An Overview of Identity Deception Approaches and Its Effects
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2015 by IJCTT Journal|
|Year of Publication : 2015|
|Authors : Ms. M. Preensta Ebenazer, Dr. P. Sumathi|
|DOI : 10.14445/22312803/IJCTT-V25P124|
Ms. M. Preensta Ebenazer, Dr. P. Sumathi "An Overview of Identity Deception Approaches and Its Effects". International Journal of Computer Trends and Technology (IJCTT) V25(3):123-126, July 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Identity deception plays an important role in today’s real world environment where malicious activities have increased enormously. Identity deception needs to be identified in order to prevent malicious activities that are initiated by the attackers. There are various research works that have been conducted previously with a major focus on avoiding the involvement of fake users from creating chaos. The methodologies mentioned in the proceeding sections, follow various ways to identity deception process. Most of the research works emphasised on verbal behaviour of the user activities to predict identity deception while some of the works focussed on non verbal behaviour of the user activities to predict identity deception. Several methodologies have been analyzed to find the better and flexible mechanism which can perform identity deception process effectively. From the analysis it has been made evident that the non verbal behaviour based approach can find identity deceptions that are caused by fake users in a better way. The non verbal behaviour based methodologies have a high detection accuracy rate than verbal based behaviours.
 G. Alan Wang, Hsinchun Chen, Jennifer J. Xu, and Homa Atabakhsh “Automatically Detecting Criminal Identity Deception: An Adaptive Detection Algorithm”, IEEE Transactions On Systems, Man, And Cybernetics—Part A: Systems And Humans, Vol. 36, No. 5, September 2006
 Anna Squicciarini and Christopher Griffin, “An Informed Model of Personal Information Release in Social Networking Sites”, arXiv:1206.0981v1 [cs.SI] 5 Jun 2012
 Chuan Peng, Kuai Xu, Feng Wang and Haiyan Wang, “Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks”, in Proceedings of International Conference on Distributed Computing Systems (ICDCS), Vol. 2, October 2013
 Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis and Evangelos P. Markatos, “Detecting Social Network Profile Cloning”, 3rd IEEE International Workshop on Security and Social Networking (SESOC), March 2011
 Michail Tsikerdekis and Sherali Zeadally, “Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behaviour”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 8, August 2014
 T.Priyanka, ?Key Players Identification in Social Network for Preventing Private Key Players Identification in Social Network for Preventing Private, International Journal of Computer Trends and Technology (IJCTT) – volume 10 number 3 – Apr 2014
 Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, and Jay F, “Deception Detection through Automatic, Unobtrusive Analysis of Non verbal Behaviour”, IEEE Intelligent Systems, Vol. 20, No. 5, September 2005
 Qiang Cao, Michael Sirivianos and Xiaowei Yang Tiago Pregueiro, “Aiding the Detection of Fake Accounts in Large Scale Social Online Services”, In SIGCOMM Poster Session, April 2011.
Identity Deception, Non verbal Behaviour and Fake Users