Authors :
Krotha Karunya; Lingireddy Anuradha; Katta Ravindra; Sri. P. Rama Krishna
Volume/Issue :
Volume 10 - 2025, Issue 4 - April
Google Scholar :
https://tinyurl.com/2s42wwpy
Scribd :
https://tinyurl.com/42k6kb3f
DOI :
https://doi.org/10.38124/ijisrt/25apr2345
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The proliferation of online networks has contributed to a growing concern regarding the surge of fraudulent user profiles, which undermine online security and digital credibility. This study introduces a robust framework for identifying fake accounts by leveraging multimodal features derived from both textual content and numerical metadata. Initially, three deep learning architectures, Artificial Neural Network (ANN), Convolutional Neural Network (CNN), and Long Short-Term Memory (LSTM) networks, were developed and assessed for their classification capabilities. To improve detection performance, a Voting Classifier was employed, integrating XGBoost, Random Forest, and Gaussian Naive Bayes algorithms. The comparative results indicated that the ensemble model achieved superior performance across key evaluation metrics, including accuracy, precision, recall, and F1-score. By harnessing the complementary strengths of multiple models, the proposed method delivers a dependable solution for identifying deceptive accounts. This research contributes to enhancing the effectiveness of automated fake account detection and encourages further exploration of hybrid models using multimodal inputs.
References :
- U.Can and B. Alatas, “A new direction in social network analysis: Online social network analysis problems and applications,” Phys. A, Stat. Mech. Appl., vol. 535, Dec. 2019, Art. no. 122372.
- X. Chen, Y. Yuan, L. Lu, and J. Yang, “A multidimensional trust evaluation framework for online social networks based on machine learning,” IEEE Access, vol. 7, pp. 175499–175513, 2019.
- A. Bovet and H. A. Makse, “Influence of fake news in Twitter during the 2016 U.S. presidential election,” Nature Commun., vol. 10, no. 1, p. 7, Jan. 2019.
- B. Wang, N. Z. Gong, and H. Fu, “GANG: Detecting fraudulent users in online social networks via guilt-by-association on directed graphs,” in Proc. IEEE Int. Conf. Data Mining (ICDM), Nov. 2017, pp. 465–474.
- U. Arora, H. S. Dutta, B. Joshi, A. Chetan, and T. Chakraborty, “Analyzing and detecting collusive users involved in blackmarket retweeting activities,” ACM Trans. Intell. Syst. Technol., vol. 11, no. 3, pp. 1–24, Jun. 2020.
- Zhou W., Wen J., Gao M., Ren H., and Li P., “Detection of abnormal profiles based on time series and target item analysis in recommender systems,” Mathematical Problems in Engineering, vol. 2015, pp. 1–9, May 2015.
- W. Zeng, R. Tang, H. Wang, X. Chen, and W. Wang, “User identification based on integrating multiple user information across online social networks,” Secur. Commun. Netw., vol. 2021, pp. 1–14, May 2021.
- M.Mohammadrezaei, M. E. Shiri, and A. M. Rahmani, “Identifying fake accounts on social networks based on graph analysis and classification algorithms,” Secur. Commun. Netw., vol. 2018, pp. 1–8, Aug. 2018.
- Z. Yang, X. Chen, H. Wang, W. Wang, Z. Miao, and T. Jiang, “A new joint approach with temporal and profile information for social bot detection,” Secur. Commun. Netw., vol. 2022, pp. 1–14, May 2022.
- M. Siino, E. Di Nuovo, I. Tinnirello, and M. La Cascia, “Fake news spreaders detection: Sometimes attention is not all you need,” Information, vol. 13, no. 9, p. 426, Sep. 2022.
- F. Bertini, R. Sharma, and D. Montesi, “Are social networks watermarking us or are we (unawarely) watermarking ourself?” J. Imag., vol. 8, no. 5, p. 132, May 2022.
- M. Egele, G. Stringhini, C. Kruegel, and G. Vigna, “Towards detecting compromised accounts on social networks,” IEEE Trans. Depend. Secure Comput., vol. 14, no. 4, pp. 447–460, Jul. 2017.
- Z. Wu, G. Li, Q. Liu, G. Xu, and E. Chen, “Covering the sensitive subjects to protect personal privacy in personalized recommendation,” IEEE Trans. Services Comput., vol. 11, no. 3, pp. 493–506, May 2018.
- Z. Qu, C. Lyu, and C.-H. Chi, “MUSH: Multi-stimuli Hawkes process based Sybil attacker detector for user-review social networks,” IEEE Trans. Netw. Service Manage., vol. 19, no. 4, pp. 4600–4614, Dec. 2022.
- C. Lin, S. Chen, M. Zeng, S. Zhang, M. Gao, and H. Li, “Shilling blackbox recommender systems by learning to generate fake user profiles,” IEEE Trans. Neural Netw. Learn. Syst., early access, Jun.24,2022,doi:10.1109/TNNLS.2022.3183210.
- S. H. Moghaddam and M. Abbaspour, “Friendship preference: Scalable and robust category of features for social bot detection,” IEEE Trans. Depend. Secure Comput., vol. 20, no. 2, pp. 1516–1528, Mar. 2023.
- Bharti, N. S. G., & Gulia, P. (2023). "Investigating machine learning methods for detecting fake profiles in online social networks." International Journal of Electrical and Computer Engineering (IJECE), 13(3), 2962–2971.
- B. Ersahin, Ö. Aktas, D. Kilinç, and C. Akyol, “Twitter fake account detection,” in Proc. Int. Conf. Comput. Sci. Eng. (UBMK), Oct. 2017, pp. 388–392.
- K. K. Bharti and S. Pandey, “Fake account detection in Twitter using logistic regression with particle swarm optimization,” Soft Comput., vol. 25, no. 16, pp. 11333–11345, Aug. 2021.
- B. S. Borkar, D. R. Patil, A. V. Markad, and M. Sharma, “Real or fake identity deception of social media accounts using recurrent neural network,” in Proc. Int. Conf. 4th Ind. Revolution Based Technol. Practices (ICFIRTP), Nov. 2022, pp. 80–84.
- J. Roesslein. (2009). Tweepy Documentation. [Online]. Available: http://tweepy.readthedocs.io/en/
- J. Xie et al., “Advanced dropout: A model-free methodology for Bayesian dropout optimization,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 44, no. 9, pp. 4605–4625, Sep. 2022.
- S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network training by reducing internal covariate shift,” in Proc. Int. Mach. Learn. (ICML), 2015, pp. 448–456.
The proliferation of online networks has contributed to a growing concern regarding the surge of fraudulent user profiles, which undermine online security and digital credibility. This study introduces a robust framework for identifying fake accounts by leveraging multimodal features derived from both textual content and numerical metadata. Initially, three deep learning architectures, Artificial Neural Network (ANN), Convolutional Neural Network (CNN), and Long Short-Term Memory (LSTM) networks, were developed and assessed for their classification capabilities. To improve detection performance, a Voting Classifier was employed, integrating XGBoost, Random Forest, and Gaussian Naive Bayes algorithms. The comparative results indicated that the ensemble model achieved superior performance across key evaluation metrics, including accuracy, precision, recall, and F1-score. By harnessing the complementary strengths of multiple models, the proposed method delivers a dependable solution for identifying deceptive accounts. This research contributes to enhancing the effectiveness of automated fake account detection and encourages further exploration of hybrid models using multimodal inputs.