SlideShare une entreprise Scribd logo
1  sur  15
DETECTING MALICIOUS FACEBOOK APPLICATIONS
Abstract—With 20 million installs a day, third-party apps are a major reason for
the popularity and addictiveness of Facebook. Unfortunately, hackers have realized
the potential of using apps for spreading malware and spam. The problem is
already significant, as we find that at least 13% of apps in our dataset are
malicious. So far, the research community has focused on detecting malicious
posts and campaigns. In this paper, we ask the question: Given a Facebook
application, can we determine if it is malicious? Our key contribution is in
developing FRAppE—Facebook’s Rigorous Application Evaluator—arguably the
first tool focused on detecting malicious apps on Facebook. To develop FRAppE,
we use information gathered by observing the posting behavior of 111K Facebook
apps seen across 2.2 million users on Facebook. First, we identify a set of features
that help us distinguishmalicious apps from benign ones. For example, we find that
malicious apps often share names with other apps, and they typically request fewer
permissions than benign apps. Second, leveraging these distinguishing features, we
show that FRAppE can detect malicious apps with 99.5% accuracy, with no false
positives and a high true positive rate (95.9%). Finally, we explore the ecosystem
of malicious Facebook apps and identify mechanisms that these apps use to
propagate. Interestingly, we find that many apps collude and support each other; in
our dataset, we find 1584 apps enabling the viral propagation of 3723 other apps
through their posts. Long term, we see FRAppE as a step toward creating an
independent watchdog for app assessment and ranking, so as to warn Facebook
users before installing apps.
EXISTING SYSTEM:
Detecting Spam on OSNs: Gao et al. analyzed posts on the walls of 3.5 million
Facebook users and showed that 10% of links posted on Facebook walls are spam.
They also presented techniques to identify compromised accounts and spam
campaigns. In other work, Gao et al. and Rahman et al. develop efficient
techniques for online spam filtering on OSNs such as Facebook. While Gao et al.
rely on having the whole social graph as input, and so is usable only by the OSN
provider, Rahman et al. develop a third-party application for spam detection on
Facebook. Others present mechanisms for detection of spam URLs on Twitter. In
contrast to all of these efforts, rather than classifying individual URLs or posts as
spam, we focus on identifying malicious applications that are the main source of
spam on Facebook. Detecting Spam Accounts: Yang et al. and Benevenuto et al.
developed techniques to identify accounts of spammers on Twitter. Others have
proposed a honey-pot-based approach to detect spam accounts on OSNs. Yardi et
al. analyzed behavioral patterns among spam accounts in Twitter. Instead of
focusing on accounts created by spammers, our work enables detection of
malicious apps that propagate spam and malware by luring normal users to install
them. App Permission Exploitation: Chia et al. investigate risk signaling on the
privacy intrusiveness of Facebook apps and conclude that current forms of
community ratings are not reliable indicators of the privacy risks associated with
an app. Also, in keeping with our observation, they found that popular Facebook
apps tend to request more permissions. To address privacy risks for using
Facebook apps, some studies propose a new application policy and authentication
dialog. Makridakis et al. use a real application named “Photo of the Day” to
demonstrate how malicious apps on Facebook can launch distributed denial-of-
service (DDoS) attacks using the Facebook platform. King et al. conducted a
survey to understand users’ interaction with Facebook apps. Similarly, Gjoka et al.
study the user reach of popular Facebook applications. On the contrary, we
quantify the prevalence of malicious apps and develop tools to identify malicious
apps that use several features beyond the required permission set.
PROPOSED SYSTEM:
Our work makes the following key contributions.
• 13% of observed apps are malicious. We show that malicious apps are prevalent
in Facebook and reach a large number of users. We find that 13% of apps in our
dataset of 111K distinct apps are malicious. Also, 60% of malicious apps endanger
more than 100K users each by convincing them to follow the links on the posts
made by these apps, and 40% of malicious apps have over 1000 monthly active
users each.
• Malicious and benign app profiles significantly differ. We systematically profile
apps and show that malicious app profiles are significantly different than those of
benign apps. A striking observation is the “laziness” of hackers; many malicious
apps have the same name, as 8%of unique names of malicious apps are each used
by more than 10 different apps (as defined by their app IDs). Overall, we profile
apps based on two classes of features: 1) those that can be obtained on-demand
given an application’s identifier (e.g., the permissions required by the app and the
posts in the application’s profile page), and 2) others that require a cross-user view
to aggregate information across time and across apps (e.g., the posting behavior of
the app and the similarity of its name to other apps).
• The emergence of app-nets: Apps collude at massive scale. We conduct a
forensics investigation on the malicious app ecosystem to identify and quantify the
techniques used to promote malicious apps. We find that apps collude and
collaborate at a massive scale. Apps promote other apps via posts that point to the
“promoted” apps. If we describe the collusion relationship of promoting–promoted
apps as a graph, we find 1584 promoter apps that promote 3723 other apps.
• Malicious hackers impersonate applications. We were surprised to find popular
good apps, such as FarmVille and Facebook for iPhone, posting malicious posts.
On further investigation, we found a lax authentication rule in Facebook that
enabled hackers to make malicious posts appear as though they came from these
apps.
• FRAppE can detect malicious apps with 99% accuracy. We develop FRAppE
(Facebook’s Rigorous Application Evaluator) to identify malicious apps using
either using only features that can be obtained on-demand or using both on-
demand and aggregation-based app information. FRAppE Lite, which only uses
information available on-demand, can identify malicious apps with 99.0%
accuracy, with low false positives (0.1%) and high true positives (95.6%). By
adding aggregation-based information, FRAppE can detect malicious apps with
99.5% accuracy, with no false positives and higher true positives (95.9%).
Module 1
Detecting malicious apps
Having analyzed the differentiating characteristics of malicious and benign apps,
we next use these features to develop efficient classification techniques to identify
malicious Facebook applications.We present two variants of our malicious app
classifier FRAppE Lite and FRAppE. A. FRAppE Lite FRAppE Lite is a
lightweight version that makes use of only the application features available on
demand. Given a specific app ID, FRAppE Lite crawls the on-demand features for
that application and evaluates the application based on these features in real time.
We envision that FRAppE Lite can be incorporated, for example, into a browser
extension that can evaluate any Facebook application at the time when a user is
considering installing it to her profile. All of these features can be collected on
demand at the time of classification and do not require prior knowledge about the
app being evaluated. We use the Support Vector Machine (SVMclassifier for
classifying malicious apps. SVM is widely used for binary classification in security
and other disciplines.We use the D-Complete dataset for training and testing the
classifier. We use 5-fold cross validation on the D-Complete dataset for training
and testing FRAppE Lite’s classifier. In 5-fold cross validation, the dataset is
randomly divided into five segments, and we test on each segment independently
using the other four segments for training. We use accuracy, false positive (FP)
rate, and true positive (TP) rate as the three metrics to measure the classifier’s
performance. Accuracy is defined as the ratio of correctly identified apps (i.e., a
benign/malicious app is appropriately identified as benign/malicious) to the total
number of apps. False positive rate is the fraction of benign apps incorrectly
classified as malicious, and true positive rate is the fraction of benign and
malicious apps correctly classified (i.e., as benign and malicious, respectively).
Module 2
Identifying New Malicious Apps
We next train FRAppE’s classifier on the entire D-Sample dataset (for which we
have all the features and the ground truth classification) and use this classifier to
identify new malicious apps. To do so,we apply FRAppE to all the apps in ourD-
Total dataset that are not in the D-Sample dataset; for these apps, we lack
information as to whether they are malicious or benign. Of the 98 609 apps that we
test in this experiment, 8144 apps were flagged as malicious by FRAppE.
Validation: Since we lack ground truth information for these apps flagged as
malicious, we apply a host of complementary techniques to validate FRAppE’s
classification. We next describe these validation techniques; we were able to
validate 98.5% of the apps flagged by FRAppE.
Deleted From Facebook Graph: Facebook itself monitors its platform for
malicious activities, and it disables and deletes from the Facebook graph malicious
apps that it identifies. If the Facebook API (https://graph.facebook.com/appID)
returns false for a particular app ID, this indicates that the app no longer exists on
Facebook; we consider this to be indicative of blacklisting by Facebook. This
technique validates 81% of the malicious apps identified by FRAppE. Note that
Facebook’s measures for detecting malicious apps are however not sufficient; of
the 1464 malicious apps identified by FRAppE (that were validated by other
techniques below) but are still active on Facebook, 35% have been active on
Facebooksince over 4 months with 10% dating back to over 8 months.
App Name Similarity: If an application’s name exactly matches that of multiple
malicious apps in the D-Sample dataset, that app too is likely to be part of the same
campaign and therefore malicious. On the other hand, we found several malicious
apps using version numbers in their name (e.g., “Profile Watchers v4.32,” “How
long have you spent logged in? v8”). Therefore, in addition, if an app name
contains a version number at the end and the rest of its name is identical to
multiple known malicious apps that similarly use version numbers, this too is
indicative of the app likely being malicious.
Posted Link Similarity: If a URL posted by an app matches the URL posted by a
previously known malicious app, then these apps are likely part of the same spam
campaign, thus validating the former as malicious.
Typosquatting of Popular App: If an app’s name is “typosquatting” that of a
popular app, we consider it malicious. For example, we found five apps named
“FarmVile,” which are seeking to leverage the popularity of “FarmVille.” Note
that we used “typosquatting” criteria only to validate apps that were already
classified as malicious by FRAppE. We did not use this feature as standalone
criteria for classifying malicious apps in general. Moreover, it could only validate
0.5% of apps in our experiment as shown in Table VIII. Manual Verification: For
the remaining 232 apps unverified by the above techniques, we cluster them based
on name similarity among themselves and verify one app from each cluster with
cluster size greater than 4. For example, we find 83 apps named “Past Life.” This
enabled us to validate an additional 147 apps marked as malicious by FRAppE.
Module 3
Backgroundon App Cross Promotion
Cross promotion among apps, which is forbidden as per Facebook’s platform
policy [16], happens in two different ways. The promoting app can post a link that
points directly to another app, or it can post a link that points to a redirection
URL,which points dynamically to any one of a set of apps.
Posting Direct Links to Other Apps: We found evidence that malicious apps often
promote each other by making posts that redirect users to the promoter’s app page;
here, when posts a link pointing to , we refer to as the promoter and as the
promoter. Promoter apps make such posts on the walls of users who have been
tricked into installing these apps. These posts then appear in the news feed of the
victim’s friends. The post contains an appropriate message to lure users to install
the promoted app, thereby enabling the promoter to accumulate more victims. To
study such cross promotion, we crawled the URLs posted by all malicious apps in
our dataset and identified those where the landing URL corresponds to an app
installation page; we extracted the app ID of the promoter app in such cases. In this
manner, we find 692 promoter apps in our D-Sample dataset from Section II,
which promoted 1806 different apps using direct links.
Indirect App Promotion: Alternatively, hackers useWeb sites outside Facebook to
have more control and protection in promoting apps. In fact, the operation here is
more sophisticated, and it obfuscates information at multiple places. Specifically, a
post made by a malicious app includes a shortened URL, and that URL, once
resolved, points to a Web site outside Facebook [30]. This external Web site
forwards users to several different app installation pages over time.
Promotion Graph Characteristics From the app promotion dataset we collected
above, we construct a graph that has an undirected edge between any two apps that
promote each other via direct or indirect promotion, i.e., an edge between and if
the former promotes the latter. We refer to this graph as the “Promotiongraph.”
1) Different Roles in Promotion Graph: Apps act in different roles for
promotion.
2) Connectivity: Promotion graph forms large and densely connected
groups.
4) Longest Chain in Promotion: App-nets often exhibit long chains of
promotion.
5) Participating App Names in Promotion Graph: Apps with the same
nameoften are partof the same app-net.
Module 4
App Collaboration
Next,we attempt to identify themajor hacker groups involved in malicious app
collusion. For this, we consider different variants of the “Campaign graph” as
follows.
• Posted URL campaign: Two apps are part of a campaign if they post a common
URL.
• Hosted domain campaign: Two apps are part of a campaign if they redirect to the
same domain once they are installed by a user. We exclude apps that redirect to
apps.facebook. com.
• Promoted URL campaign: Two apps are part of a campaign if they are promoted
by the same indirection URL. It is important to note that, in all versions of the
Campaign graph, the nodes in the same campaign form a clique. Finally, we
construct the “Collaboration graph” by considering the union of the “Promotion
graph” and all variants of the “Campaign graph.”We find that the Collaboration
graph has 41 connected components, with the GCC containing 56% of nodes in the
graph. This potentially indicates that 56% of malicious apps in our corpus are
controlled by a single malicious hacker group. The largest five component sizes are
3617, 781, 645, 296, and 247.
Module 5
Hosting Domains
We investigate the hosting domains that enables redirection Web sites. First, we
find that most of the links in the posts are shortened URLs, and 80% of them use
the bitly shortening service. We consider all the bit.ly URLs among our dataset of
indirection links (84 out of 103) and resolve them to the full URL. We find that
one-third of these URLs are hosted on amazonaws. com.
CONCLUSION
Applications present convenient means for hackers to spread malicious content on
Facebook. However, little is understood about the characteristics of malicious apps
and how they operate. In this paper, using a large corpus of malicious Facebook
apps observed over a 9-month period, we showed thatmalicious apps differ
significantly from benign apps with respect to several features. For example,
malicious apps aremuchmore likely to share names with other apps, and they
typically request fewer permissions than benign apps. Leveraging our observations,
we developed FRAppE, an accurate classifier for detecting malicious Facebook
applications.Most interestingly, we highlighted the emergence of app-nets—large
groups of tightly connected applications that promote each other. We will continue
to dig deeper into this ecosystem of malicious apps on Facebook, and we hope that
Facebook will benefit from our recommendations for reducing the menace of
hackers on their platform.
REFERENCES
[1] C. Pring, “100 social media statistics for 2012,” 2012 [Online]. Available:
http://thesocialskinny.com/100-social-media-statistics-for-2012/
[2] Facebook, Palo Alto, CA, USA, “Facebook Opengraph API,” [Online].
Available: http://developers.facebook.com/docs/reference/api/
[3] “Wiki: Facebook platform,” 2014 [Online]. Available: http://en.
wikipedia.org/wiki/Facebook_Platform
[4] “Pr0file stalker: Rogue Facebook application,” 2012 [Online]. Available:
https://apps.facebook.com/mypagekeeper/?status=scam_report-
_fb_survey_scam_pr0file_viewer_2012_4_4
[5] “Whiich cartoon character are you—Facebook survey scam,” 2012 [Online].
Available: https://apps.facebook.com/
mypagekeeper/?status=scam_report_fb_survey_scam_whiich_
cartoon_character_are_you_2012_03_30
[6] G. Cluley, “The Pink Facebook rogue application and survey scam,” 2012
[Online]. Available: http://nakedsecurity.sophos.com/2012/02/ 27/pink-facebook-
survey-scam/
[7] D. Goldman, “Facebook tops 900 million users,” 2012 [Online]. Available:
http://money.cnn.com/2012/04/23/technology/facebookq1/ index.htm
[8] R. Naraine, “Hackers selling $25 toolkit to create malicious Facebook apps,”
2011 [Online]. Available: http://zd.net/g28HxI
[9] HackTrix, “Stay away from malicious Facebook apps,” 2013 [Online].
Available: http://bit.ly/b6gWn5
[10] M. S. Rahman, T.-K. Huang, H. V. Madhyastha, and M. Faloutsos, “Efficient
and scalable socware detection in online social networks,” in Proc. USENIX
Security, 2012, p. 32.
[11] H. Gao et al., “Detecting and characterizing social spam campaigns,” in Proc.
IMC, 2010, pp. 35–47.
[12] H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary, “Towards online
spam filtering in social networks,” in Proc. NDSS, 2012.

Contenu connexe

Tendances

Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsBoopathi Kumar
 
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET- Discovery of Fraud Apps Utilizing Sentiment AnalysisIRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET- Discovery of Fraud Apps Utilizing Sentiment AnalysisIRJET Journal
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationseSAT Journals
 
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?PrudentialInfotechLi
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsShakas Technologies
 
March Madness or April Fools Infographic
March Madness or April Fools InfographicMarch Madness or April Fools Infographic
March Madness or April Fools InfographicFlexera
 
The rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusThe rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusDaniel Adenew
 
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
No Substitute for Ongoing Data, Quantification, Visualization, and Story-TellingNo Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Tellingamiable_indian
 
Search Engine Poisoning
Search Engine PoisoningSearch Engine Poisoning
Search Engine PoisoningImperva
 
Data Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceData Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceMichael Roytman
 
Best plagiarism tools to check for duplicate content converted
Best plagiarism tools to check for duplicate content convertedBest plagiarism tools to check for duplicate content converted
Best plagiarism tools to check for duplicate content convertedSample Assignment
 
Quality Over Quantity - Mobile Users Mater | Jarah Euston, Flurry
Quality Over Quantity - Mobile Users Mater | Jarah Euston, FlurryQuality Over Quantity - Mobile Users Mater | Jarah Euston, Flurry
Quality Over Quantity - Mobile Users Mater | Jarah Euston, FlurryDealmaker Media
 
GOOGLE SEARCH ALGORITHM UPDATES AGAINST WEB SPAM
GOOGLE SEARCH ALGORITHM UPDATES AGAINST WEB SPAMGOOGLE SEARCH ALGORITHM UPDATES AGAINST WEB SPAM
GOOGLE SEARCH ALGORITHM UPDATES AGAINST WEB SPAMieijjournal
 

Tendances (19)

Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET- Discovery of Fraud Apps Utilizing Sentiment AnalysisIRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
 
IJET-V3I1P2
IJET-V3I1P2IJET-V3I1P2
IJET-V3I1P2
 
IJET-V3I2P6
IJET-V3I2P6IJET-V3I2P6
IJET-V3I2P6
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
 
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
 
Google play
Google playGoogle play
Google play
 
Mining apps for anomalies
Mining apps for anomaliesMining apps for anomalies
Mining apps for anomalies
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
March Madness or April Fools Infographic
March Madness or April Fools InfographicMarch Madness or April Fools Infographic
March Madness or April Fools Infographic
 
The rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusThe rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-Virus
 
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
No Substitute for Ongoing Data, Quantification, Visualization, and Story-TellingNo Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
 
Search Engine Poisoning
Search Engine PoisoningSearch Engine Poisoning
Search Engine Poisoning
 
Maine Judicial Conference
Maine Judicial ConferenceMaine Judicial Conference
Maine Judicial Conference
 
Data Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceData Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data Science
 
Best plagiarism tools to check for duplicate content converted
Best plagiarism tools to check for duplicate content convertedBest plagiarism tools to check for duplicate content converted
Best plagiarism tools to check for duplicate content converted
 
Quality Over Quantity - Mobile Users Mater | Jarah Euston, Flurry
Quality Over Quantity - Mobile Users Mater | Jarah Euston, FlurryQuality Over Quantity - Mobile Users Mater | Jarah Euston, Flurry
Quality Over Quantity - Mobile Users Mater | Jarah Euston, Flurry
 
GOOGLE SEARCH ALGORITHM UPDATES AGAINST WEB SPAM
GOOGLE SEARCH ALGORITHM UPDATES AGAINST WEB SPAMGOOGLE SEARCH ALGORITHM UPDATES AGAINST WEB SPAM
GOOGLE SEARCH ALGORITHM UPDATES AGAINST WEB SPAM
 

En vedette

Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applicationsnexgentech15
 
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES - IEEE PROJECTS I...
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES  - IEEE PROJECTS I...LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES  - IEEE PROJECTS I...
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES - IEEE PROJECTS I...Nexgen Technology
 
Frappe ERPNext Open Day February 2014
Frappe ERPNext Open Day February 2014Frappe ERPNext Open Day February 2014
Frappe ERPNext Open Day February 2014rushabh_mehta
 
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...Augustin Jose
 
Social friend recommendation based on multiple network correlation
Social friend recommendation based on multiple network correlationSocial friend recommendation based on multiple network correlation
Social friend recommendation based on multiple network correlationShakas Technologies
 
Identification of User Patterns in Social Networks by Data Mining Techniques:...
Identification of User Patterns in Social Networks by Data Mining Techniques:...Identification of User Patterns in Social Networks by Data Mining Techniques:...
Identification of User Patterns in Social Networks by Data Mining Techniques:...Selman Bozkır
 
Facebook Attacks - an in-depth analysis
Facebook Attacks - an in-depth analysisFacebook Attacks - an in-depth analysis
Facebook Attacks - an in-depth analysisCyren, Inc
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...IEEEGLOBALSOFTTECHNOLOGIES
 
eaack-a secure ids for manet
eaack-a secure ids for maneteaack-a secure ids for manet
eaack-a secure ids for manetAswin Pv
 
Automatic test packet generation
Automatic test packet generationAutomatic test packet generation
Automatic test packet generationtusharjadhav2611
 
Detecting and Blocking Suspicious Internal Network Traffic
Detecting and Blocking Suspicious Internal Network Traffic Detecting and Blocking Suspicious Internal Network Traffic
Detecting and Blocking Suspicious Internal Network Traffic LogRhythm
 
Data Mining and Text Mining in Educational Research
Data Mining and Text Mining in Educational ResearchData Mining and Text Mining in Educational Research
Data Mining and Text Mining in Educational ResearchQiang Hao
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possessionnexgentech15
 
ATPG Methods and Algorithms
ATPG Methods and AlgorithmsATPG Methods and Algorithms
ATPG Methods and AlgorithmsDeiptii Das
 
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentSurvey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentEditor IJCATR
 
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEMIoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEMjohn solomon j
 

En vedette (20)

Final PPT
Final PPTFinal PPT
Final PPT
 
Identification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A SurveyIdentification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A Survey
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applications
 
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES - IEEE PROJECTS I...
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES  - IEEE PROJECTS I...LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES  - IEEE PROJECTS I...
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES - IEEE PROJECTS I...
 
Frappe ERPNext Open Day February 2014
Frappe ERPNext Open Day February 2014Frappe ERPNext Open Day February 2014
Frappe ERPNext Open Day February 2014
 
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...
 
Social friend recommendation based on multiple network correlation
Social friend recommendation based on multiple network correlationSocial friend recommendation based on multiple network correlation
Social friend recommendation based on multiple network correlation
 
Identification of User Patterns in Social Networks by Data Mining Techniques:...
Identification of User Patterns in Social Networks by Data Mining Techniques:...Identification of User Patterns in Social Networks by Data Mining Techniques:...
Identification of User Patterns in Social Networks by Data Mining Techniques:...
 
Facebook Attacks - an in-depth analysis
Facebook Attacks - an in-depth analysisFacebook Attacks - an in-depth analysis
Facebook Attacks - an in-depth analysis
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...
 
eaack-a secure ids for manet
eaack-a secure ids for maneteaack-a secure ids for manet
eaack-a secure ids for manet
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Automatic test packet generation
Automatic test packet generationAutomatic test packet generation
Automatic test packet generation
 
E2matrix
E2matrixE2matrix
E2matrix
 
Detecting and Blocking Suspicious Internal Network Traffic
Detecting and Blocking Suspicious Internal Network Traffic Detecting and Blocking Suspicious Internal Network Traffic
Detecting and Blocking Suspicious Internal Network Traffic
 
Data Mining and Text Mining in Educational Research
Data Mining and Text Mining in Educational ResearchData Mining and Text Mining in Educational Research
Data Mining and Text Mining in Educational Research
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possession
 
ATPG Methods and Algorithms
ATPG Methods and AlgorithmsATPG Methods and Algorithms
ATPG Methods and Algorithms
 
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentSurvey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
 
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEMIoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
 

Similaire à Detect Malicious Facebook Apps

identifying malevolent facebook requests
identifying malevolent facebook requestsidentifying malevolent facebook requests
identifying malevolent facebook requestsINFOGAIN PUBLICATION
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applicationsShîvä Mängęnä
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsjpstudcorner
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSDISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSnexgentechnology
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...Nexgen Technology
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsnexgentech15
 
Mobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystemMobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystemSalah Amean
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps1crore projects
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps1crore projects
 
Empirical analysis on iOS app Popularity
Empirical analysis on iOS app PopularityEmpirical analysis on iOS app Popularity
Empirical analysis on iOS app PopularityMin-Hsueh Tsai
 
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET Journal
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
App ecologies: Mapping apps and their support networks
App ecologies: Mapping apps and their support networksApp ecologies: Mapping apps and their support networks
App ecologies: Mapping apps and their support networkscgrltz
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиSergey Ulankin
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for androidJPINFOTECH JAYAPRAKASH
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research ReportPeter Tutty
 
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET Journal
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Casey Lucas
 

Similaire à Detect Malicious Facebook Apps (20)

identifying malevolent facebook requests
identifying malevolent facebook requestsidentifying malevolent facebook requests
identifying malevolent facebook requests
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applications
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSDISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Mobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystemMobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystem
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps
 
Crm updated report
Crm updated reportCrm updated report
Crm updated report
 
Empirical analysis on iOS app Popularity
Empirical analysis on iOS app PopularityEmpirical analysis on iOS app Popularity
Empirical analysis on iOS app Popularity
 
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile Apps
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
App ecologies: Mapping apps and their support networks
App ecologies: Mapping apps and their support networksApp ecologies: Mapping apps and their support networks
App ecologies: Mapping apps and their support networks
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активности
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
 

Plus de Nexgen Technology

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA... MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...Nexgen Technology
 
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennaiIeee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennaiNexgen Technology
 
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Nexgen Technology
 
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Nexgen Technology
 
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Nexgen Technology
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Nexgen Technology
 
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Nexgen Technology
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Nexgen Technology
 
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Nexgen Technology
 
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...Nexgen Technology
 

Plus de Nexgen Technology (20)

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA... MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennaiIeee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
 
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
 
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
 
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
 
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
 
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
 
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
 

Dernier

4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 

Dernier (20)

4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 

Detect Malicious Facebook Apps

  • 1. DETECTING MALICIOUS FACEBOOK APPLICATIONS Abstract—With 20 million installs a day, third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. The problem is already significant, as we find that at least 13% of apps in our dataset are malicious. So far, the research community has focused on detecting malicious posts and campaigns. In this paper, we ask the question: Given a Facebook application, can we determine if it is malicious? Our key contribution is in developing FRAppE—Facebook’s Rigorous Application Evaluator—arguably the first tool focused on detecting malicious apps on Facebook. To develop FRAppE, we use information gathered by observing the posting behavior of 111K Facebook apps seen across 2.2 million users on Facebook. First, we identify a set of features that help us distinguishmalicious apps from benign ones. For example, we find that malicious apps often share names with other apps, and they typically request fewer permissions than benign apps. Second, leveraging these distinguishing features, we show that FRAppE can detect malicious apps with 99.5% accuracy, with no false positives and a high true positive rate (95.9%). Finally, we explore the ecosystem of malicious Facebook apps and identify mechanisms that these apps use to
  • 2. propagate. Interestingly, we find that many apps collude and support each other; in our dataset, we find 1584 apps enabling the viral propagation of 3723 other apps through their posts. Long term, we see FRAppE as a step toward creating an independent watchdog for app assessment and ranking, so as to warn Facebook users before installing apps. EXISTING SYSTEM: Detecting Spam on OSNs: Gao et al. analyzed posts on the walls of 3.5 million Facebook users and showed that 10% of links posted on Facebook walls are spam. They also presented techniques to identify compromised accounts and spam campaigns. In other work, Gao et al. and Rahman et al. develop efficient techniques for online spam filtering on OSNs such as Facebook. While Gao et al. rely on having the whole social graph as input, and so is usable only by the OSN provider, Rahman et al. develop a third-party application for spam detection on Facebook. Others present mechanisms for detection of spam URLs on Twitter. In contrast to all of these efforts, rather than classifying individual URLs or posts as spam, we focus on identifying malicious applications that are the main source of spam on Facebook. Detecting Spam Accounts: Yang et al. and Benevenuto et al.
  • 3. developed techniques to identify accounts of spammers on Twitter. Others have proposed a honey-pot-based approach to detect spam accounts on OSNs. Yardi et al. analyzed behavioral patterns among spam accounts in Twitter. Instead of focusing on accounts created by spammers, our work enables detection of malicious apps that propagate spam and malware by luring normal users to install them. App Permission Exploitation: Chia et al. investigate risk signaling on the privacy intrusiveness of Facebook apps and conclude that current forms of community ratings are not reliable indicators of the privacy risks associated with an app. Also, in keeping with our observation, they found that popular Facebook apps tend to request more permissions. To address privacy risks for using Facebook apps, some studies propose a new application policy and authentication dialog. Makridakis et al. use a real application named “Photo of the Day” to demonstrate how malicious apps on Facebook can launch distributed denial-of- service (DDoS) attacks using the Facebook platform. King et al. conducted a survey to understand users’ interaction with Facebook apps. Similarly, Gjoka et al. study the user reach of popular Facebook applications. On the contrary, we quantify the prevalence of malicious apps and develop tools to identify malicious apps that use several features beyond the required permission set.
  • 4. PROPOSED SYSTEM: Our work makes the following key contributions. • 13% of observed apps are malicious. We show that malicious apps are prevalent in Facebook and reach a large number of users. We find that 13% of apps in our dataset of 111K distinct apps are malicious. Also, 60% of malicious apps endanger more than 100K users each by convincing them to follow the links on the posts made by these apps, and 40% of malicious apps have over 1000 monthly active users each. • Malicious and benign app profiles significantly differ. We systematically profile apps and show that malicious app profiles are significantly different than those of benign apps. A striking observation is the “laziness” of hackers; many malicious apps have the same name, as 8%of unique names of malicious apps are each used by more than 10 different apps (as defined by their app IDs). Overall, we profile apps based on two classes of features: 1) those that can be obtained on-demand given an application’s identifier (e.g., the permissions required by the app and the posts in the application’s profile page), and 2) others that require a cross-user view to aggregate information across time and across apps (e.g., the posting behavior of the app and the similarity of its name to other apps).
  • 5. • The emergence of app-nets: Apps collude at massive scale. We conduct a forensics investigation on the malicious app ecosystem to identify and quantify the techniques used to promote malicious apps. We find that apps collude and collaborate at a massive scale. Apps promote other apps via posts that point to the “promoted” apps. If we describe the collusion relationship of promoting–promoted apps as a graph, we find 1584 promoter apps that promote 3723 other apps. • Malicious hackers impersonate applications. We were surprised to find popular good apps, such as FarmVille and Facebook for iPhone, posting malicious posts. On further investigation, we found a lax authentication rule in Facebook that enabled hackers to make malicious posts appear as though they came from these apps. • FRAppE can detect malicious apps with 99% accuracy. We develop FRAppE (Facebook’s Rigorous Application Evaluator) to identify malicious apps using either using only features that can be obtained on-demand or using both on- demand and aggregation-based app information. FRAppE Lite, which only uses information available on-demand, can identify malicious apps with 99.0% accuracy, with low false positives (0.1%) and high true positives (95.6%). By adding aggregation-based information, FRAppE can detect malicious apps with 99.5% accuracy, with no false positives and higher true positives (95.9%).
  • 6. Module 1 Detecting malicious apps Having analyzed the differentiating characteristics of malicious and benign apps, we next use these features to develop efficient classification techniques to identify malicious Facebook applications.We present two variants of our malicious app classifier FRAppE Lite and FRAppE. A. FRAppE Lite FRAppE Lite is a lightweight version that makes use of only the application features available on demand. Given a specific app ID, FRAppE Lite crawls the on-demand features for that application and evaluates the application based on these features in real time. We envision that FRAppE Lite can be incorporated, for example, into a browser extension that can evaluate any Facebook application at the time when a user is considering installing it to her profile. All of these features can be collected on demand at the time of classification and do not require prior knowledge about the app being evaluated. We use the Support Vector Machine (SVMclassifier for classifying malicious apps. SVM is widely used for binary classification in security and other disciplines.We use the D-Complete dataset for training and testing the classifier. We use 5-fold cross validation on the D-Complete dataset for training and testing FRAppE Lite’s classifier. In 5-fold cross validation, the dataset is randomly divided into five segments, and we test on each segment independently using the other four segments for training. We use accuracy, false positive (FP)
  • 7. rate, and true positive (TP) rate as the three metrics to measure the classifier’s performance. Accuracy is defined as the ratio of correctly identified apps (i.e., a benign/malicious app is appropriately identified as benign/malicious) to the total number of apps. False positive rate is the fraction of benign apps incorrectly classified as malicious, and true positive rate is the fraction of benign and malicious apps correctly classified (i.e., as benign and malicious, respectively). Module 2 Identifying New Malicious Apps We next train FRAppE’s classifier on the entire D-Sample dataset (for which we have all the features and the ground truth classification) and use this classifier to identify new malicious apps. To do so,we apply FRAppE to all the apps in ourD- Total dataset that are not in the D-Sample dataset; for these apps, we lack information as to whether they are malicious or benign. Of the 98 609 apps that we test in this experiment, 8144 apps were flagged as malicious by FRAppE. Validation: Since we lack ground truth information for these apps flagged as malicious, we apply a host of complementary techniques to validate FRAppE’s classification. We next describe these validation techniques; we were able to validate 98.5% of the apps flagged by FRAppE. Deleted From Facebook Graph: Facebook itself monitors its platform for malicious activities, and it disables and deletes from the Facebook graph malicious
  • 8. apps that it identifies. If the Facebook API (https://graph.facebook.com/appID) returns false for a particular app ID, this indicates that the app no longer exists on Facebook; we consider this to be indicative of blacklisting by Facebook. This technique validates 81% of the malicious apps identified by FRAppE. Note that Facebook’s measures for detecting malicious apps are however not sufficient; of the 1464 malicious apps identified by FRAppE (that were validated by other techniques below) but are still active on Facebook, 35% have been active on Facebooksince over 4 months with 10% dating back to over 8 months. App Name Similarity: If an application’s name exactly matches that of multiple malicious apps in the D-Sample dataset, that app too is likely to be part of the same campaign and therefore malicious. On the other hand, we found several malicious apps using version numbers in their name (e.g., “Profile Watchers v4.32,” “How long have you spent logged in? v8”). Therefore, in addition, if an app name contains a version number at the end and the rest of its name is identical to multiple known malicious apps that similarly use version numbers, this too is indicative of the app likely being malicious. Posted Link Similarity: If a URL posted by an app matches the URL posted by a previously known malicious app, then these apps are likely part of the same spam campaign, thus validating the former as malicious.
  • 9. Typosquatting of Popular App: If an app’s name is “typosquatting” that of a popular app, we consider it malicious. For example, we found five apps named “FarmVile,” which are seeking to leverage the popularity of “FarmVille.” Note that we used “typosquatting” criteria only to validate apps that were already classified as malicious by FRAppE. We did not use this feature as standalone criteria for classifying malicious apps in general. Moreover, it could only validate 0.5% of apps in our experiment as shown in Table VIII. Manual Verification: For the remaining 232 apps unverified by the above techniques, we cluster them based on name similarity among themselves and verify one app from each cluster with cluster size greater than 4. For example, we find 83 apps named “Past Life.” This enabled us to validate an additional 147 apps marked as malicious by FRAppE. Module 3 Backgroundon App Cross Promotion Cross promotion among apps, which is forbidden as per Facebook’s platform policy [16], happens in two different ways. The promoting app can post a link that points directly to another app, or it can post a link that points to a redirection URL,which points dynamically to any one of a set of apps. Posting Direct Links to Other Apps: We found evidence that malicious apps often promote each other by making posts that redirect users to the promoter’s app page;
  • 10. here, when posts a link pointing to , we refer to as the promoter and as the promoter. Promoter apps make such posts on the walls of users who have been tricked into installing these apps. These posts then appear in the news feed of the victim’s friends. The post contains an appropriate message to lure users to install the promoted app, thereby enabling the promoter to accumulate more victims. To study such cross promotion, we crawled the URLs posted by all malicious apps in our dataset and identified those where the landing URL corresponds to an app installation page; we extracted the app ID of the promoter app in such cases. In this manner, we find 692 promoter apps in our D-Sample dataset from Section II, which promoted 1806 different apps using direct links. Indirect App Promotion: Alternatively, hackers useWeb sites outside Facebook to have more control and protection in promoting apps. In fact, the operation here is more sophisticated, and it obfuscates information at multiple places. Specifically, a post made by a malicious app includes a shortened URL, and that URL, once resolved, points to a Web site outside Facebook [30]. This external Web site forwards users to several different app installation pages over time. Promotion Graph Characteristics From the app promotion dataset we collected above, we construct a graph that has an undirected edge between any two apps that promote each other via direct or indirect promotion, i.e., an edge between and if the former promotes the latter. We refer to this graph as the “Promotiongraph.”
  • 11. 1) Different Roles in Promotion Graph: Apps act in different roles for promotion. 2) Connectivity: Promotion graph forms large and densely connected groups. 4) Longest Chain in Promotion: App-nets often exhibit long chains of promotion. 5) Participating App Names in Promotion Graph: Apps with the same nameoften are partof the same app-net. Module 4 App Collaboration Next,we attempt to identify themajor hacker groups involved in malicious app collusion. For this, we consider different variants of the “Campaign graph” as follows. • Posted URL campaign: Two apps are part of a campaign if they post a common URL. • Hosted domain campaign: Two apps are part of a campaign if they redirect to the same domain once they are installed by a user. We exclude apps that redirect to apps.facebook. com.
  • 12. • Promoted URL campaign: Two apps are part of a campaign if they are promoted by the same indirection URL. It is important to note that, in all versions of the Campaign graph, the nodes in the same campaign form a clique. Finally, we construct the “Collaboration graph” by considering the union of the “Promotion graph” and all variants of the “Campaign graph.”We find that the Collaboration graph has 41 connected components, with the GCC containing 56% of nodes in the graph. This potentially indicates that 56% of malicious apps in our corpus are controlled by a single malicious hacker group. The largest five component sizes are 3617, 781, 645, 296, and 247. Module 5 Hosting Domains We investigate the hosting domains that enables redirection Web sites. First, we find that most of the links in the posts are shortened URLs, and 80% of them use the bitly shortening service. We consider all the bit.ly URLs among our dataset of indirection links (84 out of 103) and resolve them to the full URL. We find that one-third of these URLs are hosted on amazonaws. com. CONCLUSION Applications present convenient means for hackers to spread malicious content on Facebook. However, little is understood about the characteristics of malicious apps
  • 13. and how they operate. In this paper, using a large corpus of malicious Facebook apps observed over a 9-month period, we showed thatmalicious apps differ significantly from benign apps with respect to several features. For example, malicious apps aremuchmore likely to share names with other apps, and they typically request fewer permissions than benign apps. Leveraging our observations, we developed FRAppE, an accurate classifier for detecting malicious Facebook applications.Most interestingly, we highlighted the emergence of app-nets—large groups of tightly connected applications that promote each other. We will continue to dig deeper into this ecosystem of malicious apps on Facebook, and we hope that Facebook will benefit from our recommendations for reducing the menace of hackers on their platform. REFERENCES [1] C. Pring, “100 social media statistics for 2012,” 2012 [Online]. Available: http://thesocialskinny.com/100-social-media-statistics-for-2012/ [2] Facebook, Palo Alto, CA, USA, “Facebook Opengraph API,” [Online]. Available: http://developers.facebook.com/docs/reference/api/ [3] “Wiki: Facebook platform,” 2014 [Online]. Available: http://en. wikipedia.org/wiki/Facebook_Platform
  • 14. [4] “Pr0file stalker: Rogue Facebook application,” 2012 [Online]. Available: https://apps.facebook.com/mypagekeeper/?status=scam_report- _fb_survey_scam_pr0file_viewer_2012_4_4 [5] “Whiich cartoon character are you—Facebook survey scam,” 2012 [Online]. Available: https://apps.facebook.com/ mypagekeeper/?status=scam_report_fb_survey_scam_whiich_ cartoon_character_are_you_2012_03_30 [6] G. Cluley, “The Pink Facebook rogue application and survey scam,” 2012 [Online]. Available: http://nakedsecurity.sophos.com/2012/02/ 27/pink-facebook- survey-scam/ [7] D. Goldman, “Facebook tops 900 million users,” 2012 [Online]. Available: http://money.cnn.com/2012/04/23/technology/facebookq1/ index.htm [8] R. Naraine, “Hackers selling $25 toolkit to create malicious Facebook apps,” 2011 [Online]. Available: http://zd.net/g28HxI [9] HackTrix, “Stay away from malicious Facebook apps,” 2013 [Online]. Available: http://bit.ly/b6gWn5 [10] M. S. Rahman, T.-K. Huang, H. V. Madhyastha, and M. Faloutsos, “Efficient and scalable socware detection in online social networks,” in Proc. USENIX Security, 2012, p. 32.
  • 15. [11] H. Gao et al., “Detecting and characterizing social spam campaigns,” in Proc. IMC, 2010, pp. 35–47. [12] H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary, “Towards online spam filtering in social networks,” in Proc. NDSS, 2012.