Prevention technique for creating fake profiles and accounts on websites

Authors

  • Macriga GA Department of Information Technology, Sri Sai Ram Engineering College

Keywords:

Social engineering, Unique Identity, Fake Profiles, Multiple accounts, Aadhar card

Abstract

At present, the social life of everyone has become associated with the online social networks. Also, every online business is linked to users through websites. Users are allowed to create separate personal or official accounts in order to access these websites. The rapid growth of these websites despite being advantageous, it also causes some serious issues. Problems such as fake profiles, online impersonation have become prone these days. The most important issue is that, the websites maintains separate servers with storage area for all the users. Creation of number of accounts by a single user leads to occupying extra storage space in those servers which causes wastage of storage resources. The fake profiles and online impersonation issues are becoming threat to several people like celebrities, businessmen and even to innocent general public. In order to restrict these problems, an idea is suggested to prove the uniqueness of users in these websites and restrict them to create limited number of accounts permitted by the website holders. Like Aadhar in India, most of the countries has unique id and has become mandate. This id’s has an advantage of giving uniqueness to every individual. The user’s Aadhar card/unique card can be scanned to generate a unique id. Using this unique id, the individuality of users in websites can be identified and a unique username and password can be given to each user. Whenever a user tries to create an account in a registered website, the user will be asked to prove uniqueness and hence can be restricted from creating multiple accounts more than the number of accounts allowed by the website.

References

T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS, volume 11, page 8, 2011.

C. Wagner, S. Mitter, C. K ̈orner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW, volume 12, 2012.

Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93–102. ACM, 2011.

Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. Who is tweeting on twitter: human, bot, or cyborg? In Proceedings of the 26th Annual

Computer Security Applications Conference, pages 21–30. ACM, 2010.

Estee Van Der Walt. T and Jan Eloff, Using Machine Learning to Detect Fake identities: Bots vs Human, Department of Computer Science, University of Pretoria, South Africa.

Downloads

Published

2024-02-26

How to Cite

Macriga G, A. (2024). Prevention technique for creating fake profiles and accounts on websites. COMPUSOFT: An International Journal of Advanced Computer Technology, 7(10), 2826–2830. Retrieved from https://ijact.in/index.php/j/article/view/445

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.