A Heuristic Approach for Compromised Account Detection through Machine Learning

Dhanashree Desale, Prof. Prema Desai


Now-a-days the Online Social Network has become the day-to-day term. Almost everybody has the OSN account. With the increasing use of OSNs, the activity of spammers has also increased. Attackers compromise the legitimate users accounts to spread spam messages. Previously techniques like SybilRank, PCA, COMPA, spam filtering, honeypots etc. tried
to detect compromised accounts on OSN, but the major disadvantage was that they were unable to detect attack at run-time. Online social behavior of users can be studied and analyzed in order to form the social behavior profiles for individual user. It will be very difficult as well as costly for an attacker to fully imitate the behavior of legitimate user and thus lead to a mismatch in behavior, which will significantly tell the difference between legitimate access and compromised access. This paper uses FCM clustering for classifying the behavior of each user. HMM is used for determining the hidden states in the profile
comparison state. This paper eventually studies many more aspects of user social behavior in order to come up with more accurate and fast detection of compromised accounts of OSN.

Full Text:



Barack Obamas tweets hacked. [Online] Available:


Russian Prime Minister’s Twitter Account Hacked. [Online] Available: http://www.effecthacking.com/2014/08/russian-prime-ministers-twitteraccount.html?m=0

Ruan, X., Wu, Z., wang, H., Jajodia, S. (2016). Profiling Online Social Behaviors for Compromised Account Detection. Information Forensics and Security, IEEE Transactions on, 11(1), 176-187.

F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida, Characterizing user behavior in online social networks, in Proc. 9th ACM SIGCOMM Conf. Internet Meas. Conf. (IMC), Chicago, IL, USA, 2009, pp. 4962.

Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, Aiding the detection of fake accounts in large scale social online services, in Proc. 9th USENIX Conf. Netw. Syst. Design Implement. (NSDI), San Jose, CA, USA, 2012, p. 15.

M. Egele, G. Stringhini, C. Kruegel, and G. Vigna, COMPA: Detecting compromised accounts on social networks, in Proc. Symp. Netw. Distrib. Syst. Secur. (NDSS), San Diego, CA, USA, 2013M. Young, The Technical Writers Handbook. Mill Valley, CA: University Science, 1989.

B. Viswanath et al., Towards detecting anomalous user behavior in online social networks, in Proc. 23rd USENIX Secur. Symp., San Diego, CA, USA, Aug. 2014, pp. 223238.


  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology