Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks

01/21/2018
by   Cheng Wang, et al.
0

In this work, we aim at building a bridge from poor behavioral data to an effective, quick-response, and robust behavior model for online identity theft detection. We concentrate on this issue in online social networks (OSNs) where users usually have composite behavioral records, consisting of multi-dimensional low-quality data, e.g., offline check-ins and online user generated content (UGC). As an insightful result, we find that there is a complementary effect among different dimensions of records for modeling users' behavioral patterns. To deeply exploit such a complementary effect, we propose a joint model to capture both online and offline features of a user's composite behavior. We evaluate the proposed joint model by comparing with some typical models on two real-world datasets: Foursquare and Yelp. In the widely-used setting of theft simulation (simulating thefts via behavioral replacement), the experimental results show that our model outperforms the existing ones, with the AUC values 0.956 in Foursquare and 0.947 in Yelp, respectively. Particularly, the recall (True Positive Rate) can reach up to 65.3% in Foursquare and 72.2% in Yelp with the corresponding disturbance rate (False Positive Rate) below 1%. It is worth mentioning that these performances can be achieved by examining only one composite behavior (visiting a place and posting a tip online simultaneously) per authentication, which guarantees the low response latency of our method. This study would give the cybersecurity community new insights into whether and how a real-time online identity authentication can be improved via modeling users' composite behavioral patterns.

READ FULL TEXT

page 2

page 8

page 9

research
03/17/2023

BotShape: A Novel Social Bots Detection Approach via Behavioral Patterns

An essential topic in online social network security is how to accuratel...
research
06/15/2020

BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems

Implicit authentication (IA) is gaining popularity over recent years due...
research
11/06/2019

A Latent Feelings-aware RNN Model for User Churn Prediction with Behavioral Data

Predicting user churn and taking personalized measures to retain users i...
research
08/15/2021

How we browse: Measurement and analysis of digital behavior

Accurately analyzing and modeling online browsing behavior play a key ro...
research
08/07/2019

From Crowdsourcing to Crowdmining: Using Implicit Human Intelligence for Better Understanding of Crowdsourced Data

With the development of mobile social networks, more and more crowdsourc...
research
03/05/2018

One-Class Adversarial Nets for Fraud Detection

Many online applications, such as online social networks or knowledge ba...
research
03/06/2020

Modeling User Behaviors in Machine Operation Tasks for Adaptive Guidance

An adaptive guidance system that supports equipment operators requires a...

Please sign up or login with your details

Forgot password? Click here to reset