Detecting Malicious Facebook Applications Detecting Malicious Facebook Applications
Abstract:
With 20 million installs a day , third-party apps are a major reason for the popularity and
addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps
for spreading malware and spam. The problem is already significant, as we find that at least
13% of apps in our dataset are malicious. So far, the research community has focused on
detecting malicious posts and campaigns. In this paper, we ask the question: given a
Facebook application, can we determine if it is malicious? Our key contribution is in
developing FRAppE—Facebook’s Rigorous Application Evaluator— arguably the first tool
focused on detecting malicious apps on Facebook. To develop FRAppE, we use information
gathered by observing the posting behavior of 111K Facebook apps seen across 2.2 million
users on Facebook. First, we identify a set of features that help us distinguish malicious apps
from benign ones. For example, we find that malicious apps often share names with other
apps, and they typically request fewer permissions than benign apps. Second, leveraging
these distinguishing features, we show that FRAppE can detect malicious apps with 99.5%
accuracy, with no false positives and a low false negative rate (4.1%). Finally, we explore the
ecosystem of malicious Facebook apps and identify mechanisms that these apps use to
propagate. Interestingly, we find that many apps collude and support each other; in our
dataset, we find 1,584 apps enabling the viral propagation of 3,723 other apps through their
posts. Long-term, we see FRAppE as a step towards creating an independent watchdog for
app assessment and ranking, so as to warn Facebook users before installing apps.
Existing System:
Hackers have started taking advantage of the popularity of this third-party apps platform and
deploying malicious applications. Malicious apps can provide a lucrative business for ackers,
given the popularity of OSNs, with Facebook leading the way with 900M active users . There
are many ways that hackers can benefit from a malicious app:
DisAdvantages:
(a) the app can reach large numbers of users and their friends to spread spam,
(b) the app can obtain users’ personal information such as email address, home town, and
gender, and
(c) the app can “re-produce" by making other malicious apps popular.
Proposed System:
In this work, we develop FRAppE, a suite of efficient classification techniques for identifying
whether an app is malicious or not. To build FRAppE, we use data from My Page Keeper, a
security app in Facebook that monitors the Facebook profiles of 2.2 million users. We
analyze 111K apps that made 91 million posts over nine months. This is arguably the first
comprehensive study focusing on malicious Facebook apps that focuses on quantifying,
profiling, and understanding malicious apps, and synthesizes this information into an
effective detection approach.
Architecture Diagram:
Implementation Modules:
1.Malicious and benign app profiles significantly differ
2.The emergence of AppNets: apps collude at massive scale
3. Malicious hackers impersonate applications.
4.FRAppE can detect malicious apps with 99% accuracy
Malicious and benign app profiles significantly differ:
We systematically profile apps and show that malicious app profiles are significantly
different than those of benign apps. A striking observation is the “laziness" of hackers; many
malicious apps have the same name, as 8% of unique names of malicious apps are each used
by more than 10 different apps (as defined by their app IDs). Overall, we profile apps based
on two classes of features: (a) those that can be obtained on-demand given an application’s
identifier (e.g., the permissions required by the app and the posts in the application’s profile
page), and (b) others that require a cross-user view to aggregate information across time and
across apps (e.g., the posting behavior of the app and the similarity of its name to other apps).
The emergence of AppNets: apps collude at massive scale:
We conduct a forensics investigation on the malicious app ecosystem to identify and quantify
the techniques used to promote malicious apps. The most interesting result is that apps
collude and collaborate at a massive scale. Apps promote other apps via posts that point to
the “promoted" apps. If we describe the collusion relationship of promoting-promoted apps as
a graph, we find
1,584 promoter apps that promote 3,723 other apps. Furthermore, these apps form large and
highly-dense connected components, Furthermore, hackers use fast-changing indirection:
applications posts have URLs that point to a website, and the website dynamically redirects
to many different apps; we find 103 such URLs that point to 4,676 different malicious apps
over the course of a month. These observed behaviors indicate well-organized crime: one
hacker controls many malicious apps, which we will call an AppNet, since they seem a
parallel concept to botnets.
Malicious hackers impersonate applications:
We were surprised to find popular good apps, such as ‘FarmVille’ and ‘Facebook for
iPhone’, posting malicious posts. On further investigation, we found a lax authentication rule
in Facebook that enabled hackers to make malicious posts appear as though they came from
these apps.
FRAppE can detect malicious apps with 99% accuracy:
We develop FRAppE (Facebook’s Rigorous Application Evaluator) to identify malicious
apps either using only features that can be obtained on-demand or using both on-demand and
aggregation based app information. FRAppE Lite, which only uses information available on-
demand, can identify malicious apps with 99.0% accuracy, with low false positives (0.1%)
and false negatives(4.4%). By adding aggregation-based information, FRAppE can detect
malicious apps with 99.5% accuracy, with no false positives and lower false negatives
(4.1%).

More Related Content

DOCX
Fr app e detecting malicious facebook applications
PPTX
FRAppE Detecting Malicious Facebook Applications
PPTX
Android security
DOCX
Detecting malicious facebook applicationsi
DOCX
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
PDF
Detecting Malicious Facebook Applications
PPTX
Detecting malicious facebook applications
DOCX
Discovery of ranking fraud for mobile apps
Fr app e detecting malicious facebook applications
FRAppE Detecting Malicious Facebook Applications
Android security
Detecting malicious facebook applicationsi
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
Detecting Malicious Facebook Applications
Detecting malicious facebook applications
Discovery of ranking fraud for mobile apps

What's hot (19)

DOCX
Discovery of ranking fraud for mobile apps
PPTX
Discovery of ranking fraud for mobile apps
PDF
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
DOCX
Discovery of ranking fraud for mobile apps
RTF
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
DOCX
PPT
Phone apps 2
PDF
Search Engine Poisoning
PDF
March Madness or April Fools Infographic
PPTX
Mining apps for anomalies
PPTX
Bug bounty programs
DOCX
Spammer Detection and Fake User Identificationon Social Networks
PDF
Documento Cisco su Ransomware: come affrontarlo
PPTX
The rise of android malware and efficiency of Anti-Virus
PPTX
The Mobile Tsunami Reloaded
PPTX
Ethics powerpoint
PDF
Infographic: Fortinet Q1 2017 Threat Landscape Report
PDF
Data Science ATL Meetup - Risk I/O Security Data Science
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
Discovery of ranking fraud for mobile apps
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
Phone apps 2
Search Engine Poisoning
March Madness or April Fools Infographic
Mining apps for anomalies
Bug bounty programs
Spammer Detection and Fake User Identificationon Social Networks
Documento Cisco su Ransomware: come affrontarlo
The rise of android malware and efficiency of Anti-Virus
The Mobile Tsunami Reloaded
Ethics powerpoint
Infographic: Fortinet Q1 2017 Threat Landscape Report
Data Science ATL Meetup - Risk I/O Security Data Science
Ad

Viewers also liked (19)

PDF
Final PPT
PDF
Identification and Analysis of Malicious Content on Facebook: A Survey
PPTX
E2matrix
PPTX
PDF
Frappé Open Day Presentations - March 2016
PDF
Application of data mining based malicious code detection techniques for dete...
PPT
NIDS ppt
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...
DOCX
DLD_SYNOPSIS
PPTX
Automatic test packet generation
DOCX
Discovery and verification Documentation
PDF
ATPG Methods and Algorithms
DOC
Supporting privacy protection in personalized web search
PDF
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
PPTX
Supporting privacy protection in personalized web search
PDF
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
PDF
60780174 49594067-cs1403-case-tools-lab-manual
PPT
Tennis Opportunities in Schools
DOC
Space efficient verifiable secret sharing using polynomial interpolation
Final PPT
Identification and Analysis of Malicious Content on Facebook: A Survey
E2matrix
Frappé Open Day Presentations - March 2016
Application of data mining based malicious code detection techniques for dete...
NIDS ppt
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using virtu...
DLD_SYNOPSIS
Automatic test packet generation
Discovery and verification Documentation
ATPG Methods and Algorithms
Supporting privacy protection in personalized web search
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Supporting privacy protection in personalized web search
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
60780174 49594067-cs1403-case-tools-lab-manual
Tennis Opportunities in Schools
Space efficient verifiable secret sharing using polynomial interpolation
Ad

Similar to Fr app e detecting malicious facebook applications (20)

DOCX
Detecting malicious facebook applications
DOCX
Detecting malicious facebook applications
PDF
identifying malevolent facebook requests
PDF
Eurecom уличили приложения для Android в тайной от пользователя активности
PDF
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
DOCX
Review of behavior malware analysis for android
PPTX
App ecologies: Mapping apps and their support networks
PDF
AndRadar: Fast Discovery of Android Applications in Alternative Markets
PDF
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
PDF
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
PPTX
Mobile apps-user interaction measurement & Apps ecosystem
PDF
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
DOCX
Discovery of ranking fraud for mobile apps
PDF
Best Phone Clone App Service To Track Your Cheating Partner.pdf
PDF
Spyware
PDF
A survey on identification of ranking fraud for mobile applications
PDF
Humming bad research-report-final-62916
PDF
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
PDF
Vulnerabilities and attacks targeting social networks and industrial control ...
Detecting malicious facebook applications
Detecting malicious facebook applications
identifying malevolent facebook requests
Eurecom уличили приложения для Android в тайной от пользователя активности
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Review of behavior malware analysis for android
App ecologies: Mapping apps and their support networks
AndRadar: Fast Discovery of Android Applications in Alternative Markets
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
Mobile apps-user interaction measurement & Apps ecosystem
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Discovery of ranking fraud for mobile apps
Best Phone Clone App Service To Track Your Cheating Partner.pdf
Spyware
A survey on identification of ranking fraud for mobile applications
Humming bad research-report-final-62916
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
Vulnerabilities and attacks targeting social networks and industrial control ...

More from CloudTechnologies (20)

DOCX
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
DOCX
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
DOCX
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
DOCX
Machine Learning Classification to predict water purity based on Viruses and ...
DOCX
iot based safety and health monitoring for construction workers
DOCX
Intelligent neonatal monitoring system based on android application using mul...
DOCX
An iot based smart garden with weather station system
DOCX
A deep learning facial expression recognition based scoring system for restau...
DOCX
Diabetes prediction using different machine learning approaches
DOCX
machine learning based predictive analytics of student academic performance i...
DOCX
Image based estimation of real food size for accurate food calorie estimation
DOCX
Network intrusion detection using supervised machine learning technique with ...
DOCX
Io t projects
DOCX
Cloud computing projects
DOCX
Data mining projects
DOCX
Python IEEE 2019 Projects List
DOCX
Machine learning projects
DOCX
Raspberry Pi based voice-operated personal assistant (Neobot)
DOCX
Automation in Agriculture and IoT
DOCX
Gas Leakage Detection Based on IOT
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
Machine Learning Classification to predict water purity based on Viruses and ...
iot based safety and health monitoring for construction workers
Intelligent neonatal monitoring system based on android application using mul...
An iot based smart garden with weather station system
A deep learning facial expression recognition based scoring system for restau...
Diabetes prediction using different machine learning approaches
machine learning based predictive analytics of student academic performance i...
Image based estimation of real food size for accurate food calorie estimation
Network intrusion detection using supervised machine learning technique with ...
Io t projects
Cloud computing projects
Data mining projects
Python IEEE 2019 Projects List
Machine learning projects
Raspberry Pi based voice-operated personal assistant (Neobot)
Automation in Agriculture and IoT
Gas Leakage Detection Based on IOT

Recently uploaded (20)

PDF
Empowerment Technology for Senior High School Guide
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PPTX
Computer Architecture Input Output Memory.pptx
Empowerment Technology for Senior High School Guide
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Journal of Dental Science - UDMY (2021).pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
Introduction to pro and eukaryotes and differences.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Unit 4 Computer Architecture Multicore Processor.pptx
What if we spent less time fighting change, and more time building what’s rig...
What’s under the hood: Parsing standardized learning content for AI
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Computer Architecture Input Output Memory.pptx

Fr app e detecting malicious facebook applications

  • 1. Detecting Malicious Facebook Applications Detecting Malicious Facebook Applications Abstract: With 20 million installs a day , third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. The problem is already significant, as we find that at least 13% of apps in our dataset are malicious. So far, the research community has focused on detecting malicious posts and campaigns. In this paper, we ask the question: given a Facebook application, can we determine if it is malicious? Our key contribution is in developing FRAppE—Facebook’s Rigorous Application Evaluator— arguably the first tool focused on detecting malicious apps on Facebook. To develop FRAppE, we use information gathered by observing the posting behavior of 111K Facebook apps seen across 2.2 million users on Facebook. First, we identify a set of features that help us distinguish malicious apps from benign ones. For example, we find that malicious apps often share names with other apps, and they typically request fewer permissions than benign apps. Second, leveraging these distinguishing features, we show that FRAppE can detect malicious apps with 99.5% accuracy, with no false positives and a low false negative rate (4.1%). Finally, we explore the ecosystem of malicious Facebook apps and identify mechanisms that these apps use to propagate. Interestingly, we find that many apps collude and support each other; in our dataset, we find 1,584 apps enabling the viral propagation of 3,723 other apps through their posts. Long-term, we see FRAppE as a step towards creating an independent watchdog for app assessment and ranking, so as to warn Facebook users before installing apps. Existing System: Hackers have started taking advantage of the popularity of this third-party apps platform and deploying malicious applications. Malicious apps can provide a lucrative business for ackers,
  • 2. given the popularity of OSNs, with Facebook leading the way with 900M active users . There are many ways that hackers can benefit from a malicious app: DisAdvantages: (a) the app can reach large numbers of users and their friends to spread spam, (b) the app can obtain users’ personal information such as email address, home town, and gender, and (c) the app can “re-produce" by making other malicious apps popular. Proposed System: In this work, we develop FRAppE, a suite of efficient classification techniques for identifying whether an app is malicious or not. To build FRAppE, we use data from My Page Keeper, a security app in Facebook that monitors the Facebook profiles of 2.2 million users. We analyze 111K apps that made 91 million posts over nine months. This is arguably the first comprehensive study focusing on malicious Facebook apps that focuses on quantifying, profiling, and understanding malicious apps, and synthesizes this information into an effective detection approach. Architecture Diagram:
  • 3. Implementation Modules: 1.Malicious and benign app profiles significantly differ 2.The emergence of AppNets: apps collude at massive scale 3. Malicious hackers impersonate applications. 4.FRAppE can detect malicious apps with 99% accuracy Malicious and benign app profiles significantly differ: We systematically profile apps and show that malicious app profiles are significantly different than those of benign apps. A striking observation is the “laziness" of hackers; many malicious apps have the same name, as 8% of unique names of malicious apps are each used by more than 10 different apps (as defined by their app IDs). Overall, we profile apps based on two classes of features: (a) those that can be obtained on-demand given an application’s identifier (e.g., the permissions required by the app and the posts in the application’s profile
  • 4. page), and (b) others that require a cross-user view to aggregate information across time and across apps (e.g., the posting behavior of the app and the similarity of its name to other apps). The emergence of AppNets: apps collude at massive scale: We conduct a forensics investigation on the malicious app ecosystem to identify and quantify the techniques used to promote malicious apps. The most interesting result is that apps collude and collaborate at a massive scale. Apps promote other apps via posts that point to the “promoted" apps. If we describe the collusion relationship of promoting-promoted apps as a graph, we find 1,584 promoter apps that promote 3,723 other apps. Furthermore, these apps form large and highly-dense connected components, Furthermore, hackers use fast-changing indirection: applications posts have URLs that point to a website, and the website dynamically redirects to many different apps; we find 103 such URLs that point to 4,676 different malicious apps over the course of a month. These observed behaviors indicate well-organized crime: one hacker controls many malicious apps, which we will call an AppNet, since they seem a parallel concept to botnets. Malicious hackers impersonate applications: We were surprised to find popular good apps, such as ‘FarmVille’ and ‘Facebook for iPhone’, posting malicious posts. On further investigation, we found a lax authentication rule in Facebook that enabled hackers to make malicious posts appear as though they came from these apps. FRAppE can detect malicious apps with 99% accuracy:
  • 5. We develop FRAppE (Facebook’s Rigorous Application Evaluator) to identify malicious apps either using only features that can be obtained on-demand or using both on-demand and aggregation based app information. FRAppE Lite, which only uses information available on- demand, can identify malicious apps with 99.0% accuracy, with low false positives (0.1%) and false negatives(4.4%). By adding aggregation-based information, FRAppE can detect malicious apps with 99.5% accuracy, with no false positives and lower false negatives (4.1%).