Abstract
Online Social Networks (OSN) such as Facebook, Instagram, Twitter, and others have seen rapid growth in recent years. Such applications provide attractive online social networks and communications with the opportunity to connect with relatives and acquaintances, meet new people, enter communities, talk, exchange photos, organize events, and network with others who are close to real-life; unfortunately, on the other hand, they also raise privacy and security issues. We identified OSN threats in this paper and recommended a digital face-processing authentication method as a double-factor authentication after entering the password using Matlab. After applying deep learning classification by attending to a real dataset from the live webcam to train the model, we achieved the best accuracy rate of 95%. However, such methods have yet to be deployed to all social networks, so we also mentioned the problem of fake accounts, which is one of the most significant problems in OSN. These are effective tools for executing spam campaigns and spreading malware and phishing attacks. Fake accounts could lead to the loss of money for businesses, loss of reputation, stealing information for malicious purposes, and much more. This study is related to detecting fake and legitimate profiles on OSN. For this purpose, we chose two datasets that contain fake and legitimate accounts on Facebook and Instagram. Each contains different features after applying machine learning using Naive Bayes, Logistic Regression, Support Vector Machines, K-Nearest Neighbour, Boosted Tree, Neural Networks, SVM Kernal, and Logistec Regression Kernal. SVM achieved the highest classification accuracy for the Fake Profiles detection datasets with 97.1%.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data Availability
Data is available from the authors upon reasonable request.
References
Abualigah L, Alfar HE, Shehab M, Hussein AMA (2020) Sentiment analysis in healthcare: a brief review. Recent Adv NLP Case Arabic Lang:129–141
Abualigah L, Diabat A (2022) Chaotic binary reptile search algorithm and its feature selection applications. J Ambient Intell Humanized Comput:1–17
Abualigah L, Kareem NK, Omari M, Elaziz MA, Gandomi AH (2021) Survey on twitter sentiment analysis: architecture, classifications, and challenges. In: Deep learning approaches for spoken and natural language processing. Springer, pp 1–18
Abushanap SA, Abdalla AM, Tamimi AA, Alzu’bi S (2021) A survey of human face recognition for partial face view. In: 2021 International conference on information technology (ICIT), IEEE, pp 571–576
Abusukhon A, AlZu’bi S (2020) New direction of cryptography: a review on text-to-image encryption algorithms based on rgb color value. In: 2020 Seventh international conference on software defined systems (SDS), IEEE, pp 235–239
Al Hasib A (2009) Threats of online social networks. IJCSNS Int J Comput Sci Netw Security 9(11):288–93
Al-Arjan A, Rasmi M, AlZu’bi S, et al. (2021) Intelligent security in the era of ai: the key vulnerability of rc4 algorithm. In: 2021 International conference on information technology (ICIT), IEEE, pp 691–694
Al-Zu’bi S, Hawashin B, Mughaid A, Baker T (2021) Efficient 3d medical image segmentation algorithm over a secured multimedia network. Multimed Tools Appl 80(11):16887–16905
AlZu’bi S, Abu Zitar R, Hawashin B, Abu Shanab S, Zraiqat A, Mughaid A, Almotairi KH, Abualigah L (2022) A novel deep learning technique for detecting emotional impact in online education. Electronics 11(18):2964
AlZu’bi S, Alsmadiv A, AlQatawneh S, Al-Ayyoub M, Hawashin B, Jararweh Y (2019) A brief analysis of amazon online reviews. In: 2019 Sixth international conference on social networks analysis, management and security (SNAMS). IEEE, pp 555–560
AlZu’bi S, Alsmirat M, Al-Ayyoub M, Jararweh Y (2019) Artificial intelligence enabling water desalination sustainability optimization. In: 2019 7th International renewable and sustainable energy conference (IRSEC), IEEE, pp 1–4
AlZu’bi S, Aqel D, Lafi M (2022) An intelligent system for blood donation process optimization-smart techniques for minimizing blood wastages. Clust Comput:1–11
AlZu’bi S, Aqel D, Mughaid A, Jararweh Y (2019) A multi-levels geo-location based crawling method for social media platforms. In: 2019 Sixth international conference on social networks analysis, management and security (SNAMS), IEEE, pp 494–498
AlZu’bi S, Hawashin B, EIBes M, Al-Ayyoub M (2018) A novel recommender system based on apriori algorithm for requirements engineering. In: 2018 Fifth international conference on social networks analysis, management and security (snams). IEEE, pp 323–327
AlZu’bi S, Hawashin B, Mujahed M, Jararweh Y, Gupta BB (2019) An efficient employment of internet of multimedia things in smart and future agriculture. Multimed Tools Appl 78(20):29581–29605
AlZu’bi S, Shehab M, Al-Ayyoub M, Jararweh Y, Gupta B (2020) Parallel implementation for 3d medical volume fuzzy segmentation. Pattern Recogn Lett 130:312–318
Ala’M A-Z, Alqatawna J, Paris H (2017) Spam profile detection in social networks based on public features. In: 2017 8th International conference on information and communication systems (ICICS). IEEE, pp 130–135
Albayati M, Altamimi A (2019) Mdfp: a machine learning model for detecting fake facebook profiles using supervised and unsupervised mining techniques. Int J Simulation Syst Sci Technol 20(1):1–10
Albayati MB, Altamimi AM (2019) Identifying fake facebook profiles using data mining techniques. J ICT Res Appl, vol 13(2)
Alghamdi B, Watson J, Xu Y (2016) Toward detecting malicious links in online social networks through user behavior. In: 2016 IEEE/WIC/ACM international conference on web intelligence workshops (WIW). IEEE, pp 5–8
Ali A, Zhu Y, Chen Q, Yu J, Cai H (2019) Leveraging spatio-temporal patterns for predicting citywide traffic crowd flows using deep hybrid neural networks. In: 2019 IEEE 25th international conference on parallel and distributed systems (ICPADS), IEEE, pp 125–132
Ali A, Zhu Y, Zakarya M (2021) Exploiting dynamic spatio-temporal correlations for citywide traffic flow prediction using attention based neural networks. Inf Sci 577:852–870
Ali A, Zhu Y, Zakarya M (2021) A data aggregation based approach to exploit dynamic spatio-temporal correlations for citywide crowd flows prediction in fog computing. Multimed Tools Appl 80(20):31401–31433
Ali A, Zhu Y, Zakarya M (2022) Exploiting dynamic spatio-temporal graph convolutional neural networks for citywide traffic flows prediction. Neural networks 145:233–247
Alia MA, Hnaif AA, Al-Anie HK, Maria KA, Manasrah AM, Sarwar MI (2011) A novel header matching algorithm for intrusion detection systems, arXiv:1108.1417
Alia MA, Maria KA, Alsarayreh MA, Maria EA, Almanasra S (2019) An improved video steganography: using random key-dependent. In: 2019 IEEE Jordan international joint conference on electrical engineering and information technology (JEEIT), IEEE, pp 234–237
Alkhatib AA, Abu Maria K, Alzu’bi S, Abu Maria E (2022) Novel system for road traffic optimisation in large cities. IET Smart Cities
Alkhatib AA, Alsabbagh A, Maraqa R, Alzubi S (2021) Load balancing techniques in cloud computing: extensive review. Adv Sci Technol Eng Syst J 6(2):860–870
Alzu’bi S, Jararweh Y (2020) Data fusion in autonomous vehicles research, literature tracing from imaginary idea to smart surrounding community. In: 2020 Fifth international conference on fog and mobile edge computing (FMEC), IEEE, pp 306–311
Alzubi S, Hawashin B, Mughaid A, Jararweh Y (2020) Whats trending? an efficient trending research topics extractor and recommender. In: 2020 11th International conference on information and communication systems (ICICS), IEEE, pp 191–196
Aqel D, Al-Zubi S, Mughaid A, Jararweh Y (2022) Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. Clust Comput 25(3):2007–2020
Avidan S, Butman M (2006) Blind vision. In: European conference on computer vision. Springer, pp 1–13
Aydin I, Mehmet S, Salur MU (2018) Detection of fake twitter accounts with machine learning algorithms. In: 2018 International conference on artificial intelligence and data processing (IDAP), IEEE, pp 1–4
Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web, pp 551–560
Elbes M, Kanan T, Alia M, Ziad M (2022) Covd-19 detection platform from x-ray images using deep learning. Int J Adv Soft Comput Appl, vol 14(1)
Fire M, Goldschmidt R, Elovici Y (2014) Online social networks: threats and solutions. IEEE Commun Surveys Tutorials 16(4):2019–2036
Fire M, Katz G, Elovici Y (2012) Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies. Human J 1(1):26–39
Gross R, Sweeney L (2007) Towards real-world face de-identification. In: 2007 First IEEE international conference on biometrics: theory, applications, and systems. IEEE, pp 1–8
Humphreys L (2007) Mobile social networks and social practice: a case study of dodgeball. J Comput-Mediated Commun 13(1):341–360
Hussein F, Mughaid A, AlZu’bi S, El-Salhi SM, Abuhaija B, Abualigah L, Gandomi AH (2022) Hybrid clahe-cnn deep neural networks for classifying lung diseases from x-ray acquisitions. Electronics 11(19):3075
Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S (2015) Face/off: preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 781–792
Jia J, Wang B, Gong NZ (2017) Random walk based fake account detection in online social networks. In: 2017 47th Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 273–284
Aydin I, Mehmet SEVİ, Salur MU (2022) Detection of fake twitter accounts with machine learning algorithms. In: 2018 International Conference on Artificial Intelligence and Data Processing (IDAP) (pp. 1–4). IEEE
Liu Y, Gummadi KP, Krishnamurthy B, Mislove A (2011) Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, pp 61–70
Mislove A, Viswanath B, Gummadi KP, Druschel P (2010) You are who you know: inferring user profiles in online social networks. In: Proceedings of the third ACM international conference on Web search and data mining, pp 251–260
Mughaid A, Al-Zu’bi S, Al Arjan A, Al-Amrat R, Alajmi R, Zitar RA, Abualigah L (2022) An intelligent cybersecurity system for detecting fake news in social media websites. Soft Comput 26(12):5577–5591
Mughaid A, AlZu’bi S, Alnajjar A, AbuElsoud E, Salhi SE, Igried B, Abualigah L (2022) Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches. Multimed Tools Appl:1–23
Muhairat M, ALZu’bi S, Hawashin B, Elbes M, Al-Ayyoub M (2020) An intelligent recommender system based on association rule analysis for requirement engineering. J Univ Comput Sci 26(1):33–49
Newton EM, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 17(2):232–243
O’Leary J (2013) Getting started with login verification. Twitter Blogs
Obeidat I, Mughaid A, Alzoubi S (2016) A secure encrypted protocol for clients’ handshaking in the same network. Int J Interactive Mobile Technol (iJIM)
Otair M, Ibrahim OT, Abualigah L, Altalhi M, Sumari P (2022) An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks. Wirel Netw 28(2):721–744
Pallis G, Zeinalipour-Yazti D, Dikaiakos MD (2011) Online social networks: status and trends. New Direct Web Data Manag 1:213–234
Ramadan R, Alqatawneh S, Ahalaiqa F, Abdel-Qader I, Aldahoud A, AlZoubi S (2019) The utilization of whatsapp to determine the obsessive-compulsive disorder (ocd): a preliminary study. In: 2019 Sixth international conference on social networks analysis, management and security (SNAMS), IEEE, pp 561–564
Raturi R (2018) Machine learning implementation for identifying fake accounts in social network. Int J Pure Appl Math 118(20):4785–4797
Reddy V, Kolli N, Balakrishnan N (2021) Malware detection and classification using community detection and social network analysis. J Comput Virology Hacking Tech:1–14
Safaldin M, Otair M, Abualigah L (2021) Improved binary gray wolf optimizer and svm for intrusion detection system in wireless sensor networks. J Ambient Intelligence Humanized Comput 12(2):1559–1576
Sahoo SR, Gupta BB (2019) Classification of various attacks and their defence mechanism in online social networks: a survey. Enterprise Inf Syst 13 (6):832–864
Siddiqui S, Khan MS, Ferens K, Kinsner W (2016) Detecting advanced persistent threats using fractal dimension based machine learning classification. In: Proceedings of the 2016 ACM on international workshop on security and privacy analytics, pp 64–69
Song A (2011) Introducing login approvals. Tersedia: https://www.facebook.com/notes/facebook-engineering/introducinglogin-approvals/10150172618258920https://www.facebook.com/notes/facebook-engineering/introducinglogin-approvals/10150172618258920. Accessed 1 Jan 2021
Stein T, Chen E, Mangla K (2011) Facebook immune system. In: Proceedings of the 4th workshop on social network systems, pp 1–8
Sushama C, Kumar MS, Neelima P (2021) Privacy and security issues in the future: a social media. Materials today: proceedings
Williams EJ, Hinds J, Joinson AN (2018) Exploring susceptibility to phishing in the workplace. Int J Human-Comput Studies 120:1–13
Zhang Z, Gupta BB (2018) Social media security and trustworthiness: overview and new direction. Futur Gener Comput Syst 86:914–925
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethics approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Conflict of Interests
The authors declare that there is no conflict of interest regarding the publication of this paper.
Additional information
Informed consent
Informed consent was obtained from all individual participants included in the study.
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Mughaid, A., Obeidat, I., AlZu’bi, S. et al. A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks. Multimed Tools Appl 82, 26353–26378 (2023). https://doi.org/10.1007/s11042-023-14347-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-14347-8