The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


In Loco Identity Fraud Detection Model Using Statistical Analysis for Social Networking Sites: A Case Study with Facebook

Rapid advancement in internet has made many Social Networking Sites (SNS) popular among a huge population, as various SNS accounts are interlinked with each other, spread of stored susceptible information of an individual is increasing. That has led to various security and privacy issues; one of them is impersonation or identity fraud. Identity fraud is the outcome of illegitimate or secret use of account owner’s identity to invade his/her account to track personal information. There are possibilities that known persons like parents, spouse, close friends, siblings who are interested in knowing what is going on in the account owner’s online life may check their personal SNS accounts. Hence an individual’s private SNS accounts can be invaded by an illegitimate user secretly without the knowledge of the account owner’s which results in compromise of private information. Thus, this paper proposes an in loco identity fraud detection strategy that employs a statistical analysis approach to constantly authenticate the authorized user, which outperforms the previously known technique. This strategy may be used to prevent stalkers from penetrating a person's SNS account in real time. The accuracy attained in this research is greater than 90% after 1 minute and greater than 95% after 5 minutes of observation.

[1] Alruily M., “Issues of Dialectal Saudi Twitter Corpus,” The International Arab Journal of Information Technology, vol. 17, no. 3, pp. 367- 374, 2020.

[2] Benevenuto F., Rodrigues T., Cha M., and Almeida V., “Characterizing user Behavior in Online Social Networks,” in Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, Chicago Illinois USA, pp. 49-62, 2009.

[3] Cann B. and Ross A., “Relating ROC and CMC Curves via the Biometric Menagerie,” in Proceedings of the 6th IEEE International Conference on Biometrics: Theory, Applications and Systems, Washington, 2013.

[4] Chaudhary A., Mittal H., Arora A., “Anomaly Detection using Graph Neural Networks,” in Proceedings of the International Conference on Machine Learning, Big Data, Cloud and Parallel Computing, Faridabad, pp. 346-350, 2019.

[5] Concepcin-Snchez J., Molina-Gil J., Caballero- Gil P., and Santos-Gonzlez I., “Fuzzy Logic System for Identity Theft Detection in Social Networks,” in Proceedings of the 4th International Conference on Big Data Innovations and Applications IEEE Computer Society, Barcelona, pp. 65-70, 2018. In Loco Identity Fraud Detection Model using Statistical Analysis for Social Networking ... 291

[6] Constine J., “Facebook Asks Every User for a Verified Phone Number to Prevent Security Disaster,” http://techcrunch. com/2012/06/14/facebook-security-tips/, Last Visited, 2021.

[7] Constine J., “Facebook has Users Identify Friends in Photos to Verify Accounts, Prevent Unauthorized” http://www. inside facebook. com/2010/07/26/facebook-photos-verify/, Last Visited, 2021.

[8] Daribay A., Obaidat S., and Krishna P., “Analysis of Authentication System Based on Keystroke Dynamics,” in Proceedings of the International Conference on Computer Information and Telecommunication Systems, Beijing, pp. 1-6, 2019.

[9] Egele M., Stringhini G., Kruegel C., and Vigna C., “COMPA: Detecting Compromised Accounts on Social Networks,” in Proceedings of the Symposium Network and Distributed System Security, San Diego, pp. 83-91, 2013.

[10] Facebook Removal of Offline-Access Permission http://developers.facebook.com/roadmap/offlinea ccess removal/, Last Visited, 2021.

[11] Gitte V. Hendrik B., “On Estimating Model Accuracy with Repeated Cross-Validation,” in Proceedings of the 21st Belgian-Dutch Conference on Machine Learning, Ghent, pp. 39-44, 2012.

[12] Hastie T., Tibshirani R., Friedman J., Elements of Statistical Learning: Data Minuteing, Inference, and Prediction, Springer, 2019.

[13] https://www.facebook.com/help/2353532535059 47, Last Visited, 2021.

[14] Hu X., Zhang X., and Lovrich N., “Forecasting Identity Theft Victims: Analyzing Characteristics and Preventive Actions through Machine Learning Approaches,” An International Journal of Evidence-based Research, Policy, and Practice, vol. 16, no. 4, pp. 465-494, 2020.

[15] Liu Z., Wang Y., Dontcheva M., Hoffman M., Walker S., and Wilson A., “Patterns and Sequences: Interactive Exploration of Clickstreams to Understand Common Visitor Paths,” IEEE Transactions on Visualization and Computer Graphics, vol. 23, no. 1, pp. 321330, 2017.

[16] Lu L., Dunham M., and Meng Y., “Mining Significant Usage Patterns from Clickstream Data,” in Proceedings of the 7th International Conference on Knowledge Discovery on the Web: Advances in Web Mining and Web Usage Analysis WebKDD05, Chicago, pp. 1-17, 2005.

[17] Mah P., “Stored Passwords Add to Mobile Security Risks” http://www. It business edge. com/cm/blogs/ mah/stored passwords-add-to- mobile-security-risks/?s=47183, Last Visited, 2021.

[18] McLachlan G., Do K., Ambroise C., Analyzing Microarray Gene Expression Data, Wiley, 2004.

[19] Montgomery A., Li S., Srinivasan K., and Liechty J., “Modeling Online Browsing and Path Analysis Using Clickstream Data,” Marketing Science, vol. 23, no. 4, pp. 579595, 2004.

[20] Morales A., Ferrez J., Tolosana R., Garcia J., Galbally J, Barrero M., Anjos A., and Marcel S., “Keystroke Biometrics Ongoing Competition,” IEEE Access, vol. 4, pp. 7736-7746, 2016.

[21] Nuakoh E., and Anwar M., “Detecting Impersonation in Social Network Sites (SNS) Using Artificial Immune Systems (AIS), SoutheastCon, St. Petersburg, 2018.

[22] Park Y., OHare N., Schifanella R., Jaimes A., and Chung C., “A Large-Scale Study of User Image Search Behavior on The Web,” in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems CHI, Seoul, pp. 985-994, 2015.

[23] Peacock A., Ke X., and Wilkerson M., “Typing patterns: A Key to User Identification,” IEEE Security Privacy, vol. 2, no. 5, pp. 40-47, 2004.

[24] Prabhakar S. and Shankaraiah., “Multimodal Biometric Decision Fusion Security Technique to Evade Immoral Social Networking Sites for Minors,” Applied Intelligence, vol. 53, no. 2, May 2022.

[25] Raja M. and Raj L., “Detection of Malicious Profles and Protecting Users in Online Social Networks” Wireless Personal Communications, vol. 127, pp. 107-124, 2021.

[26] Senecal S., Kalczynski P., and Nantel J., “Consumers Decision- Making Process and Their Online Shopping Behavior: A Clickstream Analysis,” Journal of Business Research, vol. 58, no. 11, pp. 1599-1608, 2005.

[27] Technologies C Phone Data Makes 4. 2 Million Brits Vulnerable to Id Theft

[Online]. Available: http://www. credant. com/news-a-events/press- releases/69-phone- data-makes-42-million- britsvulnerable-to-id-theft. html, Last Visited, 2021.

[28] Tsikerdekis M., “Identity Deception Prevention using Common Contribution Network Data,” Ieee Transaction on Information Forensics and Security, vol. 14, no. 8, 2015.

[29] Varol O., Ferrara E., Davis C., Menczer F., and Flamminutei A., “Online Human-Bot Interactions: Detection, Estimation, and Characterization,” Proceedings of the International AAAI Conference on Web and Social Media, Montreal, pp. 280-289, 2017.

[30] Verma P., Agrawal P., Madaan V., and Gupta C., “UCred: Fusion of Machine Learning and Deep Learning Methods for user Credibility on Social Media,” Social Network Analysis and Mining, vol. 12, no. 54, 2022. 292 The International Arab Journal of Information Technology, Vol. 20, No. 2, March 2023

[31] Walt E. and Eloff J., “Using Machine Learning to Detect Fake Identities: Bots Vs Humans,” IEEE Access, vol. 6, pp. 6540 -6549, 2016.

[32] Wang G., Konolige T., Wilson C., Wang X., Zheng H., and Zhao B., “You Are How You Click: Clickstream Analysis for Sybil Detection,” in Proceedings of the 22Nd Usenix Conference on Security SEC13 Usenix Association Washington, pp. 241-256, 2013.

[33] Wang G., Zhang X., Tang S., Zheng H., and Zhao B., “Unsupervised Clickstream Clustering for User Behavior Analysis,” in Proceedings of the CHI Conference on Human Factors in Computing Systems, San Jose California, pp. 225-236, 2016.

[34] Wu S., Chou M., Tseng C., Lee Y., and Chen K., “Detecting in Situ Identity Fraud on Social Network Services: A Case Study with Facebook,” IEEE Systems Journal, vol. 11, no. 4, pp. 2432- 2442, 2017.

[35] Yu R., Lost Cellphones Added up Fast in 2011 http://usatoday30.usatoday.com/tech/news/story/ 2012-322/lost-phones/53707448/1, Last Visited, 2021.

[36] Zhao T., Hu M., Rahimi R., and King I., “It’s About Time! Modeling Customer Behaviors as the Secretary Problem in Daily Deal Websites,” in Proceedings of the International Joint Conference on Neural Networks, Anchorage, pp. 36703679, 2017.