SRS (Vedant Io)
SRS (Vedant Io)
SRS (Vedant Io)
(SRS) Document
Fake Social Media Profile Detection and Reporting System
1. Introduction....................................................................................
1.1 Purpose
1.2 Scope
1.4 References
1.5 Overview
2.4 Constraints
4. System Features
5.2 Capacity
5.3 Dynamic
5.4 Requirements
5.5 Quality
3.6.1 Reliability
3.6.2 Availability
3.6.3 Security
3.6.4 Maintainability
6. Other Requirements.....................................................................
Appendix A: Glossary
7. Conclusion…………….
1. Introduction
1.1 Purpose
1.2 Scope
The Fake Social Media Profile Detection and Reporting System will be a web-based
application accessible to users who want to verify the authenticity of social media
profiles and report potential fake accounts. The system will use advanced algorithms
and techniques to identify suspicious patterns and behaviors associated with fake
profiles on popular social media platforms.
1.4 References
https://www.scirp.org/journal/paperinformation.aspx?paperid=120727
https://ieeexplore.ieee.org/document/10150753
https://dl.acm.org/doi/abs/10.1504/IJICS.2020.105181
1.5 Overview
n this project, we came up with a framework with which automatic detection of fake
profiles is possible and is efficient. This framework uses classification techniques like
Support Vector Machine, Nave Bayes and Decision trees to classify the profiles into
fake or genuine classes.2
2. System Overview
The Fake Social Media Profile Detection and Reporting System will be developed as a
web application. Users can input the URL or username of a social media profile they
find suspicious, and the system will analyse the profile to determine its authenticity.
The system will employ machine learning algorithms, natural language processing,
and pattern recognition techniques to identify fake profiles.
2.2 Users
Regular Users: Individuals who want to verify the authenticity of social media
profiles.
Administrators: System administrators responsible for managing user accounts,
reviewing reported profiles, and maintaining the system.
3. Functional Requirements
Requirement 3.2.1: Users can enter the URL or username of a social media profile to
initiate the fake profile detection process.
Requirement 3.2.2: The system will analyse the profile's content, activity, and
interactions using machine learning algorithms to determine if it is fake.
Requirement 3.2.3: The system will provide a confidence score or classification
indicating the likelihood that the profile is fake.
Requirement 3.3.1: Users can report profiles identified as fake by the system.
Requirement 3.3.2: Users must provide a reason for reporting the profile, such as
suspicious activity or false information.
Requirement 3.3.3: Reported profiles will be flagged for review by administrators.
4. System Features
Detecting and reporting fake profiles on online platforms involves various system
features and functionalities to ensure the authenticity and security of user
interactions. Here are some key system features for fake profile detection and
reporting:
By integrating these features, online platforms can create a safer and more authentic
environment for their users, reducing the prevalence of fake profiles and enhancing
overall user trust and satisfaction.
1. Behavioural Biometrics:
Implement behavioural biometrics, such as mouse movement patterns and
typing behaviour, to distinguish between human users and automated bots.
2. Device Fingerprinting:
Utilize device fingerprinting techniques to recognize and track devices used
for account creation and login, helping identify suspicious activities across
multiple accounts.
3. Two-Factor Authentication (2FA):
Offer two-factor authentication methods, such as SMS codes, email
verification, or authenticator apps, to add an extra layer of security for user
accounts.
4. User Reputation System:
Develop a reputation system where users are rated based on their behavior,
reliability, and the accuracy of their reports. High-reputation users can have
their reports prioritized.
5. Machine Learning Anomaly Detection:
Train machine learning models to detect anomalous patterns in user behavior,
helping identify fake profiles based on deviations from normal user activity.
6. Social Media Integration:
Integrate with users' social media accounts to cross-verify profile information
and connections, making it more difficult for fake profiles to impersonate real
individuals.
7. Real-time Chat Analysis:
Implement real-time analysis of chat conversations to identify suspicious
language, phishing attempts, or other scam-related content in private
messages.
8. Community Voting System:
Allow the community to vote on the authenticity of profiles or reported
content. Collective voting can help in the decision-making process regarding
suspicious accounts.
9. Deep fake Detection:
Integrate deep fake detection algorithms to identify manipulated images or
videos, which are commonly used in fake profiles.
10. Scam Pattern Recognition:
Develop algorithms that recognize common scam patterns and techniques
used by fake profiles, improving the system's ability to detect new, evolving
scams.
11. User Feedback Loop:
Establish a feedback loop where users can provide feedback on the
effectiveness of the platform's fake profile detection mechanisms, allowing
continuous improvements.
12. Collaboration with Cybersecurity Experts:
Collaborate with cybersecurity experts and researchers to stay updated on the
latest fraud tactics and implement cutting-edge detection methods.
5. Non-Functional Requirements
4.1 Performance
Requirement 4.1.1: The system must handle a minimum of 1000 concurrent users
without significant performance degradation.
Requirement 4.1.2: Fake profile detection should take no longer than 10 seconds
per profile.
4.2 Security
Requirement 4.2.1: User passwords must be securely hashed and stored.
Requirement 4.2.2: Communication between the client and the server must be
encrypted using HTTPS.
4.3 Usability
Requirement 4.3.1: The user interface must be intuitive and easy to navigate,
ensuring a seamless experience for users.
4.4 Maintainability
6. Other Requirements:
In the context of developing a fake profile detection and reporting system, the
"Other Requirements" section encompasses specific criteria, constraints, and
conditions that are integral to the success of the project. These requirements go
beyond the core functionalities and technical aspects of the system, focusing on
various essential elements.
Appendix A: Glossary:
A visual representation outlining the steps users take to identify and report a fake
profile within the system. This diagram illustrates the user journey, from recognizing
suspicious activity to submitting a detailed report, guiding developers and
stakeholders on the system's user interactions.
These appendices and additional requirements ensure that the fake profile detection
and reporting system is not only technically robust but also user-friendly, legally
compliant, and secure, meeting the needs of both users and regulatory standards.
7. Conclusion
The Fake Social Media Profile Detection and Reporting System outlined in this
document will provide users with a reliable tool to identify and report fake profiles
on social media platforms. By implementing advanced algorithms and user-friendly
interfaces, the system aims to enhance online safety and trust in social media
interactions.
(22070393)