Securing Socials Networks by preventing unauthorized access

download Securing Socials Networks by preventing unauthorized access

of 56

Transcript of Securing Socials Networks by preventing unauthorized access

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    1/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    CHAPTER 1

    INTRODUCTION

    1.1 Introduction to the technology:The technology basically extracts the IP address of the machine from which a

     breach is being made into a user’s social account and sends the IP address as a text

    message to the user. It also refines internet searches by making alias identification

     possible.

    1.2 Stte!ent o" #ro$le!:Prevention of unauthorized access of social accounts through web and mobile

    devices and enabling the authorized users to find their friends by even giving the

    alias/nick names in the uery.

    1.% O$&ecti'e o" the #ro&ect:Preventing cyber crimes and theft! making social accounts safe and alias

    identification.

    1.( )ethodology:

    "e make prevention of unauthorized access possible by extracting the IP

    address of the machine from which the breach is being made and then delivering this

    IP address along with a warning message to the user.

    1.* +i!ittion, o" the #ro&ect:

    • If the user himself enters a wrong password multiple number of times he/she

    would get a warning message.

    • #ocation of the machine from which the breach is being made is hard to

    extract only its IP address can be obtained.

    CHAPTER 2

    ISE DEPT, SDMCET, DHARWAD Page 1

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    2/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    +ITERATURE SUR-E

    2.1 )ethod, nd Theorie,:

    In our application the user is supposed to register and then he/she can login by

    giving the appropriate username and password. $fter this the user can edit his friend

    list and other profile information. $t the time of incorrect login the user will get a

    message intimating about the suspicious activity going on in his account. %ser can

    search his friends by giving their possible known popular nick names by which search

    results are minimized and exact results are obtained.

    2.2 E/i,ting nd Pro#o,ed Technology:

    2.2.1 E/i,ting Sy,te!:

    In the existing system of tracking the suspicious activity if intruder knows the

    username and he/she starts guessing the password and these activities will not be

    known by the legal user.

    In the social networking sites if a person is searching a friend with a particular 

    known name and if that user is registered by some other say alias name then he/she

    won’t be traceable.

    These are the some of the problems that are faced in present existing system.

    2.2.2 Pro#o,ed Sy,te!:

    In our problem statement we are trying to solve the said above problem. $t

    first about the suspect tracking! we will be sending a text message to the authenticated

    users mobile about the suspicious activity. %pon which he/she can take the protective

    measures.

    In the second problem said above! as the user will be registering to our social

    networking site he/she must provide there’s popular nick/alias names so that they can

     be even found when searched by their nick names.

    2.% Ide, o" De,ign nd I!#le!enttion:

    ISE DEPT, SDMCET, DHARWAD Page 2

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    3/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    &ecause of freuent reports of account breaches being made in social

    networking accounts we came up with this idea to eradicate this problem to the

    maximum extent possible. 'ur exhaustive work on this concept will surely help in

    reducing the number of such security breaches.

    (ue to the suspicious activity and threats spread over """ the continues

    call for prevention of the security breaches. )ere we have referred from many

     previous inventions that have been done in order to prevent this insecurity.

    CHAPTER %

    ISE DEPT, SDMCET, DHARWAD Page 3

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    4/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    TECHNO+O0 USED

    %.2.1 Ph#:

    • P)P is a scripting language originally designed for producing dynamic web

     pages. It has evolved to include a command line interface capability and can

     be used in standalone graphical applications.

    • It is a widely*used general*purpose scripting language that is especially suited

    for web development and can be embedded into )T+#.

    • P)P generally runs on a web server! taking P)P code as its input and creating

    web pages as output. It can also be used for command*line scripting and

    client*side ,%I applications.

    • -rom P)P ! the P)P parser compiles input to produce byte code for 

     processing by the end 0ngine! giving improved performance over its

    interpreter predecessor.

    %.2.2 )y Sl:

    • +y1l is a multithreaded!multi*user 12# database management system

    3(&+14. The basic program runs as a server providing multi*user access to a

    number of databases.• The data in +y1l is stored in database ob5ects called tables. $ table is a

    collection of related data entries and it consists of columns and rows.

    (atabases are useful when storing information categorically.

    • "ith +y1l! we can uery a database for specific information and have a

    record set returned.

    • &efore you can access data in a database! you must create a connection to the

    database. In P)P! this is done with the mysl6connect34 function.

    CHAPTER (

    ISE DEPT, SDMCET, DHARWAD Page 4

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    5/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    SOT3ARE RE4UIRE)ENT

    SPECIICATION

    (.1 Introduction:

    The purpose of this document is to present detailed description of the pro5ect

    titled preventing unauthorized access of social accounts through mobile devices. The

    intended users can get the messages if any unauthorized access is made to their mail

    or social accounts. 171 is intended for the users! developers and Pro5ect review

    committee. This application is known as preventing unauthorized access for social

    accounts or mail accounts. It is a web based application.

    This application provides users to create account and if any suspicious

    activities in their account will be intimated to them by a message using their mobile

    numbers. The main point of the pro5ect is to search their friends with any nick name

    known and still the user will be able to get the intended search.

    (.2 The O'erll De,cri#tion:

    (.2.1 Product #er,#ecti'e:

      ig %.1 Product Per,#ecti'e

    'ur product makes uses of normal mining and database concepts   in order to

    maintain the data. It makes use of pattern searching technology to give the intended

    ISE DEPT, SDMCET, DHARWAD Page 5

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    6/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    result even when the nick names are given for searching. There are no such products

    available that provides proper result even on giving nick names. If unauthorized

    access is done to any other users account message are sent to the legal user. )ere it

    makes use of networking protocol in order to send the messages.

    (.2.2 Sy,te! Inter"ce:

    The application is going to be developed using wamp server and its packages.

    The application will be developed in php language by making use of different

     packages.

    (.2.% Inter"ce,:

    There is a ,%I and no command line interface. The ,%I is reuired for accepting the user’s username and password. "hen there are some exceptions raising

    error like entering invalid username and password! then error messages will be

    displayed prompting the users to re*enter the details.

    (.2.( Hrd5re Inter"ce,:

    The application can be built on any machine which supports 89 bit or : bit

    operating system. $s the suspect user’s details are sent as messages! it can work on

    any cell phones even on a recent technology android but we are not implementing on

    android phones.

    (.2.* So"t5re Inter"ce,:

    The application makes use of wamp server ;.9. It is going to be built on

     php3hypertext pre processor4. In order to store the data! the application uses +y12#

    mb of memory can be used to run the application. The mobiles having any operating

    systems with minimum memory is sufficient to deploy the services.

    (.2.7 O#ertion,:

    U,er? )e/1he is responsible for logging in.

    ISE DEPT, SDMCET, DHARWAD Page 6

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    7/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    Ad!ini,trtor? )e will be responsible for authentication of user. $lso responsible for 

    extracting the proper intended search result given the uery using nick names. $lso

    responsible for sending messages to the authorized user if any suspicious activities are

    done in their account.

    (.2.8 Site Ad#ttion Reuire!ent,:

    The user must have social site account. "e are not modifying any details of 

    the user in his account! but only extracting the reuired details from it.

    (.2.9 Product unction,:

    • 7egister to the site.

    • @alidate the user through his username and password.

    • Issue a uery with known possible nick names.

    • The interface will interact with database and provide the appropriate result.

    • 1end the result back to the user.

    • If unauthorized access made to any of the user’s account! detect the particular 

    system.

    • 1end the message to the authorized user about the suspicious activity.

    (.2.1 U,er Chrcteri,tic,:

    Intended users must have basic knowledge of getting registered to the

    networking site. The user must have his account in the social site created.

    (.2.11 Con,trint:

    • %ser must have an account in the social networking site created.

    • In order to get the information of hacking his account! user must possess a

    mobile device.

    • The user must provide his nick name during registration! so that given uery

    for searching a friend with nick name will be easy.• In case of unauthorized access! it is not possible to detect the person who is

    doing such activity.

    (.2.12 A,,u!#tion, nd De#endencie,:

    In this application! it is assumed that a person in the social networking site

    keeps his details updated such as his name and location etc.

    (.2.1% A##ortioning o" Reuire!ent,:

    ISE DEPT, SDMCET, DHARWAD Page 7

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    8/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    4ulity Reuire!ent,:

    Correctne,,? The system should work correctly until the intended results are

    obtained. -or example until the user gets the specified person it must work correctly.

    Reli$ility? The database must be updated and must work all the time unless in case

    of extreme circumstances.

    E""iciency? This depends on internet speed. The higher the speed better is the

    efficiency.

    Integrity? The application uses the user’s username and password hence they need to

     be secured.

    U,$ility? The application must be usable by most of the users who are familiar with

    social sites.

    le/i$ility? It is most important as the application must run on any browser provided.

    The application has admin supervision and also user’s activities that can run on any

     platform.

    Port$ility? since the suspicious activities are informed through message on cell

     phone! it will support any cell phones and the social networking site is also capable of 

    working in any platform.

    Reu,$ility? The system source code can be extended to provide many more features

    that are specific to a particular situation.

    S"ety Reuire!ent,: 1ince the users getting registered to the social networking site

    their username and passwords are stored with high security measures.

    Reli$ility Reuire!ent,: 7eliability is the ability of the system to deliver services

    as specified. The application is >A reliable if the user’s friends maintain updated

     profiles.

    )intin$ility Reuire!ent,: The system source code should be updated as and

    when there are changes made in the technology used.

    (.% S#eci"ic Reuire!ent,:

    (.%.1 E/ternl Inter"ce,:

    ISE DEPT, SDMCET, DHARWAD Page 8

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    9/56

    Prevention of unauthorized access of social accounts through web and mobile devices

     

    The system will display login page. 0nd user provides login name and

     password to the system. Take the login details from the user to authenticate

    the user 

     

    -or invalid username and password appropriate error message will bedisplayed.

     

    The output of the system will be the friends list to the end user.

    (.%.2 unction,:

    ig %.2 U,e C,e digr! "or u,er getting regi,tered

    The user has to get registered for our application.

     =ame of the use case* 7egister.

    (escription* %ser gets registered.

     =ormal -low of 0vents?

    • 1ign up for the site.

    • #ogin using username and password

    $lternate -low of 0vents? If user enters wrong user name or password! error 

    messages are displayed

    ISE DEPT, SDMCET, DHARWAD Page 9

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    10/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    ig %.% lo5 Chrt "or login #roce,,

    ISE DEPT, SDMCET, DHARWAD Page 10

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    11/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    Ad!ini,trtor:

    ig %.( U,e C,e digr! "or d!ini,trtor

    N!e o" u,e c,e: $dministrator 

    De,cri#tion: It works in five stages.

     

    Authentiction: The user is authenticated.

     

    4uery 5ith nic; n!e,: The user issues uery to admin giving nick name.

     

    Serch #o,,i$le detil,: The admin will analyze the data and search for  possible appropriate outcomes.

     

    Send the "inl li,t: The final lists of suggested friend are sent to the user.

     

    Unuthori

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    12/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    (.%.% Per"or!nce Reuire!ent,:

    )ave hours of operation that are 9 x B C this is a web based application. The

    system will work as long as the installed server is up. 1o the availability is 9 D B.

    The application must provide the list of friends if they have same nick namesthen all possible answers must be given. If unauthorized access is detected from two

    or more places then all those must be detected. If same suspected intruder is

     performing two suspicious things then even that are must be detected.

    (.%.( +ogicl Dt$,e reuire!ent, :

    The login details and all the nick names are held in the database during the

    time of registration by the user to the social networking site.

    ig %.* +ogicl dt$,e digr!

    (.%.* De,ign Con,trint,:

    (.%.*.1 Stndrd, Co!#lince:

     =ot applicable. There are no such constraints imposed by regulating bodies

    that will develop constraints for our application.

    (.%.6 So"t5re Sy,te! Attri$ute,:

    These are non*functional reuirements that the system must have. These are

    not directly concerned with the specific functions delivered by the system. These

    relate to the emergent system properties. If the system fails to meet the non*functional

    reuirements then it’s the failure of the whole system. These can relate to three things

    ISE DEPT, SDMCET, DHARWAD Page 12

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    13/56

    Prevention of unauthorized access of social accounts through web and mobile devices

     C Product reuirements! 'rganizational reuirements and 0xternal reuirements.

    1ome of these related to our pro5ect are mentioned below*

    (.%.6.1 Reli$ility:

    7eliability is the ability of the system to deliver services as specified. The

    application is >A reliable if the user’s friends maintain updated profiles.

    (.%.6.2 A'il$ility:

     $vailability is the ability of the system to deliver services when reuested.

    1ince the messages are sent to the cell phones about unauthorized access it must work 

    any time to the user.

    (.%.6.% Security:

     1ecurity is the ability of the system to protect itself against accidental or 

    deliberate intrusion. 1ince we are maintaining login details the information are kept

    secured.

    (.%.6.( )intin$ility: 

    +aintainability deals with the ability of the system which allows changes in

    the system without affecting the existing components. "orld today has become

    competitive in everything. $s new reuirements arrive from customer! we need to

    make changes in the system and add functionalities. 1ince our system is built on

    ob5ect*oriented technology it supports the maintainability to the great extent.

    (.%.6.* Port$ility:

     Portability deals with the ability of the system being machine independent.

    The application works on any computer that supports the installed servers. )ence it is

     portable application.

    ISE DEPT, SDMCET, DHARWAD Page 13

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    14/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    Table no? .< 7ating of software system attributes

    ID Chrcteri,tic H=)=+ 1 2 % ( * 6 7 8 9 1 11 12

    < Eorrectness )

    9 0fficiency )

    8 -lexibility #

    Integrity/1ecurity +

    ; Interoperability #

    : +aintainability +

    B Portability +

    F 7eliability )

    G 7eusability +

    Testability #

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    15/56

    Prevention of unauthorized access of social accounts through web and mobile devices

     There is only one mode of operation. The user needs to get registered to our 

    social site.

    (.%.7.2 U,er Cl,,:

    "e have only one class. The user uses the application to fetch the friend’s list.

    (.%.7.% O$&ect,:

    The classes of ob5ects in our system are %ser! $dministrator! $pplication! our 

    social "ebsite! (atabase! and 1erver. These Elasses each have a single ob5ect and will

     be represented along with their attributes and functions in a %+# diagram in the

    design document.

    (.%.7.( eture,:

    In order to obtain friend’s list the user need to input his username and

     password that he has provided at the time of registration.

    (.%.7.* Sti!ulu,:

    If a user inputs proper username and password of his account his friend’s list

    will be displayed else a proper error message will be displayed.

    (.( Chnge )nge!ent Proce,,:

    The change management process is as follows?

    • Eustomer forwards us a formal email specifying the change in the

    reuirement needed.

    • The email is received by the customer support cell and a developer 

    meeting is held.

    • The feasibility! financial effects! change in pro5ect schedule etc is taken

    into account and a poll is taken by the developer team to decide

    whether to make the change or not.

    • (epending on the decision taken by the poll! the schedule is re*

    organized or work is continued as per normal schedule.

    CHAPTER *

    ISE DEPT, SDMCET, DHARWAD Page 15

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    16/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    DESI0N PHASE

    *.1 Architecturl De,ign:

    *.1.1 E.R Digr!:

    In software engineering! an entity*relationship model 307 model for short4 is

    an abstract and conceptual representation of data. 0ntity*relationship modeling is

    a database modeling method! used to produce a type of conceptual

    schema or semantic data model of a system! often a relational database! and its

    reuirements in a top*down fashion. (iagrams created by this process are

    called entity*relationship diagram.

    ig *.1 E>R Digr!

    *.2 Sy,te! De,ign:

    ISE DEPT, SDMCET, DHARWAD Page 16

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    17/56

    Internet

    Databae

      M!"#

    A$%&n 'r (er Web )r'*er+

    Wa% Ser-er

    Prevention of unauthorized access of social accounts through web and mobile devices

    +ost components described in the System design section will reuire a more

    detailed discussion. 'ther lower*level components and subcomponents may need to

     be described as well. 0ach subsection of this section will refer to or contain a detailed

    description of a system software component. The design process for identifying the

    subsystems making up a system and the framework for sub*system control and

    communication is architectural design. The output of this design process is a

    description of the software architecture.

    ig *.2 Sy,te! de,ign o" the ##liction

    ISE DEPT, SDMCET, DHARWAD Page 17

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    18/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    *.2.1 Su$ Sy,te! De,ign:

    )ere the sub system of the main application has been designed and the

    working of the application has been described.

    ig *.% Su$,y,te! de,ign "or d!in

     

    ig *.( Su$,y,te! de,ign "or u,er

    ISE DEPT, SDMCET, DHARWAD Page 18

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    19/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    *.% Dt lo5 Digr!:

    $ data flow diagram 3(-(4 is a graphical representation of the HflowH of datathrough an information system! modeling its process  aspects. 'ften they are a

     preliminary step used to create an overview of the system which can later be

    elaborated. (-(s can also be used for the visualization of data processing 3structured

    design4.

    $ (-( shows what kinds of data will be input to and output from the system!

    where the data will come from and go to! and where the data will be stored. It does

    not show information about the timing of processes! or information about whether 

     processes will operate in seuence or in parallel.

    ig *.* Dt "lo5 digr! "or ##liction

    ISE DEPT, SDMCET, DHARWAD Page 19

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    20/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    *.( Inter"ce Digr!:

    *.(.1 Client Ser'er )odel:

    ig *.6 Client ,er'er !odel

    *.* U)+ Digr!,:

    %nified +odeling #anguage 3%+#4 is a standardized general*

     purpose modeling language in the field of ob5ect*oriented software engineering. The

    %nified +odeling #anguage 3%+#4 is used to specify! visualize! modify! construct

    and document the artifacts of an ob5ect*oriented software*intensive system under 

    development. %+# combines techniues from data modeling 3entity relationship

    diagrams4! business modeling 3work flows4! ob5ect modeling! and component

    modeling. It can be used with all processes! throughout the software development life

    cycle! and across different implementation technologies.

    ISE DEPT, SDMCET, DHARWAD Page 20

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    21/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    *.*.1 Cl,, !odel:

    In software engineering! a class diagram in the %nified +odeling

    #anguage 3%+#4 is a type of static structure diagram that describes the structure of a

    system by showing the systems classes! their attributes! operations 3or methods4! and

    the relationships among the classes. The class diagram is the main building block 

    of ob5ect oriented modeling. It is used both for general conceptual modeling of the

    systematic of the application! and for detailed modeling translating the models

    into programming code. Elass diagrams can also be used for data modeling.

    DBconnect

    ./'nne/t&'n

    .$atabae

    .'en

    ./#'e

    Application

    .rtna%e

    .#atna%e

    ./'nta/tn%ber

    .e$&tr'#e

    .e$&tgr'

    .e$&tr&en$

    Connects database to application1 *

    ig *.7 Cl,, digr! "or o'er'ie5 o" ##liction

    profle

    .rtna%e

    .#atna%e

    ./'nta/tn%ber

    .e$&tr&en$#&t

    .e$&tgr'

    photos

    .'t'&$

    .'t'$e/r&t&'n

    .a$$&/

    .e$&tA#b%

    .genera#&n'r%at&'n

    * *

    Ma&nta&n

    ig *.8 Cl,, digr! "or #ro"ile

    ISE DEPT, SDMCET, DHARWAD Page 21

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    22/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    *.*.2 Ad'nced Cl,, Digr!:

    DBconnect

    ./'nne/t&'n

    .$atabae

    .$b/'nne/t01

    .',en01

    ./#'e01

    Registered user

    .2rtna%e

    .#atna%e

    .a$$re

    .e%a&$

    .a$$35r&en$01

    .re%'-e37r&en$01

    .e$&t3,r'2#e01

    .e$&t3gr'4,01

    Admin

    .4erna%e

    .,a*'r$

    .-&e*35ee$ba/801

    .b#'/834er01

    .4nb#'/834er01

    Profle

    .2rt na%e

    .e%,#'!%ent &n5'r%at&'n

    .genera# &n5'

    application

    .,r'2#e

    .gr'4,

    Alert message

    .en$3%eage01

    .en$3e%a

    riend_list

    .2n$35r&en$01

    .re%'-e35r&en$01photos

    .,6't'3&$

    .a#b4%3na%e

    .a$$3,6't'01

    .a$$3a#b4%01

    .re%'-e3,6't'01

    ig *.9 Ad'nced cl,, !odeling

    ISE DEPT, SDMCET, DHARWAD Page 22

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    23/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    *.*.% U,e C,e )odel,:

    In software and systems engineering! a use case is a list of steps! typically

    defining interactions between a role 3known in %+# as an actor4 and a system! to

    achieve a goal. The actor can be a human or an external system. In systems

    engineering! use cases are used at a higher level than within software engineering!

    often representing missions or stakeholder goals+

    S!te%

    user

    viewedit profle

    edit photos

    edit groups

    edit riend list

    sendrecieve messages

    login

    ig *.1 U,e c,e digr! "or d!ini,trtion

    ISE DEPT, SDMCET, DHARWAD Page 23

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    24/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    *.*.%.1 Ad'nced u,e c,e !odel:

    user

    login

    viewedit profle

    edit photo

    edit groups

    edit riend

    recieve messageemail

    Admin

    send messageemail

    99e:ten$;;

    99&n/#4$e;;

    database confmation

    99&n/#4$e;;

    bloc!unbloc! user

    ig *.11 Ad'nced u,e c,e "or entire ##liction

    ISE DEPT, SDMCET, DHARWAD Page 24

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    25/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    *.*.( Seuence !odel:

    er #'g&n-er&!reg&ter '%e,age $atabae ,r'#e %eage a$$reb'' gr', ,&/ r&en$

    1 < &te

    2 < t're &n'3 < reg&ter

    4

    5 < #'g&n

    6 < -er&!

    7 < g't' '%e,age

    8 < e$&t

    9

    10 < en$=re/&e-e %g

    11

    12 < e$&t an$ -&e* /'nta/t

    13

    14 < /reate an$ e$&t gr',

    1516 < ,#'a$ an$ -&e* ,&/

    17

    18 < a$$ an$ ear/ r&en$ *&t n&/ na%e

    19

    20

    21

    22

    23

    24

    ig *.12 Seuence digr! "or entire ##liction

    ISE DEPT, SDMCET, DHARWAD Page 25

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    26/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    er #'g&n-er&!reg&ter '%e,age $atabae ,r'#e %eage a$$reb'' gr', ,&/ r&en$

    1 < &te

    2 < t're &n'3 < reg&ter

    4

    5 < #'g&n

    6 < -er&!

    7 < g't' '%e,age

    8 < e$&t

    9

    10 < en$=re/&e-e %g

    11

    12 < e$&t an$ -&e* /'nta/t

    13

    14 < /reate an$ e$&t gr',

    1516 < ,#'a$ an$ -&e* ,&/

    17

    18 < a$$ an$ ear/ r&en$ *&t n&/ na%e

    19

    20

    21

    22

    23

    24

    ig *.1% Seuence !odel "or u#dting #ro"ile in"or!tion

    ISE DEPT, SDMCET, DHARWAD Page 26

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    27/56

    LOGIN

    Verify

    User Home Page

    rue

    PROFILE MESSAGES PICS  ADDRESSBOO

    FRIENDS COMMUNI!"

    fa#se

    EDI!

    PROFILE

    SEND

    MSG

    RECEIVE

    MSG ADD a$%

    VIE& PICS

     ADD a$% Vie'

    Co$ta(tsINVI!E a$%

     ACCEP!

    SEARCH a$%

    )OIN

    Create !o*i(

    a$% *ost Re*#y

    LOGOU!

    Prevention of unauthorized access of social accounts through web and mobile devices

    *.*.* Stte )odel:

    $ state diagram is a type of diagram used in computer science and related

    fields to describe the behavior of systems. 1tate diagrams reuire that the system

    described is composed of a finite number of states sometimesJ this is indeed the case!while at other times this is a reasonable abstraction. +any forms of state diagrams

    exist! which differ slightly and have different semantics.

    ig *.1( Stte digr! "or ##liction

    *.*.6 Concurrency )odel:

    ISE DEPT, SDMCET, DHARWAD Page 27

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    28/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    Eoncurrency is widely used in many new applications because of the

    usefulness of parallel processing. 0xamples of concurrency can be found in

     preemptive multitasking systems! multiple processor computers! and special networks

    of computers that work together to run a single program+

    ig *.1* Concurrency !odel

    *.*.7 Acti'ity )odel:

    ISE DEPT, SDMCET, DHARWAD Page 28

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    29/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    $ctivity diagrams are graphical representations of workflows of stepwise

    activities and actions with support for choice! iteration and concurrency. In

    the %nified +odeling #anguage! activity diagrams can be used to describe the

     business and operational step*by*step workflows of components in a system. $n

    activity diagram shows the overall flow of control+

    Logi$

    Profi#e Messages Pi(s  A%%ress

    +oo,

    Frie$%s a$%

    Commu$ity

    E%it Profi#e Se$%

    MessageRe(ei-e

    Message

     A%% Pi(s Vie' Pi(s  A%%

    Co$ta(t

    Vie'

    Co$ta(tSear(. a$%

    a%% Frie$%

    Logout

    ig *.16 Acti'ity digr! "or ##liction

    *.*.8 S5i!lne Digr!:

    ISE DEPT, SDMCET, DHARWAD Page 29

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    30/56

    Prevention of unauthorized access of social accounts through web and mobile devices

      $ swim lane 3or swimlane4 is a visual element used in process flow diagrams!

    or flowcharts that visually distinguishes responsibilities for sub*processes of 

    a business process. 1wim lanes may be arranged either horizontally or vertically. In

    the accompanying example! the swimlanes are named Eustomer! 1ales! Eontracts!

    #egal! and -ulfillment! and are arranged vertically+

    LOGIN HOME PAGE

    PROFILE EDI!

    PROFILE

    MESSAGES

    SEND

    MESSAGE

    RECIEVE

    MESSAGE

    PICS

    ADD PICS

    VIE&

    PICS

    COMMIUNI!"

    CREA!E

    COMMUNI!"

    )OIN

    COMMUNI!"

    FRIENDS SEARCH AND

    ADD FRIENDS

    Logout

    END SESSIONActivitiesHOME PAGEAuthentication

    ig *.17 S5i!lne digr! "or ##liction

    Ch#ter 6

    ISE DEPT, SDMCET, DHARWAD Page 30

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    31/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    I)P+E)ENTATION PHASE

    6.1 I!#le!enttion Detil,:

     The coding has been done in P)P language making use of "$+P server and

    +y12# is used for back end i.e database design.

    The modules used are?

    • #ogin/sign up

    • IP tracking

    • 1ending sms

    • Ehanging of password

    • 0diting -riends

    • 0diting photos

    The detailed description of above said modules are explained below.

    6.2 Algorith!:

    6.2.1 Algorith! "or login nd ,ignu#:

    This module gives the description for users who need to sign up for our social

    networking site. $fter registering he/she will login by the given nick name or 

    username. $fter logging in they can edit their profiles.

    Algorith!:

    1tep

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    32/56

    Prevention of unauthorized access of social accounts through web and mobile devices

      nic;n!eBPOSTnic;n!eFG

      #5dBPOST#5dFG

      ,lB,elect "ro! login 5here un!eBnic;n!e nd #5dB#5dG

      re,B!y,lueryJ,lKG

    LLLLL.

    ,lB,elect "ro! #ro"ile 5here un!eBnic;n!eG

      re,B!y,lueryJ,lKG

      ro5B!y,l"etchrryJre,KG

     SESSIONun!eFBnic;n!eG

     SESSION#ro"ileidFBro5#ro"ileidFG

     hederJloction: ho!e.#h#KG

    M

      el,e

     

      ,lB,elect countJK , cnt "ro! logchec; 5here un!eB.nic;n!e. G

    re,B!y,lueryJ,lKG

    ro5 B!y,l"etchrryJre,KG

    M

    @

    Out#ut:

    This code enables user to login.

    Sign u#:

    ?@#h# reuireJd$Connect.#h#KG @

    ?@#h#

    include Ju#lodcl,,.#h#KG ==cl,,e, i, the !# 5here the cl,, "ile i, ,tored Jone $o'e the

    rootK

      "n!eBPOST"n!eFG

      ln!eBPOSTln!eFG

      genderBPOSTgenderFG

    ISE DEPT, SDMCET, DHARWAD Page 32

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    33/56

    Prevention of unauthorized access of social accounts through web and mobile devices

      do$BPOSTdo$FG

      geBPOSTgeFG

      #ddre,,BPOST#ddre,,FG

      cddre,,BPOSTcddre,,FG

      #honenoBPOST#honenoFG

      r,ttu,BPOSTr,ttu,FG

      !o$ilenoBPOST!o$ilenoFG

    LLLLLLLLL..

    !/,i

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    34/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    dtBSo!eoneQ2i,Q2u,ingQ2urQ2id.Q2ro!Q2theQ2IPQ2ddre,,:Q2.

    ci#.Q2ndQ25ithQ2"ollo5ingQ2#5d,:G

    ,l B in,ert into logchec; 'lue,J .nic;n!e..#5d.KG

    !y,lueryJ,lKG

      ,lB,elect "ro! logchec; 5here un!eB.nic;n!e.G

      re,B!y,lueryJ,lKG

    5hileJro5B!y,l"etchrryJre,KK

     dt.Bro5#5dF.G

    M

    Out#ut:

    The particular Ip will be tracked

    6.2.% Algorith! "or Sending S)S:

    $fter tracking the IP address a message will be sent to user’s mobile

    intimating them about the suspicious activity going on in their account.

    Algorith!:

    1tep

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    35/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    M

    @

    ?@#h# includeJ,!,.#h#KG @

    ?@#h#

    ,l B in,ert into logchec; 'lue,J .nic;n!e..#5d.KG

    !y,lueryJ,lKG

    ,end,!,J!o$ilenu!$er dtKG

    @

    Out#ut:

    $n message in format*

    1omeone is using your id from IP address .>< and with following passwords

    BB!wer!;;;. Qour password has changed to G8>.

    6.2.( Algorith! to chnge the #,,5ord t ti!e o" ,ending S)S:

    "hen the message is being sent for reporting the suspicious activity along

    with that the changed new password will be sent.

    Algorith!:

    1tep

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    36/56

    Prevention of unauthorized access of social accounts through web and mobile devices

      1omeone is using your id from IP address .>< and with following passwords

    BB!wer!;;;. our #,,5ord h, chnged to 9(%.

    6.2.* Algorith! "or editing "riend li,t:

     )ere user can edit his friend list by adding or removing friends.

    Code "or ,erching "riend,:

    ?@#h# reuireJd$Connect.#h#KG @

    ?@#h# ,e,,ion,trtJKG @

    ?@#h#

    nic;n!eBPOSTnic;n!eFG

     ,lB,elect "ro! #ro"ile #generl#ro"ile g#eductionl#ro"ile e# 5here

    #.#ro"ileidBg#.#ro"ileid nd #.#ro"ileidBe#.#ro"ileid nd #.#ro"ileid?.

    SESSION#ro"ileidF. ndJ un!eB.nic;n!e. or "n!eB.nic;n!e. or

    ln!eB.nic;n!e.KG

      re,B!y,lueryJ,lKG

      @

    ?@#h# includeJheder.#h#KG @

      ?@#h# includeJto#!enu.#h#KG @

      ?=di'

      ?di' idB,itecontent

      ?di' idB#nel?i!g ,rcB,tyle=#nel.g ltBtree to#, =?=di'

     ?@#h# includeJl,idelin;,.#h#KG @

    ?di' idB+yer2

    ?t$le 5idthB6(2 $orderB lignBcenter

    ?@#h#

      5hileJro5B!y,l"etchrryJre,KK

      @

      ?tr

      ?td 5idthB261?#N!e: ?@#h# echo ro5"n!eF. .ro5ln!eFGG @?=#

      ?#Nic; N!e: ?@#h# echo ro5un!eFG @?=#

      ?#0ender: ?@#h# echo ro5genderFG @?=#

    ISE DEPT, SDMCET, DHARWAD Page 36

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    37/56

    Prevention of unauthorized access of social accounts through web and mobile devices

      ?#Age: ?@#h# echo ro5geFG @?=#?=td

    ?@#h#

      ,l2B,elect "ro! "riendreue,t 5here reue,teridB.SESSION#ro"ileidF. nd

    #ro"ileidB.ro5#ro"ileidF.G

    re,2B!y,lueryJ,l2KG

    i"Jro52B!y,l"etchrryJre,2KK

    @

      ?td 5idthB166?#riend Reue,t Pending?=#

    ?@#h#

    M

    el,e

    @

      ?td 5idthB166?#? hre"Bddreue,t.#h#@reue,ttoB?@#h# echo

    ro5#ro"ileidFG @);e riend ?=?=#

    LL.

      Out#ut:

     Particular person is searched and result is obtained.

    Code "or dding "riend:

    ?@#h# reuireJd$Connect.#h#KG @

    ?@#h# ,e,,ion,trtJKG @

    ?@#h#

    reue,ttoBRE4UESTreue,ttoFG

    @

    ?@#h#

      ridBRE4UESTreue,tidFG

      re,B!y,lueryJ,elect "ro! "riendreue,t 5here "riendreue,tidBridKG

      ro5B!y,l"etchrryJre,KG

      "riendidBro5reue,teridFG

      grou#Bro5"riendty#eFG

    ISE DEPT, SDMCET, DHARWAD Page 37

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    38/56

    Prevention of unauthorized access of social accounts through web and mobile devices

      #ro"ileidBSESSION#ro"ileidFG

      !y,lueryJu#dte "riendreue,t ,et ,ttu,BA##ro'ed 5here "riendreue,tidBridKG

      ,lBin,ert into !y"riend 'lue,Jnull#ro"ileid"riendidgrou#KG

      !y,lueryJ,lKG

      ,lBin,ert into !y"riend 'lue,Jnull"riendid#ro"ileidgrou#KG

      !y,lueryJ,lKG

    @

    ?,cri#t

    lertJriend AddedKG

    hi,tory.$c;JKG

    ?=,cri#t

    6.2.6 Algorith!=code "or editing #hoto,:

    !/,i

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    39/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    e/tr!,g%F B Select t le,t on "ile.G

    e/tr!,g(F B Select the "ileJ,K "or u#lod.G

    e/tr!,g*F B ou h'e tried to u#lod ?$.thi,>$d"ilen!e,. "ile,?=$ 5ith in'lid

    chrcter, in,ide the "ilen!e.G

    M

    return e/tr!,g!,gnu!FG

    M

    == thi, !ethod chec;e, the nu!$er o" "ile, "or u#lod

    == thi, e/!#le 5or;, 5ith one or !ore "ile,

    "unction count"ile,JK

    "orech Jthi,>n!e,rry , te,tK

    i" Jte,t B K

    thi,>nu!$ero""ile,G

    M

    M

    i" Jthi,>nu!$ero""ile, K

    return trueG

    M el,e

    return "l,eG

    M

    M

    Out#ut:

     The picture will be uploaded to his profile.

    6.% Detiled Anly,i, o" )in Ph,e, in Algorith!:

    ISE DEPT, SDMCET, DHARWAD Page 39

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    40/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    6.%.1 Anly,i, o" ,ending S)S nd E!il:

    The main phase is to send the message while any suspicious activity is going

    on in any users profile. The message facility is provided by using a sms server which

    receives the data i.e the particular IP address that has been tracked and the guessing passwords along with these the new password that has been reset by the administrator 

    to the 1+1 server and that delivers the message contents to the intended user’s

    mobile. The mobile number will be provided by the user during the time of 

    registration.

    $part from sending 1+1 an email will also be sent at the same time. -or this

    P)P 0mail function is used which helps to send emails and notifications about the

    suspicious activity in the user’s account.

    6.%.2 Anly,i, o" editing Pro"ile In"or!tion:

    %ser after getting registered can login by giving his username and password.

    $fter logging in the user can edit his/her profile information. %ser is also provided

    with adding of friends facility. )ere he can search friends by giving their most

     popular nick names. This reduces the search result and he will get intended resulteasily. %ser can upload the picture albums with the security. %ser is also provided

    with removing friend option. )e/she can block the unwanted people who are creating

    unnecessary mess in their profile. The detail algorithm and code has benn mentioned

    in above part.

    Ch#ter 7

    TESTIN0 PHASE

    ISE DEPT, SDMCET, DHARWAD Page 40

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    41/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    7.1 Te,t Pln,:

    This document explains testing methodology for RPreventing unauthorized

    access of social accounts using web and mobile devicesS.

    It lists out all the testing items and the testing procedures to be conducted on

    those items.

    The document describes the testing approaches followed and all the test case

    specifications for the application.

    It is to be used as a guide for the testing activity. The intended audience for 

    this document is the developer and the tester.

    7.2 Ty#e, o" te,t, crried out:

    7.2.1Unit Te,ting:

    %nit testing focuses verification efforts on the smallest unit of software design!

    the module .This is also known as Rmodule testingS. The modules are tested separatel

    y. This testing is carried out during programming stage itself. In these testing steps! ea

    ch module is found to working satisfactorily as regard to the expected output from the

    module.

    1. )odule N!e: RE0ISTRATION

    U,e C,e ID: UC1

    1. 1 )odule O'er'ie5:

    In this module the user get registers to the system by providing his personnel!

     professional and other details! and these details are stored in the database and assign

    him a voter Id! password through which he can login into the system.

    1.2 In#ut, to )odule:

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    42/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    9. Password8. -irst name! #ast name and +iddle name. $ge;. (ate of &irth:. $ddress

    B. Eontact detailsF. 0ducational and Professional details

    1.% Out#ut, "ro! )odule:

    $ new voter for a particular constituency is created.

    Table B.< Test cases and result for register user 

    U,e C,e

    No.

    Te,t c,e n!e Condition to $e

    te,ted

    Pre condition In#ut E/#ected re,ult

    %E

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    43/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    lengthS

    %E

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    44/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    . Ereate/(elete $ddress &ook;. 1end Invitation to -riend:. 1end/$ccept/7e5ect -riend 7euestB. Post Photos/+usic

    2.2 In#ut, to )odule:

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    45/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    %E9*9 $dd friends 1pecify the

     person whom

    you want to add.

    1erver should be

    running and

    website is

    opened.

    Persons

    name

    7euest is sent t

    that person

    %E9*8 (elete friends 1pecify the

     person whom

    you want to

    delete.

    1erver should be

    running and

    website is

    opened.

    Persons

    name

    Person is delete

    from the list

    %E9* 1end

    1craps/+essages

    1pecify person

    name to who

    scrap has to besent.

    1erver should be

    running and

    website isopened.

    Persons

    name

    +essage is sent

    successfully.

    %E9*; %pload photos $dd the photos

    that has to be

    uploaded

    1erver should be

    running and

    website is

    opened.

    1pecify

    Photo

    number 

    Photos uploaded

    successfully.

    %E9*: 0dit profile &asic

    information to be

    edited

    1erver should be

    running andwebsite is

    opened.

    1pecify

    details

    Profile updated

    %. )odule N!e: +ogin

    U,e C,e ID: UC%

    %.1 )odule O'er'ie5:

    )ere the user provides username and password.

    %.2 In#ut, to )odule:

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    46/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    U,e C,e

    No.

    Te,t c,e n!e Condition to $e

    te,ted

    Pre condition in#ut E/#ected

    re,ult

    %E8*< #ogin details

    validation

    %ser should fill

    all the fields

    1erver should be

    running and

    website is opened.

    The fields are

    left empty

    0rror message

    R-ields cannot

     be emptyS is

    displayed

    %E8*9 #ogin details

    validation

    %sername exists 1erver should be

    running and

    website is opened.

    0nter

    username

    which does

    not exist

    0rror message

    R%sername

    does not existS

    is displayed

    %E8*8 #ogin details

    validation

    If the user has

    entered valid

    username

    1erver should be

    running and

    website is opened.

    0nter invalid

    user name

    and then click 

    sign in.

    0rror message

    RInvalid

    usernameS is

    displayed

    %E8* #ogin details

    validation

    If user has

    entered his

    username.

    1erver should be

    running and

    website is opened.

    0nter only

    username and

    no password

    0rror message

    RPassword

    field emptyS is

    displayed

    %E8*; #ogin details

    validation

    %ser has entered

    username and

    corresponding

     password

    1erver should be

    running and

    website is opened.

    %ser enters

    username and

     password

    which does

    not match

    0rror message

    R%ser name

    and password

    does not

    matchS is

    displayed

    %E8*: #ogin details

    validation

    %ser has entered

    username and

    corresponding

     password

    1erver should be

    running and

    website is opened.

    %ser name

    and password

    are valid and

    matching.

    'pens the

    authentication

     page.

    (. )odule n!e: )e,,ge 'lidtion

    U,e C,e ID: UC(

    (.1 )odule O'er'ie5: 

    ISE DEPT, SDMCET, DHARWAD Page 46

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    47/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    )ere whether the same user will receive the text message simultaneously from

    different IP address or not will be checked.

    (.2 In#ut, to )odule:

    #ogin with wrong password

    (.% Out#ut "ro! !odule:

    $fter increasing the count a text message will be sent to user’s mobile.

    Table B. Test Eases for +essage validation

    U,e C,e

    No.

    Te,t c,e n!e Condition to $e

    te,ted

    Pre condition In#ut E/#ected

    re,ult

    %E*< +essage

    validation

    %ser must

    receive an

    message

    1erver should be

    running and

    website is

    opened.

    Incorrect

     password is

    given more than

    8 times

    0rror messa

    Rincorrect

     passwordS a

    message is

    sent.

    %E*9 +essage

    validation

    %ser must

    receive anmessage from

    different IP

    address

    1erver should be

    running and

    website is

    opened.

    Incorrect

     password is

    given at same

    time from

    different terminal

    0rror messa

    Rincorrect

     passwordS a

    message is s

    %E*8 +essage

    validation

    (ifferent user

    must receive

    message from

    same IP address

    1erver should be

    running and

    website is

    opened.

    Incorrect

     password is

    given more than

    8 times for

    different users

    account

    0rror messa

    Rincorrect

     passwordS a

    message is s

     =ext we carried out an integrted 5hite $o/ test which involved the working

    of the application as a whole. In this the user registered by giving his all basic

    information. $fter that user logged in by giving specific nickname /username and

     password. =ext the edit friend list module was integrated in which add friend and

    ISE DEPT, SDMCET, DHARWAD Page 47

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    48/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    delete friend modules worked appropriately and perfect result were obtained. $fter 

    this the next module edit photos were included which also gave perfect results. Then

    the most important aspect i.e the tracking of IP address was done and successfully

    messages were being sent to the intended users. %sers were able to get messages from

    different IP address and also different users getting messages from same location i.e

    IP address regarding their accounts suspicious activity.

    CHAPTER 8

    RESU+TS AND DISCUSSIONS

    8.1 Screen ,n#,hot,:

    ISE DEPT, SDMCET, DHARWAD Page 48

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    49/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    ig 8.1 ront #ge o" ##liction

    In#ut:* %ser runs the application.

    Out#ut:* The application takes user’s login information to get started.

    ig 8.2 Regi,ter=,ign u# "or!

    In#ut: %ser will give his all basic information and particular uniue nick name and

     password.

    Out#ut: $n account will be created by taking their basic information

    ISE DEPT, SDMCET, DHARWAD Page 49

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    50/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    ig 8.% Ho!e #ge "ter logged in

    ig 8.( -ie5ing "riend li,t

    ISE DEPT, SDMCET, DHARWAD Page 50

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    51/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    ig 8.* Te/t !e,,ge rece#tion during $rech

    CHAPTER 9

    APP+ICATIONS

    1ince our main concentration is to identify suspect tracking! the applied

    technology can be used in various fields to track the suspicious activity.

    • It is used in defense mechanism! for tracking of suspicious activities and false

    aliases in networking and authorized sites.

    • The same idea can even be extended in any type of suspect tracking which

    involves huge network of people.

    ISE DEPT, SDMCET, DHARWAD Page 51

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    52/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    • It can be used in social networking sites to identify the suspect user profiles.

    • It ensures data security between the users.

    &y using the nickname searching method user will be able to get his friend

    easily without lots of searching overhead.

    If user’s profiles are hacked then the economic cost involved in recovering the

    data is costly. &y using this application where in tracking is implemented and

     prevention measures are also undertaken.

    CHAPTER 1

    CONC+USION

    Independent developers are now capable of delivering applications that would

     be impossible without large team of resources. -or example! developers have

    combined ,oogle maps with numerous other sources of information to develop new

    and useful applications. &y making data available the idea of how to apply it is what

     becomes important. The developer is no longer concerned with basic plumbing and is

    freed up to think in broader terms in terms of overall application features.

    ISE DEPT, SDMCET, DHARWAD Page 52

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    53/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    In this! we have proposed a light*weight web system to identify aliases of a

     person on the "eb. &y using the presented technology! we will be able to detect

     persons with alias names. )ere we are presenting the methodology to prevent the

    suspicious activities. &y this application the user will get to know the information

    about the IP address from which the suspicious activity is going on. 1ince the users

    will receive the message containing the new password! they can later log in with this

    new password and change their password accordingly.

    This pro5ect gives the idea as how to use the advanced P)P functions and

    integrate different parts of the application. +any social networking sites do give the

    security aspects but here our application ensures that the user’s data are more secure

    and safe.

    CHAPTER 11

    UTURE SCOPE

    The work described above and included in this special theme section

    contributes to an on*going dialogue about the importance of social network sites! both

    for practitioners and researchers. @ast! uncharted waters still remain to be explored.

    +ethodologically! 1=131ocial =etworking "ebsites4 researchers ability to make

    causal claims is limited by a lack of experimental or longitudinal studies.

    ISE DEPT, SDMCET, DHARWAD Page 53

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    54/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    The technologies used can be further extended to provide great levels of 

    security in other fields. -rom our iPhone! we’ll be able to get movie recommendations

    from those in our network. "e’ll also be able to read reviews that our friends found

    helpful and find show times for the theatres in our vicinity! and then we’ll be able to

    check the location of our friends to determine how uickly they can meet us. )ackers

    accessing using iphones can also be tracked and suspicious activity can be stopped.

    REERENCE

    OOVS:

    • &eginning Php ; +ysl ; by ason ,ilmore.

    1ince we are using php as front end and +ysl as backend this books helps in

    learning many concepts.

    • 1ome parts of data communications and networking by &ehrouz -oruzan.

    ISE DEPT, SDMCET, DHARWAD Page 54

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    55/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    1ince we are dealing with the tracking of IP address! this helped us to know

    the concepts of IP.

    3ESITES:

    www.cse.msu.edu.com

    www.processimpact.com

    http?//www.techwr*l.com

    www.w8schools.com

    www.wikipedia!org

    http?//www.plus9net.com/php6tutorial/php6ip.php

    http?//www.wallpaperama.com/forums/how*to*display*ip*address*php*script*

    code*function*from*visitor*user*t8GG.html

    http?//www.daniweb.com/web*development/php/threads//;>>*>6*

    ;! 9>>;! pp. ;:G*;B>.

    • (. &ollegala! T. )onma! Q. +atsuo! and +. Ishizuka! HIdentification of 

     personal name aliases on the web!H in Proceedings of F! $pr. 9>>F.

    ISE DEPT, SDMCET, DHARWAD Page 55

  • 8/17/2019 Securing Socials Networks by preventing unauthorized access

    56/56

    Prevention of unauthorized access of social accounts through web and mobile devices

    • E. "hitelaw! $. Vehlenbeck! =. Petrovic! and #. %ngar! H"eb*scale

    named entity recognition!H in Proceedings of >F4! 9>>F.

    • ,. (. +. 7ennie and T. aakkola! H%sing term informativeness for named

    entity detection!H in Proceedings of $E+ 1I,I7 9>>;! 9>>;.

    • $. &agga and &. &aldwin! H0ntity*based cross document coreferencing

    using vector space model!H in E'#l=,GF! :4! 9>>:! pp.