An Efficient SecureU Application to Detect Malicious Applications in Social Media Networks

被引:0
作者
Roshini, A. [1 ]
Sai, V. D. Varun [1 ]
Chowdary, S. Dinesh [1 ]
Kommineni, Madhuri [1 ]
Anandakumar, H. [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Vaddeswaram, AP, India
[2] Sri Eshwar Coll Engn, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
来源
2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS) | 2020年
关键词
Malicious Applications; Social media; SVM;
D O I
10.1109/icaccs48705.2020.9074169
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Utilizing interpersonal interaction locales online has become a significant piece of our lives. It encourages us to associate with our friends and family. We can likewise utilize these stages for various motivations behind media sharing, for example, music, recordings, and so forth. Also, these destinations are turning out to be considerably more mainstream nowadays because of the uses of outsiders that work on these sites. In any case, the guarantee of these applications has been found by gatecrashers and utilized as a device for spam clients. As a rule, these projects are malevolent as per a study led A spammer can exploit these applications in different ways, for example, arriving at an enormous number of clients, extricating individual data from the client, and furthermore spamming numerous diferent clients with the guide of a solitaiy clienL As the examination proceeds, inquire about gatherings have focused on distinguishing bogus or spam-like pernicious URLs and online social battles. In our everyday lives, the presence ofFacebook, Twitter or some other Online Social Networking Sites (OSNs) is an absolute necessity. As it is an approach to remain connected and associate with our shut and removed ones. The locales are utilized for d/ferent purposes, for example, music, pictures, transferring recordings, posting distinctive photographs, data, and soforth. These OSNs 'addictiveness and rage has expanded because ofthe nearness of outsider applications. Thefollowing state is that of a reflection of a capacity that tests the highlights characterized by the SecureU demand Here we utilize the SVM Algorithm as a classfier which comprises of various parameters characterized to group the noxious or kind gadget, message, picture, and so forth.
引用
收藏
页码:1169 / 1175
页数:7
相关论文
共 24 条
[1]  
Akkineni H., 2017, INT J INTELLIGENT EN, V10, P418, DOI [10.22266/ijies2017.0630.47, DOI 10.22266/IJIES2017.0630.47]
[2]  
Anjali Devi S., 2018, J ADV RES DYNAMICAL, V2018, P137
[3]  
Balaji P, 2017, PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS AND COMPUTATIONAL INTELLIGENCE (ICBDAC), P318, DOI 10.1109/ICBDACI.2017.8070856
[4]  
Brown G., 2008, ACM CSCW
[5]  
Cluley G., 2012, PINK FACEBOOK ROGUE
[6]  
Gao H., 2010, DETECTING CHARACTERI
[7]  
Goldman D., 2012, FACEBOOK TOPS 900000
[8]  
Kumar Potlapalli Pavan, 2016, ENHANCED ALGORITHM D
[9]  
Latha S. Hema, 2016, Journal of Theoretical and Applied Information Technology, V88, P632
[10]  
Naraine R., 2011, HACKERS SELLING 25 T