SlideShare a Scribd company logo
Detecting Malicious Social Bots
Based on Click stream Sequences
RAMPELLY ROSHINI (19S41A0576)
MOHAMMED SUFIYAN (19S41A0559)
THATIKONDA SUMANVITHA (19S41A0592)
REVELLI UDAYKIRAN (19S41A0578)
INTERNAL GUIDE
Dr.N.Chandramouli
• Social bots have been used to perform automated analytical services and
provide users with improved quality of service. However, malicious social
bots have also been used to disseminate false information (e.g., fake news),
and this can result in real-world consequences. These features are easily
imitated by social bots; thereby resulting in low accuracy of the analysis.
• A novel method of detecting malicious social bots, including both features
selection based on the transition probability of clickstream sequences and
semi-supervised clustering, is presented in this paper
Introduction:
Existing system:
• Malicious users in social network platforms are likely to exhibit
behavior patterns that different from normal users, because their
goals in maximizing their own needs and purposes (e.g., promote a
certain product or certain political beliefs or ideology).
• User behavior analysis is not only helpful in gaining an in-depth
understanding of user intent, but it is also important to the
detection of malicious social bots' accounts in online social
networks.
• A total of 450 thousand items of data were collected from July 1 to
September 30, 2022.These data were clickstream data of normal users
and social bots on CyVOD.
• It includes user information viewing, video broadcasting, comment
related behaviors, friend related behaviors, comment releasing in circles,
and other related behaviors.
Proposed System:
System Requirements
Software Requirements:
• Coding Language : JAVA
 Application Server : Tomcat 5.0
 Operating System : Windows XP
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql 5.0
 Database Connectivity : JDBC.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 1 TB.
• Ram : 2 GB.
UML DIAGRAM:
Fig: Use case Diagram detection of malicious bots
1. OSN Server:
• In this module, the OSN Server has to login by using valid user name and
password.
• After login successful he can do some operations such as view all user
details and authorize them, list of all friends requests and response ,View
all posts like images and messages user, view all Similar group users like
doctors, Engineers, Business Man, etc.,.
• OSN Server can add some BOTS words to the database and view the all
words added by him and based on that negative words admin can find all
users behavior and also produce chart for that behavior words.
MODULES
• Types of modules:
1.OSN Server
2.USER
2. User:
• In this module, there are n numbers of users are present.
• User should register with group option before doing some operations.
After registration successful he has to wait for admin to authorize him
and after admin authorized user can login by using authorized user
name and password.
• Login successful he will do some operations like view profile details,
Search friends based on keyword or friends name, view the friend
requests, post message with image to all friends. Find posts of friends
and comment on that posts.
Fig 1: OSN Login
• The OSN main page is an admin page. Admin has to login through credentials.
Admin can anticioate the users activites like users posts, users comments and detects
malicious bots which was posted by users.
Fig 2: Registration page
• In Registration page we have to enter the details to register as a user. After
Giving the details user has to click register tab. Now the admin has to authorize
the new user. After authorization now user is successfully registered.
Fig 3: Users List
• The above page can shows number of users list which was authorised by admin. The
user has been specialised in their group. This page is administered by admin and can
also observes users activity.
Fig 4: Search Friends
• This page allows users to search their friends by entering name. If user has account in it
then the page will shows the users profile. If not the page will shows a message like user
is not found.
Fig 5: Friends page
• The searched user profile has been displayed after entering the name. Now the user
can send the request to his friend. After this user can see the posts of his friend and
can also comment on his posts.
Fig 6: Post details
• The above picture describes about the user’s shared post which includes post title, post
description, post speciality message, posted date .Here we can also add pictures to the
shared post.
Fig 7: Users bots behaviour
• Users bots behaviour includes details of the specified users detected by admin. The page
will have user name, comments, bad type, used bot words, total bot words found.
Fig 8: List of bot words
• Here we can find the list of bot words which was previously listed by the admin.
Here we can find the types of bot words used by users.
Fig 9: Analyzing the data of malicious bots through bar graph
• The frequency of bot type words posted or used can be Analysed through the
bar graphs.
Advantages
• Transition probability of user behavior clickstreams increases by an average of
12.8%, in comparison to the detection method based on quantitative analysis of user
behavior.
Disadvantages
• In online social networks, social bots are social accounts controlled by automated
programs that can perform corresponding operations based on a set of procedures.
CONCLUSION
• We proposed a novel method to accurately detect malicious social bots in
online social networks. Experiments showed that transition probability
between user click streams based on the social situation analytics can be
used to detect malicious social bots in online social platforms accurately.
In future research, additional behaviors of malicious social bots will be
further considered and the proposed detection approach will be extended
and optimized to identify specific intentions and purposes of a broader
range of malicious social bots.
1.F. Morstatter, L. Wu, T. H. Nazer, K. M. Carley, and H. Liu,
``A new approach to bot detection: Striking the balance between
precision and recall,'' in Proc. IEEE/ACM Int. Conf. Adv. Social
Netw Mining,San Francisco, CA, USA, Aug. 2016, pp. 533_540.
2.C. A. De Lima Salge and N. Berente, ``Is that social bot
behaving unethically?''Commun. ACM, vol. 60, no. 9, pp. 29_31,
Sep. 2017.
REFERENCES
THANK YOU!
SEMINAR PRESENTED BY:
TEAM 2
CSE-B

More Related Content

What's hot

Functional dependency
Functional dependencyFunctional dependency
Functional dependency
Dashani Rajapaksha
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programming
Sandeep Kumar Singh
 
Dbms architecture
Dbms architectureDbms architecture
Dbms architecture
Shubham Dwivedi
 
Additional Relational Algebra Operations
Additional Relational Algebra OperationsAdditional Relational Algebra Operations
Additional Relational Algebra Operations
A. S. M. Shafi
 
Dbms important questions and answers
Dbms important questions and answersDbms important questions and answers
Dbms important questions and answers
LakshmiSarvani6
 
VEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEMVEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEM
Akash Koul
 
Database Management system
Database Management systemDatabase Management system
Database Management system
Vijay Thorat
 
Event management system for final year project
Event management system for final year project Event management system for final year project
Event management system for final year project
wethecodershelp
 
Low Level Design
Low Level DesignLow Level Design
Low Level Design
Satyanarayana SVV
 
Car rental Project Ppt
Car rental Project PptCar rental Project Ppt
Car rental Project Ppt
rahul85rkm
 
Language identification
Language identificationLanguage identification
Language identification
atulnitrkl
 
Relational keys
Relational keysRelational keys
Relational keys
Sana2020
 
Ooad unit – 1 introduction
Ooad unit – 1 introductionOoad unit – 1 introduction
Ooad unit – 1 introduction
Babeetha Muruganantham
 
Er model ppt
Er model pptEr model ppt
Er model ppt
Pihu Goel
 
UML Diagrams- Unified Modeling Language Introduction
UML Diagrams- Unified Modeling Language IntroductionUML Diagrams- Unified Modeling Language Introduction
UML Diagrams- Unified Modeling Language Introduction
Ramakant Soni
 
System programming note
System programming noteSystem programming note
System programming note
SANTOSH RATH
 
Social Media Mining - Chapter 9 (Recommendation in Social Media)
Social Media Mining - Chapter 9 (Recommendation in Social Media)Social Media Mining - Chapter 9 (Recommendation in Social Media)
Social Media Mining - Chapter 9 (Recommendation in Social Media)
SocialMediaMining
 
Case Study Uml
Case Study UmlCase Study Uml
Case Study Uml
ganesh12july
 
Database users
Database usersDatabase users
Database users
Param Radadiya
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
Bhargav Amin
 

What's hot (20)

Functional dependency
Functional dependencyFunctional dependency
Functional dependency
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programming
 
Dbms architecture
Dbms architectureDbms architecture
Dbms architecture
 
Additional Relational Algebra Operations
Additional Relational Algebra OperationsAdditional Relational Algebra Operations
Additional Relational Algebra Operations
 
Dbms important questions and answers
Dbms important questions and answersDbms important questions and answers
Dbms important questions and answers
 
VEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEMVEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEM
 
Database Management system
Database Management systemDatabase Management system
Database Management system
 
Event management system for final year project
Event management system for final year project Event management system for final year project
Event management system for final year project
 
Low Level Design
Low Level DesignLow Level Design
Low Level Design
 
Car rental Project Ppt
Car rental Project PptCar rental Project Ppt
Car rental Project Ppt
 
Language identification
Language identificationLanguage identification
Language identification
 
Relational keys
Relational keysRelational keys
Relational keys
 
Ooad unit – 1 introduction
Ooad unit – 1 introductionOoad unit – 1 introduction
Ooad unit – 1 introduction
 
Er model ppt
Er model pptEr model ppt
Er model ppt
 
UML Diagrams- Unified Modeling Language Introduction
UML Diagrams- Unified Modeling Language IntroductionUML Diagrams- Unified Modeling Language Introduction
UML Diagrams- Unified Modeling Language Introduction
 
System programming note
System programming noteSystem programming note
System programming note
 
Social Media Mining - Chapter 9 (Recommendation in Social Media)
Social Media Mining - Chapter 9 (Recommendation in Social Media)Social Media Mining - Chapter 9 (Recommendation in Social Media)
Social Media Mining - Chapter 9 (Recommendation in Social Media)
 
Case Study Uml
Case Study UmlCase Study Uml
Case Study Uml
 
Database users
Database usersDatabase users
Database users
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 

Similar to Detecting Malicious Social Bots Based-3.pptx

IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
 
Mingle spot project
Mingle spot projectMingle spot project
Mingle spot project
saikrishnabachuwar
 
Mingle spot project
Mingle spot  project Mingle spot  project
Mingle spot project
saikrishnabachuwar
 
A07010105
A07010105A07010105
A07010105
IJERD Editor
 
Social Media Marketing.pdf
Social Media Marketing.pdfSocial Media Marketing.pdf
Social Media Marketing.pdf
jhon carter
 
7239edefaf061ba9818666362c0e6aaa
7239edefaf061ba9818666362c0e6aaa7239edefaf061ba9818666362c0e6aaa
7239edefaf061ba9818666362c0e6aaa
Anas Metasploit
 
Facebot
FacebotFacebot
Facebot
PuN1sh3r_1
 
Crowdsourcing Systems on world wide web
Crowdsourcing Systems on world wide webCrowdsourcing Systems on world wide web
Crowdsourcing Systems on world wide web
Sanjeev Kumar Jaiswal
 
TRUEWORKER.pptx
TRUEWORKER.pptxTRUEWORKER.pptx
TRUEWORKER.pptx
MsdMsdian
 
crime_management_sysdbms_2024 11[1].pptx
crime_management_sysdbms_2024 11[1].pptxcrime_management_sysdbms_2024 11[1].pptx
crime_management_sysdbms_2024 11[1].pptx
sachinkedari257
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptx
AyushKavariya1
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
Kamal Acharya
 
Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)
SocialMediaMining
 
Social networks
Social networksSocial networks
Social networks
Jagadeesh Kumar
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
IRJET Journal
 
IRJET- Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET-  	  Reputation Systems - Fair Allocation of Points to the Editors in t...IRJET-  	  Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET- Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET Journal
 
Robo10 tr
Robo10 trRobo10 tr
Robo10 tr
Ouzza Brahim
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
IRJET Journal
 
IRJET- Donatio: The Life-Line
IRJET-  	  Donatio: The Life-LineIRJET-  	  Donatio: The Life-Line
IRJET- Donatio: The Life-Line
IRJET Journal
 
Lecture10.ppt
Lecture10.pptLecture10.ppt
Lecture10.ppt
WasekaPropertyportal
 

Similar to Detecting Malicious Social Bots Based-3.pptx (20)

IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
Mingle spot project
Mingle spot projectMingle spot project
Mingle spot project
 
Mingle spot project
Mingle spot  project Mingle spot  project
Mingle spot project
 
A07010105
A07010105A07010105
A07010105
 
Social Media Marketing.pdf
Social Media Marketing.pdfSocial Media Marketing.pdf
Social Media Marketing.pdf
 
7239edefaf061ba9818666362c0e6aaa
7239edefaf061ba9818666362c0e6aaa7239edefaf061ba9818666362c0e6aaa
7239edefaf061ba9818666362c0e6aaa
 
Facebot
FacebotFacebot
Facebot
 
Crowdsourcing Systems on world wide web
Crowdsourcing Systems on world wide webCrowdsourcing Systems on world wide web
Crowdsourcing Systems on world wide web
 
TRUEWORKER.pptx
TRUEWORKER.pptxTRUEWORKER.pptx
TRUEWORKER.pptx
 
crime_management_sysdbms_2024 11[1].pptx
crime_management_sysdbms_2024 11[1].pptxcrime_management_sysdbms_2024 11[1].pptx
crime_management_sysdbms_2024 11[1].pptx
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptx
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
 
Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)
 
Social networks
Social networksSocial networks
Social networks
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
 
IRJET- Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET-  	  Reputation Systems - Fair Allocation of Points to the Editors in t...IRJET-  	  Reputation Systems - Fair Allocation of Points to the Editors in t...
IRJET- Reputation Systems - Fair Allocation of Points to the Editors in t...
 
Robo10 tr
Robo10 trRobo10 tr
Robo10 tr
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
 
IRJET- Donatio: The Life-Line
IRJET-  	  Donatio: The Life-LineIRJET-  	  Donatio: The Life-Line
IRJET- Donatio: The Life-Line
 
Lecture10.ppt
Lecture10.pptLecture10.ppt
Lecture10.ppt
 

Recently uploaded

RMIT degree offer diploma Transcript
RMIT degree offer diploma TranscriptRMIT degree offer diploma Transcript
RMIT degree offer diploma Transcript
sozta
 
Bond degree offer diploma Transcript
Bond degree offer diploma TranscriptBond degree offer diploma Transcript
Bond degree offer diploma Transcript
sozta
 
Bond degree offer diploma Transcript
Bond degree offer diploma TranscriptBond degree offer diploma Transcript
Bond degree offer diploma Transcript
ynanesn
 
MQU degree offer diploma Transcript
MQU degree offer diploma TranscriptMQU degree offer diploma Transcript
MQU degree offer diploma Transcript
ynanesn
 
Introduction_to_Wireless_Communication_R.ppt
Introduction_to_Wireless_Communication_R.pptIntroduction_to_Wireless_Communication_R.ppt
Introduction_to_Wireless_Communication_R.ppt
judy milly
 
Flinders degree offer diploma Transcript
Flinders degree offer diploma TranscriptFlinders degree offer diploma Transcript
Flinders degree offer diploma Transcript
sozta
 
Monash degree offer diploma Transcript
Monash degree offer diploma TranscriptMonash degree offer diploma Transcript
Monash degree offer diploma Transcript
ynanesn
 
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
margaretblush
 
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
Owen Wu
 
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
dizzycaye
 
bangalore Girls call 👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
bangalore Girls call  👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDeliverybangalore Girls call  👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
bangalore Girls call 👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
Jasmine Rawat
 

Recently uploaded (11)

RMIT degree offer diploma Transcript
RMIT degree offer diploma TranscriptRMIT degree offer diploma Transcript
RMIT degree offer diploma Transcript
 
Bond degree offer diploma Transcript
Bond degree offer diploma TranscriptBond degree offer diploma Transcript
Bond degree offer diploma Transcript
 
Bond degree offer diploma Transcript
Bond degree offer diploma TranscriptBond degree offer diploma Transcript
Bond degree offer diploma Transcript
 
MQU degree offer diploma Transcript
MQU degree offer diploma TranscriptMQU degree offer diploma Transcript
MQU degree offer diploma Transcript
 
Introduction_to_Wireless_Communication_R.ppt
Introduction_to_Wireless_Communication_R.pptIntroduction_to_Wireless_Communication_R.ppt
Introduction_to_Wireless_Communication_R.ppt
 
Flinders degree offer diploma Transcript
Flinders degree offer diploma TranscriptFlinders degree offer diploma Transcript
Flinders degree offer diploma Transcript
 
Monash degree offer diploma Transcript
Monash degree offer diploma TranscriptMonash degree offer diploma Transcript
Monash degree offer diploma Transcript
 
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
 
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
 
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
 
bangalore Girls call 👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
bangalore Girls call  👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDeliverybangalore Girls call  👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
bangalore Girls call 👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
 

Detecting Malicious Social Bots Based-3.pptx

  • 1. Detecting Malicious Social Bots Based on Click stream Sequences RAMPELLY ROSHINI (19S41A0576) MOHAMMED SUFIYAN (19S41A0559) THATIKONDA SUMANVITHA (19S41A0592) REVELLI UDAYKIRAN (19S41A0578) INTERNAL GUIDE Dr.N.Chandramouli
  • 2. • Social bots have been used to perform automated analytical services and provide users with improved quality of service. However, malicious social bots have also been used to disseminate false information (e.g., fake news), and this can result in real-world consequences. These features are easily imitated by social bots; thereby resulting in low accuracy of the analysis. • A novel method of detecting malicious social bots, including both features selection based on the transition probability of clickstream sequences and semi-supervised clustering, is presented in this paper Introduction:
  • 3. Existing system: • Malicious users in social network platforms are likely to exhibit behavior patterns that different from normal users, because their goals in maximizing their own needs and purposes (e.g., promote a certain product or certain political beliefs or ideology). • User behavior analysis is not only helpful in gaining an in-depth understanding of user intent, but it is also important to the detection of malicious social bots' accounts in online social networks.
  • 4. • A total of 450 thousand items of data were collected from July 1 to September 30, 2022.These data were clickstream data of normal users and social bots on CyVOD. • It includes user information viewing, video broadcasting, comment related behaviors, friend related behaviors, comment releasing in circles, and other related behaviors. Proposed System:
  • 5. System Requirements Software Requirements: • Coding Language : JAVA  Application Server : Tomcat 5.0  Operating System : Windows XP  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql 5.0  Database Connectivity : JDBC. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 1 TB. • Ram : 2 GB.
  • 6. UML DIAGRAM: Fig: Use case Diagram detection of malicious bots
  • 7. 1. OSN Server: • In this module, the OSN Server has to login by using valid user name and password. • After login successful he can do some operations such as view all user details and authorize them, list of all friends requests and response ,View all posts like images and messages user, view all Similar group users like doctors, Engineers, Business Man, etc.,. • OSN Server can add some BOTS words to the database and view the all words added by him and based on that negative words admin can find all users behavior and also produce chart for that behavior words. MODULES • Types of modules: 1.OSN Server 2.USER
  • 8. 2. User: • In this module, there are n numbers of users are present. • User should register with group option before doing some operations. After registration successful he has to wait for admin to authorize him and after admin authorized user can login by using authorized user name and password. • Login successful he will do some operations like view profile details, Search friends based on keyword or friends name, view the friend requests, post message with image to all friends. Find posts of friends and comment on that posts.
  • 9. Fig 1: OSN Login • The OSN main page is an admin page. Admin has to login through credentials. Admin can anticioate the users activites like users posts, users comments and detects malicious bots which was posted by users.
  • 10. Fig 2: Registration page • In Registration page we have to enter the details to register as a user. After Giving the details user has to click register tab. Now the admin has to authorize the new user. After authorization now user is successfully registered.
  • 11. Fig 3: Users List • The above page can shows number of users list which was authorised by admin. The user has been specialised in their group. This page is administered by admin and can also observes users activity.
  • 12. Fig 4: Search Friends • This page allows users to search their friends by entering name. If user has account in it then the page will shows the users profile. If not the page will shows a message like user is not found.
  • 13. Fig 5: Friends page • The searched user profile has been displayed after entering the name. Now the user can send the request to his friend. After this user can see the posts of his friend and can also comment on his posts.
  • 14. Fig 6: Post details • The above picture describes about the user’s shared post which includes post title, post description, post speciality message, posted date .Here we can also add pictures to the shared post.
  • 15. Fig 7: Users bots behaviour • Users bots behaviour includes details of the specified users detected by admin. The page will have user name, comments, bad type, used bot words, total bot words found.
  • 16. Fig 8: List of bot words • Here we can find the list of bot words which was previously listed by the admin. Here we can find the types of bot words used by users.
  • 17. Fig 9: Analyzing the data of malicious bots through bar graph • The frequency of bot type words posted or used can be Analysed through the bar graphs.
  • 18. Advantages • Transition probability of user behavior clickstreams increases by an average of 12.8%, in comparison to the detection method based on quantitative analysis of user behavior. Disadvantages • In online social networks, social bots are social accounts controlled by automated programs that can perform corresponding operations based on a set of procedures.
  • 19. CONCLUSION • We proposed a novel method to accurately detect malicious social bots in online social networks. Experiments showed that transition probability between user click streams based on the social situation analytics can be used to detect malicious social bots in online social platforms accurately. In future research, additional behaviors of malicious social bots will be further considered and the proposed detection approach will be extended and optimized to identify specific intentions and purposes of a broader range of malicious social bots.
  • 20. 1.F. Morstatter, L. Wu, T. H. Nazer, K. M. Carley, and H. Liu, ``A new approach to bot detection: Striking the balance between precision and recall,'' in Proc. IEEE/ACM Int. Conf. Adv. Social Netw Mining,San Francisco, CA, USA, Aug. 2016, pp. 533_540. 2.C. A. De Lima Salge and N. Berente, ``Is that social bot behaving unethically?''Commun. ACM, vol. 60, no. 9, pp. 29_31, Sep. 2017. REFERENCES
  • 21. THANK YOU! SEMINAR PRESENTED BY: TEAM 2 CSE-B