Mostrar el registro sencillo del ítem
Typing pattern analysis for fake profile detection in social Media
dc.contributor.author | Bhattasali, Tapalina | spa |
dc.contributor.author | Saeed, Khalid | spa |
dc.date.accessioned | 2021-11-03T14:23:36Z | |
dc.date.available | 2021-11-03T14:23:36Z | |
dc.date.issued | 2021-09-17 | |
dc.identifier.issn | 03029743 | spa |
dc.identifier.uri | https://hdl.handle.net/11323/8831 | spa |
dc.description.abstract | Nowadays, interaction with fake profiles of a genuine user in social media is a common problem. General users may not easily identify profiles created by fake users. Although various research works are going on all over the world to detect fake profiles in social media, focus of this paper is to remove additional efforts in detection procedure. Behavioral biometrics like typing pattern of users can be considered to classify genuine profile and fake profile without disrupting normal activities of the users. In this paper, DEEP_ID model is designed to detect fake profiles in Facebook like social media considering typing patterns like keystroke, mouse-click, and touch stroke. Proposed model can silently detect the profiles created by fake users when they type or click in social media from desktop, laptop, or touch devices. DEEP_ID model can also identify whether genuine profiles have been hacked by fake users or not in the middle of the session. The objective of proposed work is to demonstrate the hypothesis that user recognition algorithms applied to raw data can perform better if requirement for feature extraction can be avoided, which in turn can remove the problem of inappropriate attribute selection. Proposed DEEP_ID model is based on multi-view deep neural network, where network layers can learn data representation for user recognition based on raw data of typing pattern without feature selection and extraction. Proposed DEEP_ID model has achieved better results compared to traditional machine learning classifiers. It provides strong evidence that the stated hypothesis is valid. Evaluation results indicate that Deep_ID model is highly accurate in profile detection and efficient enough to perform fast detection. | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | eng | |
dc.publisher | Computer Information Systems and Industrial Management | spa |
dc.rights | CC0 1.0 Universal | spa |
dc.rights.uri | http://creativecommons.org/publicdomain/zero/1.0/ | spa |
dc.source | International Conference on Computer Information Systems and Industrial Management CISIM 2021 | spa |
dc.subject | typing pattern | spa |
dc.subject | keystroke | spa |
dc.subject | mouse click | spa |
dc.subject | touch stroke | spa |
dc.subject | fake profile | spa |
dc.subject | deep_ID | spa |
dc.subject | social media | spa |
dc.title | Typing pattern analysis for fake profile detection in social Media | spa |
dc.type | Capítulo - Parte de Libro | spa |
dc.source.url | https://link.springer.com/chapter/10.1007/978-3-030-84340-3_2 | spa |
dc.rights.accessrights | info:eu-repo/semantics/closedAccess | spa |
dc.identifier.doi | 10.1007/978-3-030-84340-3_2 | spa |
dc.identifier.instname | Corporación Universidad de la Costa | spa |
dc.identifier.reponame | REDICUC - Repositorio CUC | spa |
dc.identifier.repourl | https://repositorio.cuc.edu.co/ | spa |
dc.relation.references | Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527–1554 (2006) | spa |
dc.relation.references | Cruz, M.A.D.S., Goldschmidt, R.R.: Deep neural networks applied to user recognition based on keystroke dynamics: learning from raw data. In: Proceedings of the XV Brazilian Symposium on Information Systems. Article No.: 35, pp. 1–8 (2019) | spa |
dc.relation.references | Sun, L., Wang, Y., Cao, B., Yu, P.S., Srisa-an, W., Leow, A.D.: Sequential keystroke behavioral biometrics for mobile user identification via multi-view deep learning. In: Altun, Y., Das, K., Mielikäinen, T., Malerba, D., Stefanowski, J., Read, J., Žitnik, M., Ceci, M., Džeroski, S. (eds.) ECML PKDD 2017. LNCS (LNAI), vol. 10536, pp. 228–240. Springer, Cham (2017). https://ezproxy.cuc.edu.co:2067/10.1007/978-3-319-71273-4_19 | spa |
dc.relation.references | Zhong, Y., Deng, Y.: A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. In: Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, pp. 1–22 (2015) | spa |
dc.relation.references | Baynath, P., Soyjaudah, K.M S., Khan, M.H-M.: Implementation of a secure keystroke dynamics using ant colony optimization. In: Proceedings of International Conference on Communications, Computer Science and Information Technology (2016) | spa |
dc.relation.references | Liu, F., Deng, Y.: Determine the number of unknown targets in open world based on elbow method. IEEE Trans. Fuzzy Syst. 29(5), 986–995 (2021) | spa |
dc.relation.references | Lever, J., Krzywinski, M., Altman, N.: Points of Significance: principal component analysis. Nat. Methods 14(7), 641–642 (2017) | spa |
dc.relation.references | Sherstinsky, A.: Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D 404, 132306 (2020) | spa |
dc.relation.references | Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997) | spa |
dc.relation.references | Du, Y., Wang, W., Wang, L.: Hierarchical recurrent neural network for skeleton based action recognition. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1110–1118 (2015) | spa |
dc.relation.references | Obaidat, M.S., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man Cybern. B Cybern. 27(2), 261–269 (1997) | spa |
dc.relation.references | Zhao, X., Feng, T., Shi, W.: Continuous mobile authentication using a novel graphic touch gesture feature. In: Proceedings of IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6 (2013) | spa |
dc.relation.references | Abramson, M., Gore, S.: Associative patterns of web browsing behavior. In: AAAIFall Symposium Series (2013) | spa |
dc.relation.references | Zhang, H., Yan, Z., Yang, J., Tapia, E.M., Crandall, D.J.: Mfingerprint: privacy-preserving user modeling with multimodal mobile device footprints. In: Proceedings of International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, pp. 195–203. Springer, Cham (2014). https://ezproxy.cuc.edu.co:2067/10.1007/978-3-319-05579-4_24 | spa |
dc.relation.references | Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans, Cybern. 44(4), 458–472 (2014) | spa |
dc.relation.references | Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of IEEE/IFIP International Conference Dependable Systems & Networks, pp. 125–134 (2009) | spa |
dc.relation.references | Killourhy, K.S., Kevin, S., Maxion, R.A., Roy, A.: Free vs. transcribed text for keystroke-dynamics evaluations. In: Proceedings of Workshop: Learning from Authoritative Security Experiment Results, pp. 1–8 (2012) | spa |
dc.relation.references | Bhattasali, T., Saeed, K.: Two factor remote authentication in healthcare. In: Proceedings of IEEE International Conference on Advances in Computing, Communications and Informatics, pp. 380–381 (2014) | spa |
dc.relation.references | Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.: Bio-authentication for layered remote health monitor framework. J. Med. Inform. Technol. 23, 131–140 (2014) | spa |
dc.relation.references | Maxion, R., Killourhy, K.: Keystroke biometrics with number-pad input. In: Proceedings of IEEE International Conference on Dependable Systems & Networks, pp. 201–210 (2010) | spa |
dc.relation.references | Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Proceedings of Symposium on Usable Privacy and Security, pp. 187–198 (2014) | spa |
dc.relation.references | Feng, T., et al.: Continuous mobile authentication using touchscreen gestures. In: Proceedings of IEEE International Conference on Biometrics: Theory, Applications and Systems, pp. 451–456 (2013) | spa |
dc.relation.references | Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. In: IEEE Transactions on Information Forensics and Security, vol. 8, pp. 136–148 (2013) | spa |
dc.relation.references | Bhattasali, T., Panasiuk, P., Saeed, K., Chaki, N., Chaki, R.: Modular logic of authentication using dynamic keystroke pattern analysis”. In: Proceedings of ICNAAM, vol. 1738, p. 180012. AIP Publishing, American Institute of Physics (2016) | spa |
dc.relation.references | Bhattasali, T., Chaki, N., Saeed, K., Chaki, R.: U-stroke pattern modeling for end user identity verification through ubiquitous input device. In: Saeed, K., Homenda, W. (eds.) CISIM 2015. LNCS, vol. 9339, pp. 219–230. Springer, Cham (2015). | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_3248 | spa |
dc.type.content | Text | spa |
dc.type.driver | info:eu-repo/semantics/bookPart | spa |
dc.type.redcol | http://purl.org/redcol/resource_type/CAP_LIB | spa |
dc.type.version | info:eu-repo/semantics/acceptedVersion | spa |
dc.type.coarversion | http://purl.org/coar/version/c_ab4af688f83e57aa | spa |
dc.rights.coar | http://purl.org/coar/access_right/c_14cb | spa |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Artículos científicos [3120]
Artículos de investigación publicados por miembros de la comunidad universitaria.