×
Home Current Archive Editorial board
News Contact
Review paper

FAKE SOCIAL MEDIA ACCOUNT AND DETECTION

By
Rajeswari Mukesh Orcid logo ,
Rajeswari Mukesh

SRM Institute of Science and Technology , Chennai , India

R. Deeptha Orcid logo ,
R. Deeptha

SRM Institute of Science and Technology , Chennai , India

G. Rajalakshmi Orcid logo ,
G. Rajalakshmi

SRM Institute of Science and Technology , Chennai , India

P. Santhosh Kumar* Orcid logo ,
P. Santhosh Kumar*

SRM Institute of Science and Technology , Chennai , India

S. Yusuf Shafiq Raja Orcid logo ,
S. Yusuf Shafiq Raja

SRM Institute of Science and Technology , Chennai , India

S. Keerthi Raj Orcid logo ,
S. Keerthi Raj

SRM Institute of Science and Technology , Chennai , India

G. Manoj Orcid logo
G. Manoj

SRM Institute of Science and Technology , Chennai , India

Abstract

Impersonation social media accounts have been a major issue, leading to disinformation, identity thefts, and cyber scams. Rule-based traditional techniques which have been employed for the identification of scam accounts have failed to work because they are unable to cope with the evolving fraud patterns. A machine learning-based Fake ID detection system has been presented to address the problem, utilizing a Random Forest Classifier to identify real or fake social media accounts. The process involves the evaluation of 11 significant features derived from user profiles, including username patterns, bio information, privacy settings, and account activity measures. A React frontend has been utilized to facilitate profile data entry, which is classified in real time by a Flask backend through RESTful APIs. The system implemented here attained an impressive accuracy of 91% and can be utilized as a powerful tool for the detection of spurious accounts. Future developments include the integration of image recognition with deep learning, cross-platform support, and the implementation of privacy-preserving techniques such as federated learning.

References

1.
Ferrara E, Varol O, Davis C, Menczer F, Flammini A. The rise of social bots. Communications of the ACM. 2016;59(7):96–104.
2.
Alwajid AFK. The Impact of Accounting Disclosure through Social Media on Reducing Information Gap: A Field Study in Companies on the Iraqi Stock Exchange. International Academic Journal of Social Sciences. 2023;10(1):37–48.
3.
Chu Z, Gianvecchio S, Wang H, Jajodia S. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? IEEE Transactions on Dependable and Secure Computing. 2012;9(6):811–24.
4.
Ammi M. Cyber Threat Hunting Case Study using MISP. Journal of Internet Services and Information Security. 2023;13(2):1–29.
5.
Alarifi A, Alsaleh M, Al-Salman A. Twitter turing test: Identifying social machines. Information Sciences. 2016;372:332–46.
6.
Alsbatin L, Alrifai BM, Zawaideh F, Alawneh TA. Advancing IoMT Security: Machine Learning-Based Detection and Classification of Multi-Protocol Cyberattacks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2025;16(2):228–47.
7.
Breiman L. Random forests. Machine learning. 2001;(1):5–32.
8.
Seyedan A, Soroushpour S, Gholamrezazadeh S. Family and its changes in cyberspace and the explanation of its future perspectives in the communication era. Int Acad J Organ Behav Hum Resour Manag. 2023;(2):1–6.
9.
Danesh M, Emadi M. Cell phones social networking software applications: Factors and features. International Academic Journal of Innovative Research. 2014;(2):1–5.
10.
Nennuri R, Yadav M, Shara B, Kumar G, Shivani M. Fake account detection using machine learning and data science. Annals of the Romanian Society for Cell Biology. 2021;(6):6857–65.
11.
Amiri M, Akkasi A. Assessing security challenges in online social networks. International Academic Journal of Science and Engineering. 2015;(4):1–1.

Citation

This is an open access article distributed under the  Creative Commons Attribution Non-Commercial License (CC BY-NC) License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Article metrics

Google scholar: See link

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.