An Overview of Identity Deception Approaches and Its Effects

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-25 Number-3
Year of Publication : 2015
Authors : Ms. M. Preensta Ebenazer, Dr. P. Sumathi
DOI :  10.14445/22312803/IJCTT-V25P124

MLA

Ms. M. Preensta Ebenazer, Dr. P. Sumathi "An Overview of Identity Deception Approaches and Its Effects". International Journal of Computer Trends and Technology (IJCTT) V25(3):123-126, July 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Identity deception plays an important role in today’s real world environment where malicious activities have increased enormously. Identity deception needs to be identified in order to prevent malicious activities that are initiated by the attackers. There are various research works that have been conducted previously with a major focus on avoiding the involvement of fake users from creating chaos. The methodologies mentioned in the proceeding sections, follow various ways to identity deception process. Most of the research works emphasised on verbal behaviour of the user activities to predict identity deception while some of the works focussed on non verbal behaviour of the user activities to predict identity deception. Several methodologies have been analyzed to find the better and flexible mechanism which can perform identity deception process effectively. From the analysis it has been made evident that the non verbal behaviour based approach can find identity deceptions that are caused by fake users in a better way. The non verbal behaviour based methodologies have a high detection accuracy rate than verbal based behaviours.

References
[1] G. Alan Wang, Hsinchun Chen, Jennifer J. Xu, and Homa Atabakhsh “Automatically Detecting Criminal Identity Deception: An Adaptive Detection Algorithm”, IEEE Transactions On Systems, Man, And Cybernetics—Part A: Systems And Humans, Vol. 36, No. 5, September 2006
[2] Anna Squicciarini and Christopher Griffin, “An Informed Model of Personal Information Release in Social Networking Sites”, arXiv:1206.0981v1 [cs.SI] 5 Jun 2012
[3] Chuan Peng, Kuai Xu, Feng Wang and Haiyan Wang, “Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks”, in Proceedings of International Conference on Distributed Computing Systems (ICDCS), Vol. 2, October 2013
[4] Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis and Evangelos P. Markatos, “Detecting Social Network Profile Cloning”, 3rd IEEE International Workshop on Security and Social Networking (SESOC), March 2011
[5] Michail Tsikerdekis and Sherali Zeadally, “Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behaviour”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 8, August 2014
[6] T.Priyanka, ?Key Players Identification in Social Network for Preventing Private Key Players Identification in Social Network for Preventing Private, International Journal of Computer Trends and Technology (IJCTT) – volume 10 number 3 – Apr 2014
[7] Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, and Jay F, “Deception Detection through Automatic, Unobtrusive Analysis of Non verbal Behaviour”, IEEE Intelligent Systems, Vol. 20, No. 5, September 2005
[8] Qiang Cao, Michael Sirivianos and Xiaowei Yang Tiago Pregueiro, “Aiding the Detection of Fake Accounts in Large Scale Social Online Services”, In SIGCOMM Poster Session, April 2011.

Keywords
Identity Deception, Non verbal Behaviour and Fake Users