scispace - formally typeset
Proceedings ArticleDOI

Detection of Multiple Identity Manipulation in Collaborative Projects

TLDR
This article proposes a set of features that grows on previous literature to use in automatic data analysis in order to detect the Sockpuppets accounts created on EnWiki and compares several machine learning algorithms to show that the new features and training data enable to detect 99\% of fake accounts, improving previous results from the literature.
Abstract
Various techniques are used to manipulate users in OSN environments such as social spam, identity theft, spear phishing and Sybil attacks... In this article, we are interested in analyzing the behavior of multiple fake accounts that try to bypass the OSN regulation. In the context of social media manipulation detection, we focus on the special case of multiple Identity accounts (Sockpuppet) created on English Wikipedia (EnWiki). We set up a complete methodology spanning from the data extraction from EnWiki to the training and testing of our selected data using several machine learning algorithms. In our methodology we propose a set of features that grows on previous literature to use in automatic data analysis in order to detect the Sockpuppets accounts created on EnWiki. We apply them on a database of 10.000 user accounts. The results compare several machine learning algorithms to show that our new features and training data enable to detect 99\% of fake accounts, improving previous results from the literature.

read more

Citations
More filters
Proceedings ArticleDOI

An Army of Me: Sockpuppets in Online Discussion Communities

TL;DR: In this article, a taxonomy of deceptive behavior in online discussion communities is presented, and a data-driven view of deception is presented for the automatic detection of sockpuppets, i.e., whether they pretend to be different users or their supportiveness.
Journal ArticleDOI

Machine Learning: A Review on Binary Classification

TL;DR: This research synthesizes binary classification in which various approaches for binary classification are discussed and sockpuppet detection is based on binary.
Proceedings ArticleDOI

Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians

TL;DR: This qualitative study examines privacy practices and concerns among contributors to open collaboration projects and collected interview data from people who use the anonymity network Tor who also contribute to online projects and Wikipedia editors who are concerned about their privacy.
Proceedings ArticleDOI

An Army of Me: Sockpuppets in Online Discussion Communities

TL;DR: Sockpuppets differ from ordinary users in terms of their posting behavior, linguistic traits, as well as social network structure, and this analysis suggests a taxonomy of deceptive behavior in discussion communities.
Proceedings ArticleDOI

Antisocial Behavior on the Web: Characterization and Detection

TL;DR: This tutorial presents the state-of-the-art research spanning two aspects of antisocial behavior: characterization of their behavioral properties, and development of algorithms for identifying and predicting them.
References
More filters
Journal ArticleDOI

Random Forests

TL;DR: Internal estimates monitor error, strength, and correlation and these are used to show the response to increasing the number of features used in the forest, and are also applicable to regression.
Journal ArticleDOI

Support-Vector Networks

TL;DR: High generalization ability of support-vector networks utilizing polynomial input transformations is demonstrated and the performance of the support- vector network is compared to various classical learning algorithms that all took part in a benchmark study of Optical Character Recognition.
Journal ArticleDOI

A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting

TL;DR: The model studied can be interpreted as a broad, abstract extension of the well-studied on-line prediction model to a general decision-theoretic setting, and it is shown that the multiplicative weight-update Littlestone?Warmuth rule can be adapted to this model, yielding bounds that are slightly weaker in some cases, but applicable to a considerably more general class of learning problems.
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Journal ArticleDOI

An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression

TL;DR: Kernel and nearest-neighbor regression estimators are local versions of univariate location estimators, and so they can readily be introduced to beginning students and consulting clients who are familiar with such summaries as the sample mean and median.
Related Papers (5)