Harsha Raj, B.M.G. Prasad


There are lots of malicious applications disbursing on Face book each day. Inside the recent occasions, online hackers have considered recognition inside the third-party application platform furthermore to deployment of malicious applications. Applications that present appropriate approach to online hackers to spread malicious content on Face book however, little is famous concerning popular features of malicious applications and the way they function.  Goal to build up a comprehensive application evaluator of face book the initial tool that attracts on recognition of malicious applications on Face book. To build up rigorous application evaluator of face book we utilize information that's collected by means of observation of posting conduct of Face book apps which are seen across numerous face book users. This is often frequently possibly initial comprehensive study that has focused on malicious Face book applications that focus on quantifying furthermore to understanding of malicious applications creating this data into an effectual recognition method. For structuring of rigorous application evaluator of face book, we utilize data inside the security application within Face book that examines profiles of Face book users.


Malicious Applications; Face Book; Third-Party Application; Hackers; Rigorous Application Evaluator; Security;


K. Lee, J. Caverlee, and S.Webb, “Uncovering social spammers: Social honeypots + machine learning,” in Proc. SIGIR, 2010, pp. 435–442.

S. Yardi, D. Romero, G. Schoenebeck, and D. Boyd, “Detecting spam in a twitter network,” First Monday, vol. 15, no. 1, 2010.

A. Besmer, H. R. Lipford, M. Shehab, and G. Cheek, “Social applications: Exploring a more secure framework,” in Proc. SOUPS, 2009, Art. no. 2.

M. Gjoka, M. Sirivianos, A. Markopoulou, and X. Yang, “Poking Facebook: Characterization of OSN applications,” in Proc. 1st WOSN, 2008, pp. 31–36.

T. Stein, E. Chen, and K. Mangla, “Facebook immune system,” in Proc. 4th Workshop Social Netw. Syst., 2011, Art. no. 8.

L. Parfeni, “Facebook softens its app spam controls, introduces better tools for developers,” 2011.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at