False with the APT. Thus with the presence

False identities in the form of fake profiles on social media,malicious emailaccounts, forged websites and domain names are heavily used in the APT attack.With the help of these fake identities,the attacker builds a trust with the target,exploits the target by gathering its personal information and mounting a spearphishing attack,and other malicious activites. On the basis of number of resercheevidences,it has been proven that attacks like spear phishing relies on fake socialmedia profiles.The inextensible use of social media has lead to growth of suchattacks. These researches aim at detecting fake profiles ,by either analyzing thecharacteristics and the connections oriented by these accounts or bycoordinating multiple accounts together.The main drawback of these researches are their assumption that the attackers orthe real owners of fake social media profiles target a large group of people . WhileAPT conducts its detection on individual basis, or keeps a low profile to avoiddetection , the proposed detection techniques expect e.g. higher ratio acceptedfriend request which goes contrary with the APT. Thus with the presence of suchinvalid assumptions , it becomes easy for the attacker behind an APT to deceivedetection.However, some researches include detection techniques implied on one or fewaccounts which makes them applicable to APT cases. Egele et al.(2015) proposedthat by relying on anomaly detection and one-class classification, these worksdetect when the original user of a particular account has been corrupted. But itdoes have a drawback. This only works if the real account has been compromised,but fails to detect any fake account which was created for spams like spearphishing. The only effective solution is to spread awareness to detect such fakeprofiles among the users of social media . Further more, more researches arerequired to improvise the techniques involved in fake detection in APT that arecapable of detecting individual fake accounts having low activity profile.At the end, to conclude briefly, the aim and contribution of this paper consists ofthe literature review of current research with the aim at detecting fake accountson social networking sites from advanced persistent threat (APT) as discussed.