Explore the Malicious Facebook Applications

V. Rama Rao


Applications that present suitable means for hackers to spread malicious content on Face book on the other hand, little is understood concerning features of malicious applications and how they function.   In the recent times, hackers have considered popularity of the third-party application platform as well as deployment of malicious applications. Our aim is to build up a rigorous application evaluator of face book which is the first tool that is focused on detection of malicious applications on Face book. There are lots of malicious applications spreading on Face book each day.  This is possibly initial comprehensive study that has focused on malicious Face book applications that focus on quantifying as well as understanding of malicious applications and make this information into an effectual detection method.  For structuring of rigorous application evaluator of face book, we make use of data from a security application within Face book that examines profiles of Face book users.  To build up rigorous application evaluator of face book we make use of information which is gathered by means of observation of posting behaviour of Face book apps which are seen across millions of face book users.


Full Text:


Copyright (c) 2016 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 

Paper submission: ijr@pen2print.org