SlideShare a Scribd company logo
1 of 11
DETECT FAKE
ACCOUNT USING
MACHINE LEARNING
TEAM MEMBERS
1.SHARAN S - 210420205050
2.VIGNESH K - 210420205031
3.MURALIDHARAN R - 210420205037
GUIDED BY : A MARIUMUTHU
ASSISTANT PROFESSOR
Project Presentation: Department of Information Technology
CONTENTS
1. ABSTRACT
2. OBJECTIVES
3. LITERATURE SURVEY
4. EXISTING WORK
5. PROPOSED WORK
6. REFERENCE
ABSTRACT
The proliferation of fake accounts on social media platforms
poses a significant challenge in maintaining online authenticity
and security. This project aims to address the issue of fake
account detection using machine learning algorithms. The
primary objective is to develop a robust model capable of
identifying fraudulent or deceptive accounts by analyzing
various user-related features and behavioral patterns.
The project involves collecting a diverse dataset comprising
both genuine and fake accounts, encompassing information
such as profile details, activity logs, network interactions, and
content shared.
Several machine learning algorithms, including but not limited to
logistic regression, decision trees, random forests, and neural
networks, will be explored and evaluated for their efficacy in
distinguishing between genuine and fake accounts. Model
performance will be assessed using metrics such as accuracy,
OBJECTIVES
The objective of this presentation is to discuss the importance of
fake account detection in today's digital landscape, and to
provide an overview of the various methods and tools available
for detecting and preventing fake accounts.
1. Identify and Mitigate Risks: Detect and mitigate the risks
posed by fake accounts, including misinformation,
cyberbullying, and financial fraud.
2. Preserve Platform Integrity: Enhance the integrity of online
platforms by removing fake accounts, ensuring a trustworthy
and credible online environment.
3. Protect User Privacy: Safeguard user privacy by identifying
and eliminating fake accounts engaged in malicious activities
such as identity theft and stalking.
LITERATURE SURVEY
S.NO NAME OF
THE AUTHOR
PAPER TITLE ISSUE
NO/YEAR
DESCRIPTION OF THE PAPER
1. Sybil Guard A Review on
Detecting Fake
Accounts in Social
Media
Vol. 154, no.
15, 2015
This paper reviews the state-of-the-art
research on detecting fake accounts in
social media. The paper discusses various
approaches, including content analysis,
network analysis, and machine learning.
2. Chakraborty,
P., Muzammel,
C.S., Khatun
Detection of Fake
Profiles in Social
Media- Literature
Review
Vol. 37, no.
23, 2012
This paper reviews the literature on fake
account detection in social media using
machine learning methods.
3. M., Islam, S.F.
and Rahman, S
Fake account
detection in social
media using
machine learning
methods
Vol. 271, no.
41, 2017
The paper discusses various machine
learning algorithms that have been used
for this task, as well as the challenges and
future research directions.
EXISTING WORK:
6
The existing systems use very fewer factors to decide whether an account is Fake or not.
The factors largely affect the way decision making occurs. When the number of factors is
low, the accuracy of the decision making is reduced significantly. There is an exceptional
improvement in fake account creation, which is unmatched by the software or application
used to detect the fake account. Due to the advancement in creation of fake account,
existing methods have turned obsolete. The most common algorithm used by fake
account detection Applications is the Random forest algorithm. The algorithm has few
downsides such as inefficiency to handle the categorical variables which has different
number of levels. Also, when there is an increase in the number of trees, the algorithm's
time efficiency takes a hit.
This system leverages the Random Forest algorithm, utilizing features
like spam commenting, interaction rate, and artificial behavior to build
multiple decision trees for identifying fake accounts. Its robustness to
missing data and ability to achieve high accuracy, even with default
hyperparameters, makes it a powerful tool for online security, significantly
outperforming existing approaches.
PROPOSED WORK:
To detect human fake accounts
▶ Different research steps were executed to discover deceptive
accounts. To discover such deceptive accounts, we followed the
research steps in the below figure.
Gather and Clean Data Create FictiousAccounts Validate Data
Inject FictitiousAccounts
Create New Feautures
Supervised Machine
Learning
Evaluate Results
CONCLUSION
▶ Human accounts and bot accounts have similar attributes and also share
same characteristics.
▶ Engineered features created to detect bot accounts can be applied to
existing corpus of human accounts but they are not as successful as they
are in detecting bot accounts
▶ The machine learning models were trained to use engineered features
without relying on behavioural data. This made it possible for these
machine learning models to be trained on very little data, compared to
when behavioural data is included.
▶ Findings indicate that engineered features used to detect fake bot
accounts at best predicted human accounts with F1 score 89.75%.
▶ E. Van Der Walt and J. Eloff, "Using Machine Learning to
Detect Fake Identities: Bots vs Humans," in IEEE Access, vol.
6, pp. 6540-6549, 2018.
▶ S. Gurajala, J. S. White, B. Hudson, B. R. Voter, and J. N.
Matthews, “Profile characteristics of fake twitter accounts,”
Big Data & Society, vol. 3, no. 2, p. 2053951716674236, 2016.
▶ C. Xiao, D. M. Freeman, and T. Hwa, “Detecting clusters of
fake accounts in online social networks,” in Proceedings of
the 8th ACM Workshop on Artificial Intelligence and Security.
ACM, Conference Proceedings, pp. 91– 101.
▶ S. Mainwaring, We first: How brands and consumers use social
media to build a better world. Macmillan, 2011
REFERENCES
Thanks!
18

More Related Content

Similar to Fake app Detection Project.pptx

Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine LearningIRJET Journal
 
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...IRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionvivatechijri
 
Personality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningIRJET Journal
 
Personality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningIRJET Journal
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptxAyushKavariya1
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...IRJET Journal
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine LearningIRJET Journal
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKIRJET Journal
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationseSAT Journals
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...IJECEIAES
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...IRJET Journal
 

Similar to Fake app Detection Project.pptx (20)

Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
 
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 
Personality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine Learning
 
Personality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine Learning
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing Security
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptx
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
FakeNewsDetector.pptx
FakeNewsDetector.pptxFakeNewsDetector.pptx
FakeNewsDetector.pptx
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 

Recently uploaded

8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
DBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxDBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxrajjais1221
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptamrabdallah9
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样A
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Stationsiddharthteach18
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 

Recently uploaded (20)

8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
DBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxDBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptx
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 

Fake app Detection Project.pptx

  • 1. DETECT FAKE ACCOUNT USING MACHINE LEARNING TEAM MEMBERS 1.SHARAN S - 210420205050 2.VIGNESH K - 210420205031 3.MURALIDHARAN R - 210420205037 GUIDED BY : A MARIUMUTHU ASSISTANT PROFESSOR Project Presentation: Department of Information Technology
  • 2. CONTENTS 1. ABSTRACT 2. OBJECTIVES 3. LITERATURE SURVEY 4. EXISTING WORK 5. PROPOSED WORK 6. REFERENCE
  • 3. ABSTRACT The proliferation of fake accounts on social media platforms poses a significant challenge in maintaining online authenticity and security. This project aims to address the issue of fake account detection using machine learning algorithms. The primary objective is to develop a robust model capable of identifying fraudulent or deceptive accounts by analyzing various user-related features and behavioral patterns. The project involves collecting a diverse dataset comprising both genuine and fake accounts, encompassing information such as profile details, activity logs, network interactions, and content shared. Several machine learning algorithms, including but not limited to logistic regression, decision trees, random forests, and neural networks, will be explored and evaluated for their efficacy in distinguishing between genuine and fake accounts. Model performance will be assessed using metrics such as accuracy,
  • 4. OBJECTIVES The objective of this presentation is to discuss the importance of fake account detection in today's digital landscape, and to provide an overview of the various methods and tools available for detecting and preventing fake accounts. 1. Identify and Mitigate Risks: Detect and mitigate the risks posed by fake accounts, including misinformation, cyberbullying, and financial fraud. 2. Preserve Platform Integrity: Enhance the integrity of online platforms by removing fake accounts, ensuring a trustworthy and credible online environment. 3. Protect User Privacy: Safeguard user privacy by identifying and eliminating fake accounts engaged in malicious activities such as identity theft and stalking.
  • 5. LITERATURE SURVEY S.NO NAME OF THE AUTHOR PAPER TITLE ISSUE NO/YEAR DESCRIPTION OF THE PAPER 1. Sybil Guard A Review on Detecting Fake Accounts in Social Media Vol. 154, no. 15, 2015 This paper reviews the state-of-the-art research on detecting fake accounts in social media. The paper discusses various approaches, including content analysis, network analysis, and machine learning. 2. Chakraborty, P., Muzammel, C.S., Khatun Detection of Fake Profiles in Social Media- Literature Review Vol. 37, no. 23, 2012 This paper reviews the literature on fake account detection in social media using machine learning methods. 3. M., Islam, S.F. and Rahman, S Fake account detection in social media using machine learning methods Vol. 271, no. 41, 2017 The paper discusses various machine learning algorithms that have been used for this task, as well as the challenges and future research directions.
  • 6. EXISTING WORK: 6 The existing systems use very fewer factors to decide whether an account is Fake or not. The factors largely affect the way decision making occurs. When the number of factors is low, the accuracy of the decision making is reduced significantly. There is an exceptional improvement in fake account creation, which is unmatched by the software or application used to detect the fake account. Due to the advancement in creation of fake account, existing methods have turned obsolete. The most common algorithm used by fake account detection Applications is the Random forest algorithm. The algorithm has few downsides such as inefficiency to handle the categorical variables which has different number of levels. Also, when there is an increase in the number of trees, the algorithm's time efficiency takes a hit.
  • 7. This system leverages the Random Forest algorithm, utilizing features like spam commenting, interaction rate, and artificial behavior to build multiple decision trees for identifying fake accounts. Its robustness to missing data and ability to achieve high accuracy, even with default hyperparameters, makes it a powerful tool for online security, significantly outperforming existing approaches. PROPOSED WORK:
  • 8. To detect human fake accounts ▶ Different research steps were executed to discover deceptive accounts. To discover such deceptive accounts, we followed the research steps in the below figure. Gather and Clean Data Create FictiousAccounts Validate Data Inject FictitiousAccounts Create New Feautures Supervised Machine Learning Evaluate Results
  • 9. CONCLUSION ▶ Human accounts and bot accounts have similar attributes and also share same characteristics. ▶ Engineered features created to detect bot accounts can be applied to existing corpus of human accounts but they are not as successful as they are in detecting bot accounts ▶ The machine learning models were trained to use engineered features without relying on behavioural data. This made it possible for these machine learning models to be trained on very little data, compared to when behavioural data is included. ▶ Findings indicate that engineered features used to detect fake bot accounts at best predicted human accounts with F1 score 89.75%.
  • 10. ▶ E. Van Der Walt and J. Eloff, "Using Machine Learning to Detect Fake Identities: Bots vs Humans," in IEEE Access, vol. 6, pp. 6540-6549, 2018. ▶ S. Gurajala, J. S. White, B. Hudson, B. R. Voter, and J. N. Matthews, “Profile characteristics of fake twitter accounts,” Big Data & Society, vol. 3, no. 2, p. 2053951716674236, 2016. ▶ C. Xiao, D. M. Freeman, and T. Hwa, “Detecting clusters of fake accounts in online social networks,” in Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. ACM, Conference Proceedings, pp. 91– 101. ▶ S. Mainwaring, We first: How brands and consumers use social media to build a better world. Macmillan, 2011 REFERENCES