CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Facebook Rigorous Application Evaluator to Focused on Detecting Malicious Apps on Facebook

by Neela Kiranmai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 10
Year of Publication: 2016
Authors: Neela Kiranmai
10.5120/ijca2016912542

Neela Kiranmai . Facebook Rigorous Application Evaluator to Focused on Detecting Malicious Apps on Facebook. International Journal of Computer Applications. 156, 10 ( Dec 2016), 33-36. DOI=10.5120/ijca2016912542

@article{ 10.5120/ijca2016912542,
author = { Neela Kiranmai },
title = { Facebook Rigorous Application Evaluator to Focused on Detecting Malicious Apps on Facebook },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 10 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number10/26747-2016912542/ },
doi = { 10.5120/ijca2016912542 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:16.307043+05:30
%A Neela Kiranmai
%T Facebook Rigorous Application Evaluator to Focused on Detecting Malicious Apps on Facebook
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 10
%P 33-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Together with 20 billion includes every day, outsider Apps can be a critical reason for the appeal not withstanding addictiveness of Facebook. Unfortunately, digital hoodlums get went to the acknowledgment, the likely of Applying Facebook with respect to scattering malware not withstanding spontaneous mail.More than 13% of the dataset are normally pernicious. Up to now, the examination by nearby group gives revealing vindictive substance notwithstanding notices. On this report, a large portion of people question the issue: introducing some kind of Facebook programming, can absolutely the majority of people find out on the off chance that it is malignant? This paper focuses in building FRAppE - Face book's Thorough Request Evaluator likely the essential device gave to revealing vindictive Facebooks in Facebook. To deliver FRAppE, the vast majority of people use truths acquired just by seeing the submitting conduct of 111K Facebook Facebooks watched all through 2.2 zillion clients in Facebook. In the first place, the majority of people distinguish a few qualities that will help every one separate pernicious Facebooks by not dangerous individuals. For instance, the vast majority of people understand that pernicious Facebooks for the most part impart names along to extra Facebooks, thus they generally request a considerable measure less authorizations when contrasted with not destructive Facebooks. Next, influence these sorts of recognizing qualities, a large portion of people exhibit that FR Facebook E can unquestionably discover pernicious Facebooks alongside 99. 5% dependability, without false pluses and in addition an insignificant false antagonistic rate (4. 1%). At long last, the vast majority of people look at nature of malicious Facebook Facebooks notwithstanding recognize parts why these Facebooks use keeping in mind the end goal to increase. For some odd reason, the vast majority of people understand that numerous Facebooks intrigue notwithstanding help the other; in the dataset, a large portion of people find 1, 584 Facebooks permitting the infection like dissemination of 3, 723 extra Facebooks as a consequence of their substance. Long haul, the greater part of people perspective FR Facebook E to be an activity toward building up a private guard dog in regards to Facebooklication examination not with-standing position, trying to caution Facebook clients in front of introducing Facebooks.

References
  1. Besmer, H. R. Lipford, M. Shehab, and G. Cheek. Social applications: exploring a more secure framework. In SOUPS,2009.
  2. C.-C. Chang and C.-J. Lin. LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2, 2011.
  3. P. Chia, Y. Yamamoto, and N. Asokan. Is this app safe? A large scale study on application permissions and risk signals. In WWW, 2012.
  4. F. J. Damerau. A technique for computer detection and correction of spelling errors. Commun. ACM, 7(3), Mar. 1964.
  5. H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary. Towards online spam filtering in social networks. In NDSS, 2012.
  6. H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary. Towards online spam filtering in social networks. In NDSS, 20124. J. King, A. Lampinen, and A. Smolen. Privacy: Is there an app for that? In SOUPS, 2011
  7. J. King, A. Lampinen, and A. Smolen. Privacy: Is there an app for that? In SOUPS, 2011.
  8. Lee, J. Caverlee, and S. Webb. Un-covering social spammers: social honey pots machine learning. In SIGIR, 2010
  9. Lee and J. Kim. Warningbird: Detecting suspicious urls in twitter stream. In NDSS, 2012.
  10. Y. Liu, K. P. Gummadi, B. Krishna murthy, and A. Mislove. Analyzing face book privacy settings: user expectations vs. reality. In IMC, 2011.
  11. Makridakis, E. Athanasopoulos, S. Antonatos, D. Antoniades, S. Ioannidis, and E. P. Markatos. Understanding the behavior of malicious applications in social networks. Netwrk. Mag. of Global Internet wkg., 2010.
  12. M. S. Rahman, T.-K. Huang, H. V. Madhyastha, and M. Faloutsos. Efficient and Scalable Socware Detection in Online Social Networks. In USENIX Security, 2012.
  13. T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, 2011.
  14. G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. In ACSAC, 2010.
  15. K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and Evaluation of a Real-Time URL Spam Filtering Service. In Proceedings of the IEEE Symposium on Security and Privacy, 2011.
  16. N. Wang, H. Xu, and J. Grossklags. Third-party apps on face book: privacy and the illusion of control. In CHIMIT, 2011.
  17. Yang, R. Harkreader, and G. Gu. Die free or live hard? empirical evaluation and new design for fighting evolving n twitter spammers. In RAID, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Content Based Information Retrieval Online Social Media Privacy preserving CBIR System.