Machine Learning Based Detection for Compromised Accounts on Social Media Networks

Authors

  • K. Swapna Vignan’s Institute of Management and Technology for Women, India
  • M. Rithika Vignan’s Institute of Management and Technology for Women, India
  • K. Rukmini Vignan’s Institute of Management and Technology for Women, India
  • S. Swachitha Vignan’s Institute of Management and Technology for Women, India
  • Y. Komali Vignan’s Institute of Management and Technology for Women, India

Keywords:

Online Social Networks, Cybercrime, Network Security

Abstract

The proliferation of social networking platforms has led to a corresponding increase in the frequency and sophistication of cyberattacks targeting user accounts. Compromised accounts can be used to spread misinformation, launch phishing attacks, and steal personal information. This paper presents a novel approach to detecting compromised accounts on social networks. Our method leverages a combination of behavioral and linguistic features to identify anomalous activity that may indicate account compromise. Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. Our experiments demonstrate the effectiveness of our approach in detecting compromised accounts with high precision and recall. Furthermore, we explore the potential of incorporating graph-based techniques to analyze the social network structure surrounding compromised accounts. By examining the relationships between compromised accounts and their associated nodes, we can identify potential propagation paths and take proactive measures to mitigate the spread of malicious activity

Downloads

Published

2025-07-04

How to Cite

Swapna, K., Rithika, M., Rukmini, K., Swachitha, S., & Komali, Y. (2025). Machine Learning Based Detection for Compromised Accounts on Social Media Networks. Journal of Data Science, 2025(1). Retrieved from https://iuojs.intimal.edu.my/index.php/jods/article/view/697