Recognizing Vindictive Social Network Applications

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 05 | May -2017

p-ISSN: 2395-0072

www.irjet.net

Recognizing Vindictive Social Network Applications A.Raghava Rao, K.Sasank, P.Subash, K.C.Anu (Guide) SRM University,Chennai, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract - Online social networks (OSN’s) users are

party apps are the only reason for the publicity, popularity

attracted towards their platform by Third party applications.

and attractiveness of social networks. The new created

OSN’s let and support third-party apps to increase the user

application requests the social network to enter their

usage on these social networks. Third party applications are

platform, the social network investigates the app and what

divided into two types Trusted and Non – Trusted. Non-

permissions it is asking from user. If the requested

Trusted apps divide into two categories benign apps and

application is as per the OSN terms , it will furnish and

vindictive apps. Vindictive applications show harmful apps

generates the unique access token for that app or page to let

by giving fake advertisements like rewards, electronics as

their app used by users on their platform. The Third-part

gifts and make users redirect to their page, when users visits

application are categorized in two types Trusted and Non –

these pages it will collect the secured data of users by

Trusted. Trusted applications will collect the required user

providing fake login or URL’s. This fake login lets the hacker

needed for the app and stores it securely, where as a Non-

in your profile to spread or post spam to your online friends

Trusted Applications makes fake promises to the user,

through your profile. In this paper, we have taken Facebook

collects all the user personal data (email, phone number, age,

as OSN and developed TPAppE – Third-party Application

gender, friend’s names) and uses it to spread spam using

Evaluator which is the tool for detecting or recognizing

your profile. Non-Trusted apps divide into two categories

vindictive apps with high accuracy. We develop Third-Party

benign apps and vindictive apps. Vindictive apps will display

Application Evaluator to recognize user harmful apps using

fake ad’s like free rewards, phone, money etc. and targets

features using both demand and based on aggregation. To

user to show-up in their particular page, it recovers or

develop TPAppE, we include data assembled by watching the

collects the secured or personal data of user when the user

posting nature of 550K third-party applications in Facebook

visits their page by manipulating user to enter details in fake

used by 1.86 billion users. We used a suite of classifiers that

login . Using the details provided in fake login it makes the

help us in recognizing vindictive applications from non-

hacker to let in user profile to spread or post spam to your

malicious ones. To warn Facebook users before installing

friends in the network. Through this spam posts or shares so

apps ,TPAppE is a step toward creating an independent

many users and their personal details can be affected.

watchdog for app. Key terms: Social networks, Non- trusted, Vindictive, TPAppE, Spam.

II. EXISTING SYSTEM

I. INTRODUCTION

profit from this third-party apps used in social networks and

In Existing concept, Hackers bring started exploiting the sending vindictive requests to users. These vindictive apps

The usage of Third-party applications in online social

providing a huge benefits and business for hackers, leading

networks (OSN’s) is huge now a days. OSN’s let the third-

the way with 1.15B active users in Facebook. In many ways a

party apps to improve the user experience. These third-party

hacker can benefit through a vindictive app: 1) to spread

applications are being used by many users and the demand

spam application mau do promotions to get top rank; 2) the

for third party applications is increasing day by day. Third-

© 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 299


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.