An Artificial Intelligence-based System for Detecting Meta Fake Profiles via Gradient Boosting and Multilayer Perception
Main Article Content
Abstract
The rise of metaverse platforms has renewed interest in detecting fake profiles, which pose a significant threat to digital ownership and asset transactions within these virtual environments. If digital ownership is not guaranteed, platforms risk missing the point of the metaverse. Current supervised learning techniques for fake profile detection often struggle to maintain acceptable accuracy and interpretability in practice. To address this problem, this study investigates the application of two machine learning models, multilayer perceptron and gradient boosted trees, for detecting fake profiles, with model evaluation performed via two Explainable AI (XAI) techniques, Local Interpretable Model-agnostic Explanations (LIME) and SHapley Additive exPlanations (SHAP). The algorithms were implemented and evaluated on a dataset of 1244 profiles (1043 real and 201 fake) with 12 attributes. The major finding is that both techniques perform well, but the gradient boosting model achieves a higher accuracy of 99.2% compared with the multilayer perceptron's accuracy of 98.4%. Furthermore, the LIME and SHAP analyses provide insights into the feature importance and decision-making processes of the models. These results suggest that gradient boosting, in conjunction with explainable AI methods, is a more accurate, interpretable, and representative solution for detecting fake profiles in real-world metaverse scenarios, contributing to the development of more secure and reliable digital ownership within these platforms.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] H. Ning et al., "A Survey on Metaverse: the State-of-the-art, Technologies, Applications, and Challenges," arXiv:2111.096732111.09673v1, Nov. 2021. [Online]. Available: https://arxiv.org/abs/2111.09673v1
[2] P. 'Asher' Rospigliosi, "Metaverse or Simulacra? Roblox, Minecraft, Meta and the turn to virtual reality for education, socialisation and work," Interactive Learning Environments, vol. 30, no. 1, pp. 1–3, 2022. [Online]. Available: https://doi.org/10.1080/10494820.2022.2022899
[3] E. Howcroft, "Virtual real estate plot sells for record $2.4 million," Reuters, Nov. 23, 2021. [Online]. Available: https://www.reuters.com/markets/currencies/virtual-real-estate-plot-sells-record-24-million-2021-11-23/
[4] S. Mansfield-Devine, "Hacking democracy: abusing the Internet for political gain," Network Security, vol. 2018, no. 10, pp. 15–19, 2018. [Online]. Available: https://doi.org/10.1016/S1353-4858(18)30102-8
[5] W. M. S. Yafooz, A.-H. M. Emara, and M. Lahby, "Detecting Fake News on COVID-19 Vaccine from YouTube Videos Using Advanced Machine Learning Approaches, " in Combating Fake News with Computational Intelligence Techniques, M. Lahby, A. S. K. Pathan, Y. Maleh, and W. M. S. Yafooz, Eds. Cham, Springer, 2021, vol. 1001, Studies in Computational Intelligence, pp. 421–435. [Online]. Available: https://doi.org/10.1007/978-3-030-90087-8_21
[6] K. J. Brakas and M. Alanezi, "Measuring the Extent of Cyberbullying Comments in Facebook Groups for Mosul University Students," Mesopotamian Journal of CyberSecurity, vol. 5, no. 2, pp. 337–348, 2025, doi: 10.58496/MJCS/2025/021.
[7] C. Nurik, "Men Are Scum': Self-Regulation, Hate Speech, and Gender-Based Censorship on Facebook," International Journal of Communication, vol. 13, 2019. [Online]. Available: https://ijoc.org/index.php/ijoc/article/view/9608
[8] M. Conti, R. Poovendran, and M. Secchiero, "FakeBook: Detecting fake profiles in on-line social networks," in Proc. 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Istanbul, Turkey, 2012, pp. 1071–1078, doi: 10.1109/ASONAM.2012.185.
[9] R. V. Kotawadekar, A. S. Kamble, and S. A. Surve, "Automatic detection of fake profiles in online social networks," International Journal of Computer Sciences and Engineering, vol. 7, no. 7, pp. 40–45, 2019. [Online]. Available: https://doi.org/10.26438/ijcse/v7i7.4045
[10] A. Gupta and R. Kaushal, "Towards detecting fake user accounts in facebook," in Proc. 2017 ISEA Asia Security and Privacy (ISEASP), Surat, India, 2017, pp. 1–6, doi: 10.1109/ISEASP.2017.7976996.
[11] X. Wang, C.-M. Lai, Y.-C. Lin, C.-J. Hsieh, S. F. Wu and H. Cam, "Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs," in Proc. MILCOM 2018 - 2018 IEEE Military Communications Conf. (MILCOM), Los Angeles, CA, USA, 2018, pp. 1–9, doi: 10.1109/MILCOM.2018.8599718.
[12] M. Albayati and A. Altamimi, "MDFP: A Machine Learning Model for Detecting Fake Facebook Profiles Using Supervised and Unsupervised Mining Techniques," International Journal of Simulation: Systems, Science & Technology, vol. 20, no. 1, 2020. [Online]. Available: https://doi.org/10.5013/IJSSST.a.20.01.11
[13] H. A. Al-Tameemi et al., "A Systematic Review of Metaverse Cybersecurity: Frameworks, Challenges, and Strategic Approaches in a Quantum-Driven Era," Mesopotamian Journal of CyberSecurity, vol. 5, no. 2, pp. 770–803, 2025, doi: 10.58496/MJCS/2025/045.
[14] G. Stringhini, C. Kruegel, and G. Vigna, "Detecting spammers on social networks," in Proc. 26th Annual Computer Security Applications Conf. (ACSAC '10). New York, NY, USA: ACM, 2010, pp. 1–9. [Online]. Available: https://doi.org/10.1145/1920261.1920263
[15] K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, "Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse," in Proceedings of the 22nd USENIX Security Symposium, USENIX Association, Washington, DC, USA, 2013, pp. 195–210. [Online]. Available: https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/thomas
[16] M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, "Detecting suspicious following behavior in multimillion-node social networks," in Proc. 23rd International Conference on World Wide Web (WWW ’14 Companion), New York, NY, USA:ACM, 2014, pp. 305–306. [Online]. Available: https://doi.org/10.1145/2567948.2577306
[17] M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, "Catching synchronized behaviors in large networks: A graph mining approach," ACM Transactions on Knowledge Discovery from Data, vol. 10, no. 4, 2016. [Online]. Available: http://dx.doi.org/10.1145/2746403
[18] C. Xiao, D. M. Freeman, and T. Hwa, "Detecting clusters of fake accounts in online social networks, " in Proc. 8th ACM Workshop on Artificial Intelligence and Security (AISec '15), New York, NY, USA:ACM, 2015, pp. 91–102. [Online]. Available: https://doi.org/10.1145/2808769.2808779
[19] A. Elazab, A. M. Idrees, M. A. Mahmoud, and H. Hefny, "Fake accounts detection in twitter based on minimum weighted feature," in Proc. 18th International Conference on Document Analysis and Recognition (ICDAR), Johannesburg, South Africa, 2016. [Online]. Available:http://www.fayoum.edu.eg/English/ComputersInformation/InformationSystems/pdf/DrNesreen2.pdf
[20] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai, "Uncovering social network sybils in the wild," ACM Transactions on Knowledge Discovery from Data, vol. 8, no. 1, pp. 1–29, 2014. [Online]. Available: https://doi.org/10.1145/2556609
[21] S. Adikari and K. Dutta, "Identifying fake profiles in LinkedIn," arXiv:2006.0138, 2020. [Online]. Available: https://arxiv.org/abs/2006.01381
[22] G. Kontaxis, I. Polakis, S. Ioannidis, and E. P. Markatos, "Detecting social network profile cloning," in Proc. International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Seattle, WA, USA, 2011, pp. 295–300, doi: 10.1109/PERCOMW.2011.5766886
[23] A. Shah, S. Varshney, and M. Mehrotra, "Detection of fake profiles on online social network platforms: Performance evaluation of artificial intelligence techniques," SN Computer Science, vol. 5, 2024. [Online]. Available: https://doi.org/10.1007/s42979-024-02839-9
[24] H. Ali, I. Malik, S. Mahmood, F. Akif and J. Amin, "Sybil Detection in Online Social Networks," in Proc. 2022 17th International Conference on Emerging Technologies (ICET), Swabi, Pakistan, 2022, pp. 125–129, doi: 10.1109/ICET56601.2022.10004683
[25] M. Mahapatra, N. Gupta, R. Kushwaha, and G. Singal, "Data breach in social networks using machine learning,"Advanced Computing, Garg, D., Jagannathan, S., Gupta, A., Garg, L., Gupta, S. Eds. Cham: Springer, 2021, vol. 1528, Communications in Computer and Information Science, pp. 660–670. [Online]. Available: https://doi.org/10.1007/978-3-030-95502-1_50
[26] S. R. Sahoo and B. B. Gupta, "Fake profile detection in multimedia big data on online social networks," International Journal of Information and Computer Security, vol. 12, no. 2-3, pp. 303–331, 2020. [Online]. Available: https://doi.org/10.1504/ijics.2020.105181
[27] S. Shehnepoor, R. Togneri, W. Liu, and M. Bennamoun, "Social Fraud Detection Review: Methods, challenges and analysis," arXiv:2111.05645, 2021. [Online]. Available: https://arxiv.org/abs/2111.05645
[28] H. Taherdoost, "Enhancing Social Media Platforms with Machine Learning Algorithms and Neural Networks," Algorithms, vol. 16, no. 6, Art. no. 271, 2023. [Online]. Available: https://doi.org/10.3390/a16060271
[29] M. Chakraborty, S. Das, and R. Mamidi, "Detection of fake users in SMPs using NLP and graph embeddings," arXiv:2104.13094, 2021. [Online]. Available: http://arxiv.org/pdf/2104.13094.pdf
[30] J. Ezarfelix, N. Jeffrey, and N. Sari, "A Systematic Literature Review: Instagram Fake Account Detection Based on Machine Learning", Engineering, MAthematics and Computer Science Journal (EMACS), vol. 4, no. 1, pp. 25–31, 2022. [Online]. Available: https://doi.org/10.21512/emacsjournal.v4i1.8076
[31] K. Shu, "Combating Disinformation on Social Media and Its Challenges: A Computational Perspective", in Proc. AAAI Conference on Artificial Intelligence, vol. 37, no. 13, p. 15454, 2024. [Online]. Available: https://doi.org/10.1609/aaai.v37i13.26821
[32] Y. Liu, Z. Boukouvalas, and N. Japkowicz, "A semi-supervised framework for misinformation detection," in Discovery Science. DS 2021, Soares, C., Torgo, L. Eds. Cham: Springer, 2021, vol. 12986, Lecture Notes in Computer Science, pp. 57–66. [Online]. Available: https://doi.org/10.1007/978-3-030-88942-5_5
[33] M. Fire, D. Kagan, A. Elyashar, and Y. Elovici, "Friend or foe? Fake profile identification in online social networks," Social Network Analysis and Mining, vol. 4, Art. no. 194, 2014. [Online]. Available: https://doi.org/10.1007/s13278-014-0194-4
[34] A. Nazir, S. Raza, C.-N. Chuah, and B. Schipper, "Ghostbusting Facebook: Detecting and Characterizing Phantom Profiles in Online Social Gaming Applications," in Proc. 3rd Workshop on Online Social Networks (WOSN 2010), Boston, MA, USA, 2010. [Online]. Available: https://www.usenix.org/conference/wosn-2010/ghostbusting-facebook-detecting-and-characterizing-phantom-profiles-online
[35] M. McCord and M. Chuah, "Spam detection on Twitter using traditional classifiers," in Autonomic and Trusted Computing (ATC 2011), Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y., Eds. Berlin: Springer, 2011, vol 6906, Lecture Notes in Computer Science. [Online]. Available: https://doi.org/10.1007/978-3-642-23496-5_13
[36] J. H. Hong, E. K. Yun, and S. B. Cho, "A Review of Performance Evaluation for Biometrics Systems," International Journal of Image and Graphics, vol. 5, no. 3, pp. 501–536, 2005. [Online]. Available: https://doi.org/10.1142/S0219467805001872