Identifying Malicious Accounts in Social Media Based on Online Promotions
Gudapati Navya1, Duvvada Rajaseswara Rao2

1Gudapati Navya*, CSE, V R Siddhartha Engineering College, Vijayawada, India.
2Dr. Duvvada Rajeswara Rao, CSE, V R Siddhartha Engineering College, Vijayawada, India.
Manuscript received on July 02, 2020. | Revised Manuscript received on July 10, 2020. | Manuscript published on August 30, 2020. | PP: 276-280 | Volume-9 Issue-6, August 2020. | Retrieval Number: F1373089620/2020©BEIESP | DOI: 10.35940/ijeat.F1373.089620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: There is a developing number of individuals who hold accounts via web-based networking media stages however conceal their character for pernicious purposes. Tragically, almost no research has been done to date to distinguish counterfeit characters made by people, particularly so via web-based networking media stages. Online social media step by step incorporate monetary capacities by permitting the utilization of genuine and virtual money, filling in as new stages to have an assortment of organizations, for example, online limited time occasions, where clients can become virtual assesses as a compensation for going to such occasions. Both NSOs and business stakeholders are essentially concerned when Attackers actualize an assortment of records to gather virtual money from these occasions, making these occasions insufficient and the outcome in critical budgetary misfortune. It turns out to be critical to proactively identify these malignant records before on the web and special exercises in this manner they decline their need to be remunerated. In this paper, we have present a new framework, called ProGuard, for accomplish this by deliberately coordinating highlights that describe accounts from three viewpoints, including their overall conduct, their top-up designs and the utilization of their cash. We directed various experiments dependent on information gathered by Ten cent QQ, a world chief OSN with coordinated budgetary administration exercises. Exploratory outcomes have indicated that our framework is equipped for accomplishing a high recognition pace of 96.67% at a low false positive pace of 0.3%.
Keywords: Malicious Accounts, ProGuard, Recognition, Social Media, Virtual Money, Ten cent QQ