the malware detection. The nature of the malware is the spreading from the reliable sources and if the user clicks the link came from the trusted user contacts [4]. The large amount of benefits from the social media is directly proportional to the privacy issues relied on the social media network.…”
Section: Fig 2 the History Of Social Media Network Usermentioning
confidence: 99%
“…After these cyber-attacks, the management of LinkedIn started to implement a new protocol. Even after five years the same hacker "Peace" started revealing the compromised password details from the previously attacked LinkedIn account holders [4]. Since billions of social media users' credentials and personal data are circulating across the internet, social media sites must have tight protection.…”
Section: Fig 2 the History Of Social Media Network Usermentioning
confidence: 99%
“…"Digital racist threats" related to the sending and spreading of offensive, vulgar, and threatening messages, intended to either create false rumors or infringe someone's privacy on the net [53]. "Usurpation of the identity" linked to cybernetic identity theft acts where the victim's reputation is undermined and racist hatred is fostered towards the group the person belongs to [54].…”
Section: Instrumentmentioning
confidence: 99%