Abstract: Social Media propagates many information, but everything that is distributed in facebook, twitter etc need to be trustful. Before accepting news from a recipient we need to know whether the information is from a friend or vulnerable persons. After sharing information which is private between user and his/her friend, and it has been made public by his/her own friend which is a great threat to the privacy o f the user, then a decision has to be made whether to make him/her continue has a friend or not. User vulnerability must be checked. The validity of a user is determined by how much a user is active in Online Social Network (OSN), so more active he is more vulnerable. Previous methodologies reveal that by measuring the visibility of a user in OSN, vulnerability check can be estimated. But exclusion of user behavior in measuring user visibility is a drawback in previous methodology which we are going to take into account in this paper
Keywords: User vulnerability, Visibility, User behavior, Information Provenance, Community.
[1] Altshler, Y.Elovici, A,B.Cremers, N.Aharony,and A.Pentland, "Security and Privacy in Social Networks" Springer NewYork, 2013.
[2] D.Irani, M.Balduzzi, D.Balzorotti, E.Kir da, and C.Pu, " Reverse Social Engineering Attacks in Online Social Networks" detection of intrusions and malware and vulnerability assessment, PP.55-74, 2011
[3] M.Conti, R.Poovendran, and, M.Secchiero, " Fake Book: Detecting Fake Profiles in Online Social Networks" Advanced in Social Network Analysis and Mining (ASONAM), 2012,IEEE/ACM International Conference on Pages, 1071-1078.
[4] A.Singh, A,H.Toderici, k.Ross, and M.Stamp, "Social Networking for Botnet Command and Control", MECS,I.J.Computer Network and Information Security,2013, 6,pp 11-17.
[5] A Kumar, S.K Guptha, A.K Rai, S Sinha, (2013), "Social Networking Sites and Their Security Issues", International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013