Detecting Malicious Facebook Applications using LSTM Algorithm
Ayesha Choudhari1, Sunil B. Mane2

1Mrs.Ayesha Choudhari*, M.Tech in the Department of Computer Engineering at Government College of Engineering, Pune, Maharashtra.
2Dr.Sunil B. Mane, Associate Professor in the Department of Computer Engineering and Information Technology at Government College of Engineering Pune (An Autonomous Institute of Govt. of Maharashtra), India.
Manuscript received on December 18, 2019. | Revised Manuscript received on December 29, 2019. | Manuscript published on January 10, 2020. | PP: 819-825 | Volume-9 Issue-3, January 2020. | Retrieval Number: C8403019320/2020©BEIESP | DOI: 10.35940/ijitee.C8403.019320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: With twenty million introduces a day [1], outsider applications area unit a big purpose behind the acknowledgment and addictiveness of Facebook. Tragically, programmers have finished the aptitude of exploitation applications for spreading malware and spam. the problem is as of currently important, as we discover that a minimum of thirteen you look after applications in our dataset sq. estimates malignant. Up hitherto, the examination network has fixated on police examination vindictive posts and battles. we tend to tend to point out the issue: Given a Facebook application, can we tend to tend to affirm if it’s vindictive? Our key commitment is in making LSTM— Facebook’s Rigorous Application Evaluator—ostensibly the essential instrument fixated on police examination malevolent applications on Facebook. to make LSTM, we tend to tend to utilize info assembled by perceptive the posting conduct of 111K Facebook applications seen crosswise over 2.2 million purchasers on Facebook. to start with, we tend to tend to come to a decision plenty of decisions that encourage North yankee nation to acknowledge harmful applications from kind ones. for instance, we discover that vindictive applications normally share names with elective applications, which they for the foremost half demand less authorizations than amiable applications. Second, contributory these recognizing decisions, we tend to show that LSTM can find malignant applications with ninety nine .5% exactness, with no imitative positives and a high obvious positive rate (95.9%). At long last, we tend to tend to research arrange of harmful Facebook applications and distinguish parts that these applications use to unfold. Curiously, we discover that few applications get together and bolster every other; in our dataset, we discover 1584 applications endorsing the being engendering of 3723 choice applications through their posts. Long haul, we tend to tend to examine LSTM as a stage toward creating Associate in Nursing freelance working dog for application appraisal and positioning, during this manner on caution Facebook purchasers before putting in applications. 
Keywords: Facebook Apps, Malicious, on-line Social Networks, Spam, LSTM, Machine learning.
Scope of the Article: Machine learning