Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 30 tok/s
Gemini 2.5 Pro 46 tok/s Pro
GPT-5 Medium 18 tok/s Pro
GPT-5 High 12 tok/s Pro
GPT-4o 91 tok/s Pro
Kimi K2 184 tok/s Pro
GPT OSS 120B 462 tok/s Pro
Claude Sonnet 4 36 tok/s Pro
2000 character limit reached

A sneak into the Devil's Colony - Fake Profiles in Online Social Networks (1705.09929v2)

Published 28 May 2017 in cs.SI

Abstract: Online Social Networks (OSNs) play an important role for internet users to carry out their daily activities like content sharing, news reading, posting messages, product reviews and discussing events etc. At the same time, various kinds of spammers are also equally attracted towards these OSNs. These cyber criminals including sexual predators, online fraudsters, advertising campaigners, catfishes, and social bots etc. exploit the network of trust by various means especially by creating fake profiles to spread their content and carry out scams. All these malicious identities are very harmful for both the users as well as the service providers. From the OSN service provider point of view, fake profiles affect the overall reputation of the network in addition to the loss of bandwidth. To spot out these malicious users, huge manpower effort and more sophisticated automated methods are needed. In this paper, various types of OSN threat generators like compromised profiles, cloned profiles and online bots (spam bots, social bots, like bots and influential bots) have been classified. An attempt is made to present several categories of features that have been used to train classifiers in order to identify a fake profile. Different data crawling approaches along with some existing data sources for fake profile detection have been identified. A refresher on existing cyber laws to curb social media based cyber crimes with their limitations is also presented.

Citations (16)
List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.