Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2017, Vol. 57 Issue (6) : 620-624     DOI: 10.16511/j.cnki.qhdxxb.2017.26.029
ELECTRONIC ENGINEERING |
Detecting of fake accounts with hierarchical clustering
FANG Yong, LIU Daosheng, HUANG Cheng
College of Electronics and Information Engineering, Sichuan University, Chengdu 610064, China
Download: PDF(1124 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Since there are many malicious users on the Internet, popular online websites sometimes have millions of registered users. The system cannot easily distinguish between fake accounts and legitimate users. Fake accounts registered by a single malicious user often have similar profiles. This paper presents a new framework to find fake accounts in large numbers of users. The framework uses username string patterns to classify the original data and then calculates the similarity as measured by the Levenshtein distance between any two elements in one category. Hierarchical clustering with a proper threshold then finds groups of fake accounts hidden in the large amount of registration data. Tests demonstrate the effectiveness of this framework which algorithm relies less on data dimensions and features than other algorithms.
Keywords data security      fake accounts      machine learning      hierarchical clustering     
ZTFLH:  TP309.2  
Issue Date: 15 June 2017
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
FANG Yong
LIU Daosheng
HUANG Cheng
Cite this article:   
FANG Yong,LIU Daosheng,HUANG Cheng. Detecting of fake accounts with hierarchical clustering[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(6): 620-624.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2017.26.029     OR     http://jst.tsinghuajournals.com/EN/Y2017/V57/I6/620
  
  
  
  
  
[1] Wang A H. Don't follow me:Spam detection in twitter[C]//Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference. Athens, Greece:IEEE Press, 2010:1-10.
[2] Mohammad R M, Thabtah F, McCluskey L. Intelligent rule-based phishing websites classification[J]. IET Information Security, 2014, 8(3):153-160.
[3] Marchal S, Saari K, Singh N, et al. Know your phish:Novel techniques for detecting phishing sites and their targets[C]//Distributed Computing Systems (ICDCS), 2016 IEEE 36th International Conference. Piscataway, NJ, USA:IEEE Press, 2016:323-333.
[4] Malhotra A, Totti L, Meira Jr W, et al. Studying user footprints in different online social networks[C]//Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference. Piscataway, NJ, USA:IEEE Press, 2012:1065-1070.
[5] Cao Q, Sirivianos M, Yang X W, et al. Aiding the detection of fake accounts in large scale social online services[C]//Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. San Diego, CA, USA:USENIX Association, 2012:15-15.
[6] Cao X, Freeman D M, Hwa T. Detecting clusters of fake accounts in online social networks[C]//Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. Denver, CO, USA:ACM Press, 2015:91-101.
[7] Fire M, Katz G, Elovici Y. Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies[J]. Human Journal, 2012, 1(1):26-39.
[8] Jin L, Takabi H, Joshi J B D. Towards active detection of identity clone attacks on online social networks[C]//Proceedings of the first ACM conference on Data and application security and privacy. San Antonio, TX, USA:ACM, 2011:27-38.
[9] CHENG Yang, QI Zhao. How to set and manage your network password:A multidimensional scheme of password reuse[C]//Conference on e-Business, e-Services and e-Society. Berlin:Springer, 2014:264-276.
[10] Das A, Bonneau J, Caesar M, et al. The tangled web of password reuse[C]//Network and Distributed System Security Symposium. San Diego, CA, USA:The Internet Society, 2014:23-26.
[11] Yang C, Hung J, Lin ZX. An analysis view on password patterns of Chinese Internet users[J]. Nankai Business Review International, 2013, 4(1):66-77.
[12] LI Zhigong, HAN Weili, XU Wenyuan. A large-scale empirical analysis of Chinese Web passwords[C]//The 23rd USENIX Conference on Security Symposium. San Diego, CA, USA:USENIX Security, 2014:559-574.
[1] WU Hao, NIU Fenglei. Machine learning model of radiation heat transfer in the high-temperature nuclear pebble bed[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(8): 1213-1218.
[2] DAI Xin, HUANG Hong, JI Xinyu, WANG Wei. Spatiotemporal rapid prediction model of urban rainstorm waterlogging based on machine learning[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(6): 865-873.
[3] REN Jianqiang, CUI Yapeng, NI Shunjiang. Prediction method of the pandemic trend of COVID-19 based on machine learning[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(6): 1003-1011.
[4] AN Jian, CHEN Yuxuan, SU Xingyu, ZHOU Hua, REN Zhuyin. Applications and prospects of machine learning in turbulent combustion and engines[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(4): 462-472.
[5] ZHAO Qiming, BI Kexin, QIU Tong. Comparison and integration of machine learning based ethylene cracking process models[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(9): 1450-1457.
[6] CAO Laicheng, LI Yuntao, WU Rong, GUO Xian, FENG Tao. Multi-key privacy protection decision tree evaluation scheme[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(5): 862-870.
[7] WANG Haojie, MA Zixuan, ZHENG Liyan, WANG Yuanwei, WANG Fei, ZHAI Jidong. Efficient memory allocator for the New Generation Sunway supercomputer[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(5): 943-951.
[8] LU Sicong, LI Chunwen. Human-machine conversation system for chatting based on scene and topic[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(5): 952-958.
[9] LI Wei, LI Chenglong, YANG Jiahai. As-Stream: An intelligent operator parallelization strategy for fluctuating data streams[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(12): 1851-1863.
[10] LIU Qiangmo, HE Xu, ZHOU Baishun, WU Haolin, ZHANG Chi, QIN Yu, SHEN Xiaomei, GAO Xiaorong. Simple and high performance classification model for autism based on machine learning and pupillary response[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(10): 1730-1738.
[11] MA Xiaoyue, MENG Xiao. Image position and layout effects of multi-image tweets from the perspective of user engagement[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(1): 77-87.
[12] TANG Zhili, WANG Xue, XU Qianjun. Rockburst prediction based on oversampling and objective weighting method[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(6): 543-555.
[13] WANG Zhiguo, ZHANG Yujin. Anomaly detection in surveillance videos: A survey[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(6): 518-529.
[14] SONG Yubo, QI Xinyu, HUANG Qiang, HU Aiqun, YANG Junjie. Two-stage multi-classification algorithm for Internet of Things equipment identification[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(5): 365-370.
[15] LU Xiaofeng, JIANG Fangshuo, ZHOU Xiao, CUI Baojiang, YI Shengwei, SHA Jing. API based sequence and statistical features in a combined malware detection architecture[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(5): 500-508.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd