Ensuring Social Media Authenticity: Leveraging Machine Learning
Abstract
Identity fraud continues to be a major concern in contemporary online social networks. Research initiatives emphasize developing technologies to detect identity fraud; however, their effectiveness often depends on empirical validation. This study explores identity fraud detection through clustering and classification methods, aiming to overcome traditional methodological shortcomings and propose enhancements for practical application. Data is collected from social media accounts and processed through steps such as Natural Language Processing (NLP), vectorization, dimensionality reduction, and data normalization. Behavioural analysis and profile attributes are leveraged for feature extraction. Profiles are classified as genuine or fraudulent using clustering approaches, followed by deep learning classification on similar datasets.
References
2. Jupe, Louise Marie, AldertVrij, GalitNahari, Sharon Leal, and Samantha Ann Mann. The lies we live: Using the verifiability approach to detect lying about occupation., Journal of Articles in Support of the Null Hypothesis 13, no. 1 (2016): 1-13.
3. Li, Yixuan, Oscar Martinez, Xing Chen, Yi Li, and John E. Hopcroft. In a world that counts: Clustering and detecting fake social engagement at scale., In Proceedings of the 25th International Conference on World Wide Web, pp. 111-120. International World Wide Web Conferences Steering Committee, 2016.
4. Tuna, Tayfun, EsraAkbas, Ahmet Aksoy, Muhammed Abdullah Canbaz, UmitKarabiyik, Bilal Gonen, and RamazanAygun.,User characterization for online social networks. ,Social Network Analysis and Mining 6, no. 1 (2016): 104.
5. Galan-Garcia, Patxi, Jose Gaviria de la Puerta, Carlos Laorden Gomez, Igor Santos, and Pablo GarcíaBringas. Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying. Logic Journal of the IGPL 24, no. 1 (2016): 42-53.
6. Stanton, Kasey, Stephanie Ellickson-Larew, and David Watson. Development and validation of a measure of online deception and intimacy., Personality and Individual Differences 88 (2016): 187-196.
7. Kim, Jihyun, and Howon Kim., Classification performance using gated recurrent unit recurrent neural network on energy disaggregation., In 2016 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 1, pp. 105-110. IEEE, 2016.
8. Zhang, Yong, MengJooEr, RajasekarVenkatesan, Ning Wang, and MahardhikaPratama. Sentiment classification using comprehensive attention recurrent models., In 2016 International joint conference on neural networks (IJCNN), pp. 1562-1569. IEEE, 2016.
9. Peddinti, Sai Teja, Keith W. Ross, and Justin Cappos. Mining Anonymity: Identifying Sensitive Accounts on Twitter.,arXiv preprint arXiv:1702.00164 (2017).
10. Dimpas, Philogene Kyle, Royce Vincent Po, and Mary Jane Sabellano. Filipino and english clickbait detection using a long short-term memory recurrent neural network., In 2017 International Conference on Asian Language Processing (IALP), pp. 276-280. IEEE, 2017.
11. Rajesh Purohit Bharat SampatraoBorkar ,Identification of Fake vs. Real Identities on Social Media using Random Forest and Deep Convolutional Neural Network, in International Journal of Engineering and Advanced Technology, Issue-1 7347-7351 IJEAT 2019
12. B.PanduRanga Raju, B.Vijaya Lakshmi, C.V.Lakshmi Narayana, Detection of Multi-Class Website URLs Using Machine Learning Algorithms, International Journal of Advanced Trends in Computer Science and Engineering, pp. 1704-1712 ,Volume 9, No.2, 2020.
Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties and that the Article has not been published elsewhere. Author(s) agree to the terms that the IJO Journal will have the full right to remove the published article on any misconduct found in the published article.