An Overview of Identity Deception Approaches and Its Effects
Ms. M. Preensta Ebenazer, Dr. P. Sumathi "An Overview of Identity Deception Approaches and Its Effects". International Journal of Computer Trends and Technology (IJCTT) V25(3):123-126, July 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Identity deception plays an important role
in today’s real world environment where malicious
activities have increased enormously. Identity deception
needs to be identified in order to prevent malicious
activities that are initiated by the attackers. There are
various research works that have been conducted
previously with a major focus on avoiding the
involvement of fake users from creating chaos. The
methodologies mentioned in the proceeding sections,
follow various ways to identity deception process. Most
of the research works emphasised on verbal behaviour of
the user activities to predict identity deception while
some of the works focussed on non verbal behaviour of
the user activities to predict identity deception. Several
methodologies have been analyzed to find the better and
flexible mechanism which can perform identity deception
process effectively. From the analysis it has been made
evident that the non verbal behaviour based approach
can find identity deceptions that are caused by fake users
in a better way. The non verbal behaviour based
methodologies have a high detection accuracy rate than
verbal based behaviours.
References
[1] G. Alan Wang, Hsinchun Chen, Jennifer J. Xu, and Homa
Atabakhsh “Automatically Detecting Criminal Identity
Deception: An Adaptive Detection Algorithm”, IEEE
Transactions On Systems, Man, And Cybernetics—Part A:
Systems And Humans, Vol. 36, No. 5, September 2006
[2] Anna Squicciarini and Christopher Griffin, “An Informed
Model of Personal Information Release in Social Networking
Sites”, arXiv:1206.0981v1 [cs.SI] 5 Jun 2012
[3] Chuan Peng, Kuai Xu, Feng Wang and Haiyan Wang,
“Predicting Information Diffusion Initiated from Multiple
Sources in Online Social Networks”, in Proceedings of
International Conference on Distributed Computing Systems
(ICDCS), Vol. 2, October 2013
[4] Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis and
Evangelos P. Markatos, “Detecting Social Network Profile
Cloning”, 3rd IEEE International Workshop on Security and
Social Networking (SESOC), March 2011
[5] Michail Tsikerdekis and Sherali Zeadally, “Multiple
Account Identity Deception Detection in Social Media Using
Nonverbal Behaviour”, IEEE Transactions on Information
Forensics and Security, Vol. 9, No. 8, August 2014
[6] T.Priyanka, ?Key Players Identification in Social Network for
Preventing Private Key Players Identification in Social
Network for Preventing Private, International Journal of
Computer Trends and Technology (IJCTT) – volume 10
number 3 – Apr 2014
[7] Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee
K. Burgoon, and Jay F, “Deception Detection through
Automatic, Unobtrusive Analysis of Non verbal Behaviour”,
IEEE Intelligent Systems, Vol. 20, No. 5, September 2005
[8] Qiang Cao, Michael Sirivianos and Xiaowei Yang Tiago
Pregueiro, “Aiding the Detection of Fake Accounts in Large
Scale Social Online Services”, In SIGCOMM Poster Session,
April 2011.
Keywords
Identity Deception, Non verbal
Behaviour and Fake Users