0% found this document useful (0 votes)
13 views1 page

All India

The document discusses the rise of security and privacy concerns in online social networks (OSNs), particularly the issue of duplicate user profiles created through identity theft. It outlines two methods for detecting cloned profiles: similarity measures and the C4.5 decision tree technique, focusing on network and attribute similarities. Additionally, it highlights the benefits of social networks in facilitating communication and interaction among users with shared interests.

Uploaded by

mamatha.pragada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views1 page

All India

The document discusses the rise of security and privacy concerns in online social networks (OSNs), particularly the issue of duplicate user profiles created through identity theft. It outlines two methods for detecting cloned profiles: similarity measures and the C4.5 decision tree technique, focusing on network and attribute similarities. Additionally, it highlights the benefits of social networks in facilitating communication and interaction among users with shared interests.

Uploaded by

mamatha.pragada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

ABSTRACT OSN's growing popularity is accompanied with a rise in security and privacy

concerns. One significant risk is the creation of duplicate user profiles through the theft of
existing user information, which is subsequently exploited to damage the original profile
owner's identity. Phony profiles are identified using a set of rules that can discern between
authentic and fraudulent ones. There are two methods for identifying Cloning a profile.
Similarity measures are used in one, and the C4.5 decision tree technique is used in the
other. The two categories of parallels that are considered in Similarity metrics include
network and attribute similarity. connections. Clone detection is done using C4.5. 1.
INTRODUCTION What Is a Social Network? "The building and verifying of online social
networks for communities of people who share interests and activities, or who are
interested in exploring the interests and activities of others, and which necessitates the use
of software," constitutes how Wikipedia defines a social network service. Networks
Members of an organization can benefit from a variety of social networks. Social networking
sites like Facebook, Mixi, and Myspace are primarily created to enable interaction between
users who share interests, attitudes, and activities. Professional networks can flourish
with the help of "Websites Social networking sites like Facebook, Mixi, and Myspace are
primarily created to enable interaction between users who share interests, attitudes, and
activities. social media platforms. Social interaction: Although it may give rise to ethical
dilemmas, the passive use of social media platforms can provide valuable business
information and feedback on institutional sites are defined in an OCLCreport. What Uses
Are Possible for Social services. Simple information and app access Typical interface:
One potential benefit of social networks is their capacity to facilitate communication across
boundaries, both social and professional. Users may be

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy