Title: A meta-heuristic learning approach for the non-intrusive detection of impersonation attacks in social networks

Authors: Esther Villar-Rodriguez; Javier Del Ser; Sergio Gil-Lopez; Miren Nekane Bilbao; Sancho Salcedo-Sanz

Addresses: OPTIMA Area, TECNALIA, 48170 Zamudio, Spain ' OPTIMA Area, TECNALIA, 48170 Zamudio, Spain ' OPTIMA Area, TECNALIA, 48170 Zamudio, Spain ' Department of Communications Engineering, University of the Basque Country UPV/EHU, 48013 Bilbao, Spain ' Department of Signal Theory and Communications, Universidad de Alcalá, 28871 Alcalá de Henares, Spain

Abstract: Cyber attacks have recently gained momentum in the research community as a sharply concerning phenomenon further ignited by the proliferation of social networks, which unfold a variety of ways for cybercriminals to access compromised information of their users. This paper gravitates on impersonation attacks, whose motivation may go beyond economic interests of the attacker towards getting unauthorised access to information and contacts, as often occurs between teenagers and early users of social platforms. This manuscript proposes a meta-heuristically optimised learning model as the algorithmic core of a non-intrusive detection system that relies exclusively on connection time features to detect evidences of an impersonation attack. The proposed scheme hinges on the K-Means clustering approach applied to a set of time features specially tailored to characterise the usage of users, which are weighted prior to the clustering under detection performance maximisation criteria. The obtained results shed light on the potentiality of the proposed methodology for its practical application to real social networks.

Keywords: impersonation; identity theft; social networks; K-Means; harmony search.

DOI: 10.1504/IJBIC.2017.085891

International Journal of Bio-Inspired Computation, 2017 Vol.10 No.2, pp.109 - 118

Received: 05 Dec 2014
Accepted: 26 May 2015

Published online: 18 Aug 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article