Enviar búsqueda
Cargar
IRJET- Identification of Clone Attacks in Social Networking Sites
•
0 recomendaciones
•
34 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V6/i7/IRJET-V6I7378.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 4
Descargar ahora
Descargar para leer sin conexión
Recomendados
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
Social networks protection against fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
Aboul Ella Hassanien
An iac approach for detecting profile cloning
An iac approach for detecting profile cloning
IJNSA Journal
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learning
Parvathi Sanil Nair
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
IJECEIAES
Recomendados
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
Social networks protection against fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
Aboul Ella Hassanien
An iac approach for detecting profile cloning
An iac approach for detecting profile cloning
IJNSA Journal
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learning
Parvathi Sanil Nair
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
IJECEIAES
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
Learning to detect phishing ur ls
Learning to detect phishing ur ls
eSAT Publishing House
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
ijcseit
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
ijistjournal
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
gerogepatton
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET Journal
762019109
762019109
IJRAT
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
IJNSA Journal
Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...
IJECEIAES
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
IJCNCJournal
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Cybersecurity Education and Research Centre
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
Automated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social Networks
Cybersecurity Education and Research Centre
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
ijaia
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET Journal
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
IJNSA Journal
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
CSEIJJournal
Más contenido relacionado
La actualidad más candente
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
Learning to detect phishing ur ls
Learning to detect phishing ur ls
eSAT Publishing House
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
ijcseit
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
ijistjournal
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
gerogepatton
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET Journal
762019109
762019109
IJRAT
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
IJNSA Journal
Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...
IJECEIAES
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
IJCNCJournal
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Cybersecurity Education and Research Centre
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
Automated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social Networks
Cybersecurity Education and Research Centre
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
ijaia
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET Journal
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
IJNSA Journal
La actualidad más candente
(19)
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
Learning to detect phishing ur ls
Learning to detect phishing ur ls
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
762019109
762019109
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
Automated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social Networks
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
Similar a IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
CSEIJJournal
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
CSEIJJournal
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET Journal
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IJITE
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
IRJET Journal
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
IRJET Journal
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET Journal
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET Journal
A07010105
A07010105
IJERD Editor
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
joyjonna282
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social Networks
IJNSA Journal
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
ijistjournal
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
IRJET Journal
Similar a IRJET- Identification of Clone Attacks in Social Networking Sites
(20)
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
A07010105
A07010105
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social Networks
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
tanu pandey
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
roncy bisnoi
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
mulugeta48
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Suman Jyoti
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
RagavanV2
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
Último
(20)
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
IRJET- Identification of Clone Attacks in Social Networking Sites
1.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 07 | JULY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3565 IDENTIFICATION OF CLONE ATTACKS IN SOCIAL NETWORKING SITES Nischitha G1, Mrs. Sheela N2 1M.tech Student Dept CS &E, JSS S &T U Mysuru. 2Assistant Professor Dept CS & E, JSS S&T U Mysuru. -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract- Social Networking Sites(SNS) is one of the most commonly used online platform by the people today, people use these applications to build a social relation and to stay connected with other user who shares the same interest, activity or real – life connection. Social Networking Sites have connected millions of people it is one the most popular internet activity today. Some of the popular Social Networking Sites are Facebook, Twitter, LinkedIn, Google Plus etc. As there are pros of these there are cons as well, as the people populate their online profile with a plethora of information that aims at offering a complete and correct information of themselves. Attackers use this information and form a fake account either in the same or different social networks and, therefore fool other users into forming trusting social relations with the faux profile. The Purpose of the paper is to identify the fake accounts and to compare different user activity algorithm in order to select the most appropriate. The proposed method address the problem by using two level of filtering, first level of filtering is done using Profile Matching using Fuzzy-sim algorithm, second level of filtering is User Activity Matching using three algorithms Predictive FP Growth Algorithm, Eclat, Apriori Algorithm and a comparative analysis is done to find most efficient algorithm among the FP growth, Eclat and Apriori. Keywords –online social network, social networking site, area of interest, social networking site 1, social networking site2 I. INTRODUCTION Social networking has ended up as everyday interest on the internet these days, the recognition of online social networking sites is getting higher every day due to the friendliness delivered in the websites and technological development.[1] Facebook has around 500 million users and suppressed Google, LinkedIn hosts profiles for more than 70 million individuals and 1 million for businesses. As the majority of customers are not acquainted with privateer issues, they frequently disclose a huge amount of private information‘s on their profiles that can be accessed by all the users in the network. [3] In profile cloning, where a person other than the legitimate owner of a profile creates a new profile in the same or other social networking site wherein he copies the information by means of doing so, he creates a fake profile impersonating the valid owner and invite the victim contacts to form a social link and may exchange messages, they establish a social link and they will have complete access to the other users private information’s. Users might also keep profiles in more than one social networking site, their contacts, especially the more distinct users have no way of knowing if a profile encountered in a social networking site has been created by the genuine user or not. A study [1] by Gross et al revealed that only 0.06%of the users hide visibility of information such as interests and relationship etc.. 99% twitter user had a default privacy setting. As online Social Networks consisting of Facebook and Google+ are getting progressively more embedded in people‘s daily lives, personal records turns into effortlessly uncovered and abused. Information harvesting, by the operator, malicious customers, and third party commercial business are being recognized as a great protection problem. The purpose of this project is to overcome this sort of attacks, the system uses two levels of filtering for identification of fake profiles the method considers two Social Networking Sites SNS1 and SNS2, it matches the user1 profile in SNS1 with user1 profile in SNS2. The method adapted uses two levels of filtering, first level is User’s Profile matching and the second level is User’s Activity Matching. Fuzzy Sim algorithm is used for profile matching and for User Activity matching three different algorithms are used they are predictive FP Growth algorithm which is modified from the original FP growth Algorithm, Eclat, Apriori algorithm are used and a comparative analysis is done to find the best suitable algorithm among the three for User Activity matching. Fig-1: System Design.
2.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 07 | JULY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3566 II. LITERATURE SURVEY People who intend to clone a profile could use different techniques able manual cloning automatic cloning using information from the victims homepage in addition information like profile photo first name last name extra are usually available publicly as default account setting this helps the attacker to have easy access to the user profile details, attacker use this details and create fake profiles. The most dangerous is automated profile cloning which could create many clone accounts and collect much more confidential information. The automated tool had to first break the CAPTCHA, it is an image containing hidden sequence of letters or digits, it’s a computer program or system used to distinguish human from machine input. Unfortunately, many SNS allows many attempt to enter the captcha, and there many tools used to break them making it less secure and inefficient. One of the method presented in [2] describes a solution for profile cloning in linkedIn the solution has three main components Information distiller, Profile Hunter, ProfileVerifier. Information distiller extract Key information from the current profile of the user, the profile should contain unique attributes for each specific user this information is used by the query to find the similar profile which may be a clone profile. Profile Hunter searches for the similar profile in different social networking sites finally profile verifier is presented with the suspicious profile details where similarity is calculated by comparing it with the predefined threshold, the fake profiles where identified . But the drawback of this method was it was applied only on one social network. Other solution described in [4] using similarity comparisons the attributes were compared with fixed threshold, if result was less than the fix threshold then the profile were classified as clone profile else as genuine profile .Different methods were also used for similarity comparison such as attribute similarity based profile cloning detection, attribute similarity, dice’s coefficient methods. IP tracking methods were also employed the drawback was attacker could use the IP spoofing a common technique to change the IP address. III. METHODOLOGY The proposed system performs cross site profile cloning for identification of fake user, the profile of user1 in SNS1 is compared with User1 profile in SNS2, fuzzy- sim is used for Profile Matching, and three unsupervised techniques are applied for User Activity Matching namely Predictive FP growth, Eclat, Apriori .Predictive FP Growth is modified from the original FP Growth algorithm and finally comparative analysis is performed to find the best suitable algorithm for user activity matching. The method designed for this paper is discussed below, experiment was done using custom made social networking sites. A. User activity matching User Profile Matching (Fuzzy Sim) Step 1: Scan the User (SNS1 and SNS2) Database and Extract the Constraints or Parameters. Retrieve user profile details such as first name, last name, school, college, hometown, city etc. Step 2: Calculate the Similarity.. Compare 2 user constraints, S (1,2)=No of Characters Matching/Total no of characters in Constraint . Step 3: set threshold value to consider the constraints If (value >0.5) Consider those constraints. Step 4: Check if (constraints matching count>min_rec) Set the number of constraints to match for fake account prediction - min_rec =8 constraints ◦ Genuine else ◦ Fake B. User Activity Matching Predictive FP Growth Step1: Retrieve shared information from the database (User1 — OSN1). The information shared by the user is used for identifying the users area of interest. Step2: Tokenization [keyword extraction method – removing the stop words and retrieving the keywords] Get the user1 messages, remove the stop words, extract the keywords. Step 3: Clustering the messages shared by the users (grouping of similar objects) The keywords are compared with the predefined dataset (the set of keywords) the messages are clustered into different content type. Step 4: Check if(matching count>min _ rec) [number of messages to compare] A user must share minimum number of messages, for identification of his activity pattern. Step 5: Retrieve shared information from the other database (User2 — OSN2). Trace a user (OSN2) the area of interest, using the following steps Step 6: Tokenization [keyword extraction method – removing the stop words and retrieving the keywords]
3.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 07 | JULY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3567 Step 7: Clustering the messages shared by the users. By comparing with the predefined dataset (the set of keywords) Step 8: Check if(matching count>min_rec) A user must share minimum number of messages, for identification of his activity pattern. Step 9: Compare the present user Area of interest (AOI) OSN1 with the previous user AOI OSN2. If (AOI Matches) • Genuine else • Fake. Eclat STEP 1: Scan the dataset and form a transaction Id(tid) list The result forms C1 (Candidate one item set) for each of the datasets. STEP 2: Generate L1 (Frequent one item set). L1 is generated from C1, compare candidate set item‘s support count with minimum support count if support _ count of candidate set items is less than min_support then remove those items the rest of them forms L1. STEP 3: C2 (Combination of two items sets) is formed using L1. Intersecting the tidlist of {a} with the tidlist of all the other item, which forms the tidlist as {a, b},{a, c},{a, d}….={a} conditional database. STEP 4: Repeat the steps To form C3(combination of three items sets), L3,C4,L4.. till C becomes null set, i.e. with only three item set present in L3, C4 cannot be formed C4 is combination of four item sets. STEP 5: To form the Frequent item set (L). L is a super set of L1, L2, L3. For each item in the frequent item set generate non-empty subsets. STEP 6: To generate confidence Confidence (X->Y) = Number of records contain X Number of record contain both X and Y for each non empty subset confidence is generated if the confidence generated is less than the minimum confidence then remove those item set, else consider those to form the pattern (Strong Association Rule) Apriori STEP 1: Scan the data set and determine the support(s) of each item. C1 (candidate set) the table contains the support count of each item present in dataset. STEP 2: Generate L1 (Frequent one item set). Each candidate set item‘s support count is compared with minimum support count. If the support_count Of candidate set items is less than min_support then remove those items the rest forms L1 STEP 3: To generate C2. C2 is generated using L1 called the join step, the condition for joining lk-1 is joined with lk-1 to generate set of candidate K STEP 4: L2 is generated from C2 Compare C2 support count with minimum support count if less, then remove those item this gives the item set L2 STEP 5: To generate C3,L3,C4,L4.. Repeat the step until C becomes the null set, i.e., with only three item sets present in L3 ,C4 cannot be formed as C4 is combination of four items set. STEP 6: Generate Frequent item set(L). Is generated using all L1,L2,L3..for each item in the frequent item set in L generate non-empty subsets. STEP 7: Generate Confidence Confidence (X->Y) = Number of records contain X Number of record contain both X and Y For all non empty subset confidence is generated if the confidence generated is less than the minimum confidence then remove those item set, else consider those to form the pattern (Strong AssociationRule). IV. EXPERIMENTAL RESULTS AND SCREENSHOTS Fig-2: Shows the execution time taken by each algorithm.
4.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 07 | JULY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3568 Predictive FP growth is the best suitable algorithm with least Execution time. The time taken by Predictive FP Growth algorithm is 181 milliseconds, Eclat takes 332 milliseconds, Apriori takes 633 milliseconds. The results prove predictive FP Growth is the best suitable algorithm for User Activity Matching. Fig- 3: Graphical representation of execution time. The figure shows the graph plotted for the execution time taken for each algorithm. The paper introduced the problem of colluding in Identity Clone Attack in OSNs. The solution applied has two levels of filtering, first an algorithm called Fuzzy-sim is used for the profile compassion. Second, algorithm called predictive FP Growth, Eclat, Apriori algorithms are used for pattern prediction of user activity. The Predictive FP Growth algorithm has few changes compared to the original FP growth Algorithm. Comparative analysis results prove, the best algorithm suitable algorithm for User Activity matching is the modified predictive FP Growth algorithm, next best is Eclat algorithm and then the Apriori Algorithm, the predictive FP Growth Algorithm takes the lest execution time among the three algorithm, then Eclat and Apriori with takes the maximum time for execution. Finally, the graph show the quality of the output of classifier. In future application could use some other algorithm which is more efficient than the algorithms used, and content classification can be applied on images and videos. VI. REFERENCES 1. Comparing the Performance of Frequent Pattern Mining Algorithms. Dr. Kanwal Garg Assistant Professor, Dept. of Computer Science and Applications, Kurukshetra University, Kurukshetra,Haryana,Deepak Kumar M.Tech Research Scholar, Dept.of Computer Science & Applications, Kurukshetra University, Kurukshetra, Haryana, India. 2. Detecting Social Network Profile Cloning. Markatos Institute of Computer Science Foundation for Research and Technology Hellas {kondax, polakis, sotiris, Markatos Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis and Evangelos P.. 3. Friend Recommendation Framework for Social. Networking Sites using User‘s Online BehaviorMd. Mehedi Hasan1, Noor Hussain Shaon 2, Ahmed Al Marouf 3, Md. Kamrul Hasan4, Hasan Mahmud5, and Md.Mohiuddin Khan6 Systems and Software Lab (SSL), Department of Computer Science and Engineering (CSE) Islamic University of Technology (IUT), Gazipur, Bangladesh{1shovon10, 2shaon007, 3samcit41, 4hasank, 5hasan, 6mohiuddin}@iut-dhaka.ed 4. Preventing Colluding Identity Clone Attacks in Online Social Networks. Georges A. Kamhoua1, Niki Pissinou1, S.S. Iyengar1, Jonathan Beltran1, Charles Kamhoua2, Brandon L Hernandez3, Laurent Njilla2, Alex Pissinou Makki4 1 School of Computing and Information Science, Florida International University, Miami, FL 33173 2 Air Force Research Lab, Cyber Assurance Branch 3 Computer Science, University of Texas at Rio Grande Valley, Brownsville, TX 78521 4Ransom Everglades School, Miami, FL 33133 {gkamh001, jbelt021, pissinou}@fiu.edu;{Charles.kamhoua.1,laurent.njilla}@u s.af.mil;iyengar@cis.fiu.edu; Brandon.l.hernandez01@utrgv.edu, 7amakki@randomeverglades.org 5. Profile Cloning Detection in Social Networks. Piotr Bródka, Mateusz SobasInstitute of Informatics Wrocaw University of Technology. V. CONCLUSIONS
Descargar ahora