Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{143511, author = {Nitin Arun Khandare and Jaihind D. Mungle and Shadaf J. Warunkar and Vishal V. shinde}, title = {IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {2}, number = {11}, pages = {272-277}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=143511}, abstract = {Now Days online social networks such as Face book, Twitter, Google+, LinkedIn, have become extremely popular all over the world and play a significant role in people’s daily lives. Due to open and anonymous nature of social sites the vulnerabilities on this social network are increasing, such as fake users also called as Sybil users. These kinds of malicious users can fabricate many dummy identities to target systems. So here we proposed a system. Which is a scalable defense system, which leverages user level activities such as friend acceptance, rejection? In this survey, our aim to give a comprehensive review of research related to user behavior in OSNs from several perspectives. First, we discuss social connectivity and interaction among users, Acceptance and rejections ratio are also important for that. Also, we investigate traffic activity from a network perspective.}, keywords = {SMSD,OSN,VSL }, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry