278406526 detecting malicious facebook applications

23
DETECTING MALICIOUS FACEBOOK APPLICATIONS Abstract—With 20 million installs a day, third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. The problem is already significant, as we find that at least 13% of apps in our dataset are malicious. So far, the research community has focused on detecting malicious posts and campaigns. In this paper, we ask the question: Given a Facebook application, can we determine if it is malicious? Our key contribution is in developing FRAppE—Facebook’s Rigorous Application Evaluator—arguably the first tool focused on detecting malicious apps on Facebook. To develop FRAppE, we use information gathered by observing the posting behavior of 111K Facebook apps seen across 2.2 million users on Facebook. First, we identify a set of features that help us distinguishmalicious apps from benign ones. For example, we find that malicious apps often share names with other apps, and they typically request fewer

Upload: jayaprabhu-prabhu

Post on 08-Apr-2016

37 views

Category:

Documents


4 download

DESCRIPTION

cczx

TRANSCRIPT

Page 1: 278406526 Detecting Malicious Facebook Applications

DETECTING MALICIOUS FACEBOOK APPLICATIONS

Abstract—With 20 million installs a day, third-party apps are a major reason for

the popularity and addictiveness of Facebook. Unfortunately, hackers have realized

the potential of using apps for spreading malware and spam. The problem is

already significant, as we find that at least 13% of apps in our dataset are

malicious. So far, the research community has focused on detecting malicious

posts and campaigns. In this paper, we ask the question: Given a Facebook

application, can we determine if it is malicious? Our key contribution is in

developing FRAppE—Facebook’s Rigorous Application Evaluator—arguably the

first tool focused on detecting malicious apps on Facebook. To develop FRAppE,

we use information gathered by observing the posting behavior of 111K Facebook

apps seen across 2.2 million users on Facebook. First, we identify a set of features

that help us distinguishmalicious apps from benign ones. For example, we find that

malicious apps often share names with other apps, and they typically request fewer

permissions than benign apps. Second, leveraging these distinguishing features, we

show that FRAppE can detect malicious apps with 99.5% accuracy, with no false

positives and a high true positive rate (95.9%). Finally, we explore the ecosystem

of malicious Facebook apps and identify mechanisms that these apps use to

propagate. Interestingly, we find that many apps collude and support each other; in

our dataset, we find 1584 apps enabling the viral propagation of 3723 other apps

through their posts. Long term, we see FRAppE as a step toward creating an

independent watchdog for app assessment and ranking, so as to warn Facebook

users before installing apps.

Page 2: 278406526 Detecting Malicious Facebook Applications

EXISTING SYSTEM:

Detecting Spam on OSNs: Gao et al. analyzed posts on the walls of 3.5 million

Facebook users and showed that 10% of links posted on Facebook walls are spam.

They also presented techniques to identify compromised accounts and spam

campaigns. In other work, Gao et al. and Rahman et al. develop efficient

techniques for online spam filtering on OSNs such as Facebook. While Gao et al.

rely on having the whole social graph as input, and so is usable only by the OSN

provider, Rahman et al. develop a third-party application for spam detection on

Facebook. Others present mechanisms for detection of spam URLs on Twitter. In

contrast to all of these efforts, rather than classifying individual URLs or posts as

spam, we focus on identifying malicious applications that are the main source of

spam on Facebook. Detecting Spam Accounts: Yang et al. and Benevenuto et al.

developed techniques to identify accounts of spammers on Twitter. Others have

proposed a honey-pot-based approach to detect spam accounts on OSNs. Yardi et

al. analyzed behavioral patterns among spam accounts in Twitter. Instead of

focusing on accounts created by spammers, our work enables detection of

malicious apps that propagate spam and malware by luring normal users to install

them. App Permission Exploitation: Chia et al. investigate risk signaling on the

privacy intrusiveness of Facebook apps and conclude that current forms of

community ratings are not reliable indicators of the privacy risks associated with

an app. Also, in keeping with our observation, they found that popular Facebook

apps tend to request more permissions. To address privacy risks for using

Facebook apps, some studies propose a new application policy and authentication

dialog. Makridakis et al. use a real application named “Photo of the Day” to

demonstrate how malicious apps on Facebook can launch distributed denial-of-

service (DDoS) attacks using the Facebook platform. King et al. conducted a

Page 3: 278406526 Detecting Malicious Facebook Applications

survey to understand users’ interaction with Facebook apps. Similarly, Gjoka et al.

study the user reach of popular Facebook applications. On the contrary, we

quantify the prevalence of malicious apps and develop tools to identify malicious

apps that use several features beyond the required permission set.

PROPOSED SYSTEM:

Our work makes the following key contributions.

• 13% of observed apps are malicious. We show that malicious apps are prevalent

in Facebook and reach a large number of users. We find that 13% of apps in our

dataset of 111K distinct apps are malicious. Also, 60% of malicious apps endanger

more than 100K users each by convincing them to follow the links on the posts

made by these apps, and 40% of malicious apps have over 1000 monthly active

users each.

• Malicious and benign app profiles significantly differ. We systematically profile

apps and show that malicious app profiles are significantly different than those of

benign apps. A striking observation is the “laziness” of hackers; many malicious

apps have the same name, as 8%of unique names of malicious apps are each used

by more than 10 different apps (as defined by their app IDs). Overall, we profile

apps based on two classes of features: 1) those that can be obtained on-demand

given an application’s identifier (e.g., the permissions required by the app and the

posts in the application’s profile page), and 2) others that require a cross-user view

to aggregate information across time and across apps (e.g., the posting behavior of

the app and the similarity of its name to other apps).

• The emergence of app-nets: Apps collude at massive scale. We conduct a

forensics investigation on the malicious app ecosystem to identify and quantify the

Page 4: 278406526 Detecting Malicious Facebook Applications

techniques used to promote malicious apps. We find that apps collude and

collaborate at a massive scale. Apps promote other apps via posts that point to the

“promoted” apps. If we describe the collusion relationship of promoting–promoted

apps as a graph, we find 1584 promoter apps that promote 3723 other apps.

• Malicious hackers impersonate applications. We were surprised to find popular

good apps, such as FarmVille and Facebook for iPhone, posting malicious posts.

On further investigation, we found a lax authentication rule in Facebook that

enabled hackers to make malicious posts appear as though they came from these

apps.

• FRAppE can detect malicious apps with 99% accuracy. We develop FRAppE

(Facebook’s Rigorous Application Evaluator) to identify malicious apps using

either using only features that can be obtained on-demand or using both on-

demand and aggregation-based app information. FRAppE Lite, which only uses

information available on-demand, can identify malicious apps with 99.0%

accuracy, with low false positives (0.1%) and high true positives (95.6%). By

adding aggregation-based information, FRAppE can detect malicious apps with

99.5% accuracy, with no false positives and higher true positives (95.9%).

Module 1

Detecting malicious apps

Having analyzed the differentiating characteristics of malicious and benign apps,

we next use these features to develop efficient classification techniques to identify

malicious Facebook applications.We present two variants of our malicious app

classifier FRAppE Lite and FRAppE. A. FRAppE Lite FRAppE Lite is a

lightweight version that makes use of only the application features available on

demand. Given a specific app ID, FRAppE Lite crawls the on-demand features for

that application and evaluates the application based on these features in real time.

Page 5: 278406526 Detecting Malicious Facebook Applications

We envision that FRAppE Lite can be incorporated, for example, into a browser

extension that can evaluate any Facebook application at the time when a user is

considering installing it to her profile. All of these features can be collected on

demand at the time of classification and do not require prior knowledge about the

app being evaluated. We use the Support Vector Machine (SVMclassifier for

classifying malicious apps. SVM is widely used for binary classification in security

and other disciplines.We use the D-Complete dataset for training and testing the

classifier. We use 5-fold cross validation on the D-Complete dataset for training

and testing FRAppE Lite’s classifier. In 5-fold cross validation, the dataset is

randomly divided into five segments, and we test on each segment independently

using the other four segments for training. We use accuracy, false positive (FP)

rate, and true positive (TP) rate as the three metrics to measure the classifier’s

performance. Accuracy is defined as the ratio of correctly identified apps (i.e., a

benign/malicious app is appropriately identified as benign/malicious) to the total

number of apps. False positive rate is the fraction of benign apps incorrectly

classified as malicious, and true positive rate is the fraction of benign and

malicious apps correctly classified (i.e., as benign and malicious, respectively).

Module 2

Identifying New Malicious Apps

We next train FRAppE’s classifier on the entire D-Sample dataset (for which we

have all the features and the ground truth classification) and use this classifier to

identify new malicious apps. To do so,we apply FRAppE to all the apps in ourD-

Total dataset that are not in the D-Sample dataset; for these apps, we lack

information as to whether they are malicious or benign. Of the 98 609 apps that we

test in this experiment, 8144 apps were flagged as malicious by FRAppE.

Validation: Since we lack ground truth information for these apps flagged as

malicious, we apply a host of complementary techniques to validate FRAppE’s

Page 6: 278406526 Detecting Malicious Facebook Applications

classification. We next describe these validation techniques; we were able to

validate 98.5% of the apps flagged by FRAppE.

Deleted From Facebook Graph: Facebook itself monitors its platform for malicious

activities, and it disables and deletes from the Facebook graph malicious apps that

it identifies. If the Facebook API (https://graph.facebook.com/appID) returns false

for a particular app ID, this indicates that the app no longer exists on Facebook; we

consider this to be indicative of blacklisting by Facebook. This technique validates

81% of the malicious apps identified by FRAppE. Note that Facebook’s measures

for detecting malicious apps are however not sufficient; of the 1464 malicious apps

identified by FRAppE (that were validated by other techniques below) but are still

active on Facebook, 35% have been active on Facebook since over 4 months with

10% dating back to over 8 months.

App Name Similarity: If an application’s name exactly matches that of multiple

malicious apps in the D-Sample dataset, that app too is likely to be part of the same

campaign and therefore malicious. On the other hand, we found several malicious

apps using version numbers in their name (e.g., “Profile Watchers v4.32,” “How

long have you spent logged in? v8”). Therefore, in addition, if an app name

contains a version number at the end and the rest of its name is identical to

multiple known malicious apps that similarly use version numbers, this too is

indicative of the app likely being malicious.

Posted Link Similarity: If a URL posted by an app matches the URL posted by a

previously known malicious app, then these apps are likely part of the same spam

campaign, thus validating the former as malicious.

Typosquatting of Popular App: If an app’s name is “typosquatting” that of a

popular app, we consider it malicious. For example, we found five apps named

“FarmVile,” which are seeking to leverage the popularity of “FarmVille.” Note

that we used “typosquatting” criteria only to validate apps that were already

Page 7: 278406526 Detecting Malicious Facebook Applications

classified as malicious by FRAppE. We did not use this feature as standalone

criteria for classifying malicious apps in general. Moreover, it could only validate

0.5% of apps in our experiment as shown in Table VIII. Manual Verification: For

the remaining 232 apps unverified by the above techniques, we cluster them based

on name similarity among themselves and verify one app from each cluster with

cluster size greater than 4. For example, we find 83 apps named “Past Life.” This

enabled us to validate an additional 147 apps marked as malicious by FRAppE.

Module 3

Background on App Cross Promotion

Cross promotion among apps, which is forbidden as per Facebook’s platform

policy [16], happens in two different ways. The promoting app can post a link that

points directly to another app, or it can post a link that points to a redirection

URL,which points dynamically to any one of a set of apps.

Posting Direct Links to Other Apps: We found evidence that malicious apps often

promote each other by making posts that redirect users to the promoter’s app page;

here, when posts a link pointing to , we refer to as the promoter and as the

promoter. Promoter apps make such posts on the walls of users who have been

tricked into installing these apps. These posts then appear in the news feed of the

victim’s friends. The post contains an appropriate message to lure users to install

the promoted app, thereby enabling the promoter to accumulate more victims. To

study such cross promotion, we crawled the URLs posted by all malicious apps in

our dataset and identified those where the landing URL corresponds to an app

installation page; we extracted the app ID of the promoter app in such cases. In this

manner, we find 692 promoter apps in our D-Sample dataset from Section II,

which promoted 1806 different apps using direct links.

Page 8: 278406526 Detecting Malicious Facebook Applications

Indirect App Promotion: Alternatively, hackers useWeb sites outside Facebook to

have more control and protection in promoting apps. In fact, the operation here is

more sophisticated, and it obfuscates information at multiple places. Specifically, a

post made by a malicious app includes a shortened URL, and that URL, once

resolved, points to a Web site outside Facebook [30]. This external Web site

forwards users to several different app installation pages over time.

Promotion Graph Characteristics From the app promotion dataset we collected

above, we construct a graph that has an undirected edge between any two apps that

promote each other via direct or indirect promotion, i.e., an edge between and if

the former promotes the latter. We refer to this graph as the “Promotion graph.”

1) Different Roles in Promotion Graph: Apps act in different roles for

promotion.

2) Connectivity: Promotion graph forms large and densely connected

groups.

4) Longest Chain in Promotion: App-nets often exhibit long chains of

promotion.

5) Participating App Names in Promotion Graph: Apps with the same

name often are part of the same app-net.

Module 4

App Collaboration

Next,we attempt to identify themajor hacker groups involved in malicious app

collusion. For this, we consider different variants of the “Campaign graph” as

follows.

• Posted URL campaign: Two apps are part of a campaign if they post a common

URL.

Page 9: 278406526 Detecting Malicious Facebook Applications

• Hosted domain campaign: Two apps are part of a campaign if they redirect to the

same domain once they are installed by a user. We exclude apps that redirect to

apps.facebook. com.

• Promoted URL campaign: Two apps are part of a campaign if they are promoted

by the same indirection URL. It is important to note that, in all versions of the

Campaign graph, the nodes in the same campaign form a clique. Finally, we

construct the “Collaboration graph” by considering the union of the “Promotion

graph” and all variants of the “Campaign graph.”We find that the Collaboration

graph has 41 connected components, with the GCC containing 56% of nodes in the

graph. This potentially indicates that 56% of malicious apps in our corpus are

controlled by a single malicious hacker group. The largest five component sizes are

3617, 781, 645, 296, and 247.

Module 5

Hosting Domains

We investigate the hosting domains that enables redirection Web sites. First, we

find that most of the links in the posts are shortened URLs, and 80% of them use

the bitly shortening service. We consider all the bit.ly URLs among our dataset of

indirection links (84 out of 103) and resolve them to the full URL. We find that

one-third of these URLs are hosted on amazonaws. com.

CONCLUSION

Applications present convenient means for hackers to spread malicious content on

Facebook. However, little is understood about the characteristics of malicious apps

and how they operate. In this paper, using a large corpus of malicious Facebook

apps observed over a 9-month period, we showed thatmalicious apps differ

significantly from benign apps with respect to several features. For example,

Page 10: 278406526 Detecting Malicious Facebook Applications

malicious apps aremuchmore likely to share names with other apps, and they

typically request fewer permissions than benign apps. Leveraging our observations,

we developed FRAppE, an accurate classifier for detecting malicious Facebook

applications.Most interestingly, we highlighted the emergence of app-nets—large

groups of tightly connected applications that promote each other. We will continue

to dig deeper into this ecosystem of malicious apps on Facebook, and we hope that

Facebook will benefit from our recommendations for reducing the menace of

hackers on their platform.

Existing System:

Hackers have started taking advantage of the popularity of this third-party apps

platform and deploying malicious applications. Malicious apps can provide a

lucrative business for ackers, given the popularity of OSNs, with Facebook

leading the way with 900M active users . There are many ways that hackers can

benefit from a malicious app:

DisAdvantages:

(a) the app can reach large numbers of users and their friends to spread spam,

(b) the app can obtain users’ personal information such as email address, home

town, and gender, and

(c) the app can “re-produce" by making other malicious apps popular.

Proposed System:

In this work, we develop FRAppE, a suite of efficient classification techniques for

identifying whether an app is malicious or not. To build FRAppE, we use data

from My Page Keeper, a security app in Facebook that monitors the Facebook

profiles of 2.2 million users. We analyze 111K apps that made 91 million posts

Page 11: 278406526 Detecting Malicious Facebook Applications

over nine months. This is arguably the first comprehensive study focusing on

malicious Facebook apps that focuses on quantifying, profiling, and understanding

malicious apps, and synthesizes this information into an effective detection

approach.

Architecture Diagram:

Implementation Modules:

1.Malicious and benign app profiles significantly differ

2.The emergence of AppNets: apps collude at massive scale

3. Malicious hackers impersonate applications.

4.FRAppE can detect malicious apps with 99% accuracy

Malicious and benign app profiles significantly differ:

Page 12: 278406526 Detecting Malicious Facebook Applications

We systematically profile apps and show that malicious app profiles are

significantly different than those of benign apps. A striking observation is the

“laziness" of hackers; many malicious apps have the same name, as 8% of unique

names of malicious apps are each used by more than 10 different apps (as defined

by their app IDs). Overall, we profile apps based on two classes of features: (a)

those that can be obtained on-demand given an application’s identifier (e.g., the

permissions required by the app and the posts in the application’s profile page),

and (b) others that require a cross-user view to aggregate information across time

and across apps (e.g., the posting behavior of the app and the similarity of its name

to other apps).

The emergence of AppNets: apps collude at massive scale:

We conduct a forensics investigation on the malicious app ecosystem to identify

and quantify the techniques used to promote malicious apps. The most interesting

result is that apps collude and collaborate at a massive scale. Apps promote other

apps via posts that point to the “promoted" apps. If we describe the collusion

relationship of promoting-promoted apps as a graph, we find

1,584 promoter apps that promote 3,723 other apps. Furthermore, these apps form

large and highly-dense connected components, Furthermore, hackers use fast-

changing indirection: applications posts have URLs that point to a website, and the

website dynamically redirects to many different apps; we find 103 such URLs that

point to 4,676 different malicious apps over the course of a month. These observed

behaviors indicate well-organized crime: one hacker controls many malicious apps,

which we will call an AppNet, since they seem a parallel concept to botnets.

Malicious hackers impersonate applications:

Page 13: 278406526 Detecting Malicious Facebook Applications

We were surprised to find popular good apps, such as ‘FarmVille’ and ‘Facebook

for iPhone’, posting malicious posts. On further investigation, we found a lax

authentication rule in Facebook that enabled hackers to make malicious posts

appear as though they came from these apps.

FRAppE can detect malicious apps with 99% accuracy:

We develop FRAppE (Facebook’s Rigorous Application Evaluator) to identify

malicious apps either using only features that can be obtained on-demand or using

both on-demand and aggregation based app information. FRAppE Lite, which

only uses information available on-demand, can identify malicious apps with

99.0% accuracy, with low false positives (0.1%) and false negatives(4.4%). By

adding aggregation-based information, FRAppE can detect malicious apps with

99.5% accuracy, with no false positives and lower false negatives (4.1%).

REFERENCES

[1] C. Pring, “100 social media statistics for 2012,” 2012 [Online]. Available:

http://thesocialskinny.com/100-social-media-statistics-for-2012/

[2] Facebook, Palo Alto, CA, USA, “Facebook Opengraph API,” [Online].

Available: http://developers.facebook.com/docs/reference/api/

[3] “Wiki: Facebook platform,” 2014 [Online]. Available: http://en.

wikipedia.org/wiki/Facebook_Platform

[4] “Pr0file stalker: Rogue Facebook application,” 2012 [Online]. Available: https://apps.facebook.com/mypagekeeper/?status=scam_report-

_fb_survey_scam_pr0file_viewer_2012_4_4

Page 14: 278406526 Detecting Malicious Facebook Applications

[5] “Whiich cartoon character are you—Facebook survey scam,” 2012 [Online].

Available: https://apps.facebook.com/ mypagekeeper/?

status=scam_report_fb_survey_scam_whiich_

cartoon_character_are_you_2012_03_30

[6] G. Cluley, “The Pink Facebook rogue application and survey scam,” 2012

[Online]. Available: http://nakedsecurity.sophos.com/2012/02/ 27/pink-facebook-survey-

scam/

[7] D. Goldman, “Facebook tops 900 million users,” 2012 [Online]. Available:

http://money.cnn.com/2012/04/23/technology/facebookq1/ index.htm

[8] R. Naraine, “Hackers selling $25 toolkit to create malicious Facebook apps,”

2011 [Online]. Available: http://zd.net/g28HxI

[9] HackTrix, “Stay away from malicious Facebook apps,” 2013 [Online].

Available: http://bit.ly/b6gWn5

[10] M. S. Rahman, T.-K. Huang, H. V. Madhyastha, and M. Faloutsos, “Efficient

and scalable socware detection in online social networks,” in Proc. USENIX

Security, 2012, p. 32.

[11] H. Gao et al., “Detecting and characterizing social spam campaigns,” in Proc.

IMC, 2010, pp. 35–47.

[12] H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary, “Towards online

spam filtering in social networks,” in Proc. NDSS, 2012.