Detecting Malicious Facebook Applications Using Classification Technique
Detecting Malicious Facebook Applications Using Classification Technique
Detecting Malicious Facebook Applications Using Classification Technique
185
Volume 6, Issue 3, March 2017
www.ijsret.org
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882
186
Volume 6, Issue 3, March 2017
amounts of personal data and information to these The architecture diagram will show the functioning of
applications and theirdevelopers. This paper generally our system. Whenever an application is popped out in
abstracts main view and defines the current access front of user and if user wants to visit it then, the user
control model gave to theseapplications, and builds on it will request the facebook server for access. The facebook
to generate a more secure framework. server will pass request to application server after which
the request will be received by our proposed system. Our
III. PROPOSED SYSTEM system will look for it in our database that whether the
URL from which the application has come is in active or
In this work, we are going to build a system, which use blocked state, accordingly it will decide whether to grant
classification technique to detect whether an applications the permission to user or not.
is malicious or not. For this, the system will use data
stored in our database. Advantages
For this, our work will contribute the following: 1) The proposed system is a tool to detect a
First, we have designed a social networking Malicious application.
site(like facebook). 2) It will provide security to the user’s account
In that we can do all basic task like login, form hackers.
signup, make friend, like, comment, make post,
etc.
IV. CONCLUSION
All the data related to all activities on the site is
stored in the database.
In our work if any application comes from the Till now, the researchers have found techniques to detect
third party then first the system will check if that malicious posts and spams. But, due to these third party
URL is present in active or block state in our applications being hosted on facebook has put millions
database. of users at security risk. Hence, in this work, we have
If active, then the system will allow it to post proposed a system which will use classification
application. techniques to detect whether an application is malicious
or not.This work is a small contribution in this area for
If blocked, then the system will not allow it to providing security to the users and reducing the
post application. malicious activity.
If any application comes from a URL which is not in our
database, that is for the first time that URL is hosting any Hope, this small contribution will help in further
application than the system will allow it to host. research related to this area and improve the security
In this way, we can suggest a way to secure user over time.
accounts from hackers.
Proposed System Architecture Diagram REFERENCES
www.ijsret.org
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882
187
Volume 6, Issue 3, March 2017
www.ijsret.org