0% found this document useful (0 votes)
5 views6 pages

Sihfinalpt 20240930142155

This is the smart india hackathon ppt

Uploaded by

kushdwivedikd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views6 pages

Sihfinalpt 20240930142155

This is the smart india hackathon ppt

Uploaded by

kushdwivedikd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

SMART INDIA HACKATHON 2024

TITLE PAGE

• Problem Statement ID – 1775

• Problem Statement Title - Fake social media

accounts and thier detection

• Theme- Blockchain and Cybersecurity

• PS Category- Software

• Team ID- 46548

• Team Name (Registered on portal)- Team Detectors


team
detectors IDEA AND APPROACH TO THE SOLUTION

IDEA : We are here to propose a idea about “fake profile detection system” which can detect a fake profile on social media. Our
major goal is to ensure the Security & Privacy of the public (specially for teenage child & women ) who are using social media
platforms.

Proposed solution:- We are come with a Solution to designed a System named “Mithyadarpan “ to enhance cyber
safety of users by using features like Data extraction and execution , preprocessing, logic pattern analysis of data and
comparison of IP location, Multiple Account detection and Cross-site scripting to detect a fake social media account

Feature Extraction: Identify key features that distinguish fake profiles from genuine ones, such as profile picture presence,
account age, follower to following ratio, and activity patterns.

IP and Device Tracking:


• IP address analysis: Our system track IP addresses to detect multiple accounts coming from the same IP or sudden changes in IP that don't correspond to
normal user behavior
• Device ID tracking: Our system might track device fingerprints. If the same device is used to create many different accounts, it may be flagged.
Uniqueness of our solution :
• Our detection system has zero-tolerance policy against scammer. we will send a warning in his/her email that our system ban their
accounts if they couldn't complete our verification test. Devices used for cheating will also be banned from using any other social media
accounts.
• User reports: users can report suspicious accounts for further investigation, which can lead to a closer review of the reported
account’s activity.

Cons:- IP ban is not an effective measure because Scammer may use public Wi-Fi and in such cases, banning IP will affect other innocent Users. We are
aware of the account exploit and are working continuously to counter this loophole. Currently, we will ban accounts immediately after misconduct.
This makes scammer using fake accounts relatively meaningless.
Team
detectors
TECHNICAL APPROACH

• PROGRAMMING LANGUAGE
Frontend:- html5 ,CSS & JavaScript
Backend:- Python, Node.js, Java

• Implement the Database


ML:- TensorFlow ,PyTorch
Framework:- Django, Flask

• Software and Frameworks


MongoDB, Firebase

• Machine learning and deep learning


Decision tree
CNNs:- Conventional neural
network
ANNs:- Artificial neural network
GNNs:- Graph neural network
Team
detectors
FEASIBILITY AND VIABILITY
• Feasibility of Fake Accounts

• - Easy creation with minimal verification


• - Anonymity and customizable profiles
• - Accessibility and cost-effectiveness
• - Motivations: online freedom, social experimentation, cyberbullying, financial gain

• Consequences of Fake Accounts

• - Online harassment and bullying


• - Misinformation and propaganda Viability of Detection
• - Identity theft and impersonation
• - Security risks and data breaches - AI-powered detection: 80-90% effective
- Human-based detection: 50-70% effective
• Detection Methods
- Combination of both: 90-95% effective

• - AI-powered algorithms and machine learning


• - Facial recognition and IP address tracking
• - User reporting and community moderation
• - Natural Language Processing (NLP) analysis
Team
detectors
IMPACT AND BENEFITS

IMPACTS
• One of the main problems is social bots or harmful accounts. They can play both a negative and a
positive role, but most often they are a tool for **reducing trust in social networks, mass theft of
personal data.**-
• This not only erodes trust in legitimate sources of information but also has real-world
consequences, such as **influencing elections or public health decisions**. Furthermore, fake
social media profiles can facilitate online harassment and cyberbullying.
• Spread fake and false information-
• Damage reputation of victim-
• Send false friend requests-
• Lure children and teen agers with fake identity-
• Makes the friends and family of victim vulnerable to cyber-attacks like phishing, fake links,
malware attacks etc.- Financial fraud may also happen by requesting money using
messenger/message services.

BENEFITS
• Public Safety and Security :-By using machine learning algorithms to identify fake accounts, organizations
can prevent fraud and protect their users financial information.
• It is important to verify social media accounts because
• It helps to distinguish real accounts from fake or impersonator accounts
• Verification adds credibility to the account and assures followers that the information and content shared by the account
holder are legitimate .
Team
detectors
RESEARCH AND REFERENCES

Infographic Credit: USCasinos.com

For Data Research we are using of top 3 U.S region because we have lack of resoures for ground level research But in future we are collect data

Source: University of California, Berkeley Study


A 2022 study estimated that around 11% of Facebook accounts are Fake

Source: HootSuite’S 2022 Digital report

another study suggested that up to 20% of Instagram accounts might be fake

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy