CHAPTER 1
INTRODUCTION
1.1 Introduction to the technology:
The technology basically extracts the IP address of the machine from which a
breach is being made into a users social account and sends the IP address as a text
message to the user. It also refines internet searches by making alias identification
possible.
1.4 Methodology:
We make prevention of unauthorized access possible by extracting the IP
address of the machine from which the breach is being made and then delivering this
IP address along with a warning message to the user.
If the user himself enters a wrong password multiple number of times he/she
CHAPTER 2
ISE DEPT, SDMCET, DHARWAD
Page 1
Prevention of unauthorized access of social accounts through web and mobile devices
LITERATURE SURVEY
2.1 Methods and Theories:
In our application the user is supposed to register and then he/she can login by
giving the appropriate username and password. After this the user can edit his friend
list and other profile information. At the time of incorrect login the user will get a
message intimating about the suspicious activity going on in his account. User can
search his friends by giving their possible known popular nick names by which search
results are minimized and exact results are obtained.
Page 2
Prevention of unauthorized access of social accounts through web and mobile devices
Because of frequent reports of account breaches being made in social
networking accounts we came up with this idea to eradicate this problem to the
maximum extent possible. Our exhaustive work on this concept will surely help in
reducing the number of such security breaches.
Due to the suspicious activity and threats spread over WWW the continues
call for prevention of the security breaches. Here we have referred from many
previous inventions that have been done in order to prevent this insecurity.
CHAPTER 3
ISE DEPT, SDMCET, DHARWAD
Page 3
Prevention of unauthorized access of social accounts through web and mobile devices
TECHNOLOGY USED
3.2.1 Php:
3.2.2 My Sql:
number of databases.
The data in MySql is stored in database objects called tables. A table is a
collection of related data entries and it consists of columns and rows.
CHAPTER 4
Page 4
Prevention of unauthorized access of social accounts through web and mobile devices
SOFTWARE REQUIREMENT
SPECIFICATION
4.1 Introduction:
The purpose of this document is to present detailed description of the project
titled preventing unauthorized access of social accounts through mobile devices. The
intended users can get the messages if any unauthorized access is made to their mail
or social accounts. SRS is intended for the users, developers and Project review
committee. This application is known as preventing unauthorized access for social
accounts or mail accounts. It is a web based application.
This application provides users to create account and if any suspicious
activities in their account will be intimated to them by a message using their mobile
numbers. The main point of the project is to search their friends with any nick name
known and still the user will be able to get the intended search.
Page 5
Prevention of unauthorized access of social accounts through web and mobile devices
result even when the nick names are given for searching. There are no such products
available that provides proper result even on giving nick names. If unauthorized
access is done to any other users account message are sent to the legal user. Here it
makes use of networking protocol in order to send the messages.
4.2.3 Interfaces:
There is a GUI and no command line interface. The GUI is required for
accepting the users username and password. When there are some exceptions raising
error like entering invalid username and password, then error messages will be
displayed prompting the users to re-enter the details.
4.2.7 Operations:
User: He/She is responsible for logging in.
ISE DEPT, SDMCET, DHARWAD
Page 6
Prevention of unauthorized access of social accounts through web and mobile devices
Administrator: He will be responsible for authentication of user. Also responsible for
extracting the proper intended search result given the query using nick names. Also
responsible for sending messages to the authorized user if any suspicious activities are
done in their account.
system.
Send the message to the authorized user about the suspicious activity.
4.2.11 Constraint:
mobile device.
The user must provide his nick name during registration, so that given query
Page 7
Prevention of unauthorized access of social accounts through web and mobile devices
Quality Requirements:
Correctness: The system should work correctly until the intended results are
obtained. For example until the user gets the specified person it must work correctly.
Reliability: The database must be updated and must work all the time unless in case
of extreme circumstances.
Efficiency: This depends on internet speed. The higher the speed better is the
efficiency.
Integrity: The application uses the users username and password hence they need to
be secured.
Usability: The application must be usable by most of the users who are familiar with
social sites.
Flexibility: It is most important as the application must run on any browser provided.
The application has admin supervision and also users activities that can run on any
platform.
Portability: since the suspicious activities are informed through message on cell
phone, it will support any cell phones and the social networking site is also capable of
working in any platform.
Reusability: The system source code can be extended to provide many more features
that are specific to a particular situation.
Safety Requirements: Since the users getting registered to the social networking site
their username and passwords are stored with high security measures.
Reliability Requirements: Reliability is the ability of the system to deliver services
as specified. The application is 100% reliable if the users friends maintain updated
profiles.
Maintainability Requirements: The system source code should be updated as and
when there are changes made in the technology used.
Page 8
Prevention of unauthorized access of social accounts through web and mobile devices
The system will display login page. End user provides login name and
password to the system. Take the login details from the user to authenticate
the user
The output of the system will be the friends list to the end user.
4.3.2 Functions:
Page 9
Prevention of unauthorized access of social accounts through web and mobile devices
Page 10
Prevention of unauthorized access of social accounts through web and mobile devices
Administrator:
Query with nick names: The user issues query to admin giving nick name.
Search possible details: The admin will analyze the data and search for
possible appropriate outcomes.
Send the final list: The final lists of suggested friend are sent to the user.
Send the text message: The message is sent to the authenticated user about
his accounts suspicious activity.
Page 11
Prevention of unauthorized access of social accounts through web and mobile devices
Page 12
Prevention of unauthorized access of social accounts through web and mobile devices
Product requirements, Organizational requirements and External requirements.
Some of these related to our project are mentioned below4.3.6.1 Reliability:
Reliability is the ability of the system to deliver services as specified. The
application is 100% reliable if the users friends maintain updated profiles.
4.3.6.2 Availability:
Availability is the ability of the system to deliver services when requested.
Since the messages are sent to the cell phones about unauthorized access it must work
any time to the user.
4.3.6.3 Security:
Security is the ability of the system to protect itself against accidental or
deliberate intrusion. Since we are maintaining login details the information are kept
secured.
4.3.6.4 Maintainability:
Maintainability deals with the ability of the system which allows changes in
the system without affecting the existing components. World today has become
competitive in everything. As new requirements arrive from customer, we need to
make changes in the system and add functionalities. Since our system is built on
object-oriented technology it supports the maintainability to the great extent.
4.3.6.5 Portability:
Portability deals with the ability of the system being machine independent.
The application works on any computer that supports the installed servers. Hence it is
portable application.
Page 13
Prevention of unauthorized access of social accounts through web and mobile devices
Characteristic
H/M/L
Correctness
Efficiency
Flexibility
Integrity/Security
Interoperability
Maintainability
Portability
Reliability
Reusability
10
Testability
11
Usability
12
Availability
Page 14
10
11
12
Prevention of unauthorized access of social accounts through web and mobile devices
There is only one mode of operation. The user needs to get registered to our
social site.
4.3.7.2 User Class:
We have only one class. The user uses the application to fetch the friends list.
4.3.7.3 Objects:
The classes of objects in our system are User, Administrator, Application, our
social Website, Database, and Server. These Classes each have a single object and will
be represented along with their attributes and functions in a UML diagram in the
design document.
4.3.7.4 Features:
In order to obtain friends list the user need to input his username and
password that he has provided at the time of registration.
4.3.7.5 Stimulus:
If a user inputs proper username and password of his account his friends list
will be displayed else a proper error message will be displayed.
Depending on the decision taken by the poll, the schedule is reorganized or work is continued as per normal schedule.
CHAPTER 5
Page 15
Prevention of unauthorized access of social accounts through web and mobile devices
DESIGN PHASE
5.1 Architectural Design:
5.1.1 E.R Diagram:
In software engineering, an entity-relationship model (ER model for short) is
an abstract and conceptual representation of data. Entity-relationship modeling is
a database
modeling method,
used
to
produce
type
of conceptual
schema or semantic data model of a system, often a relational database, and its
requirements in a top-down fashion. Diagrams created by this process are
called entity-relationship diagram.
Page 16
Prevention of unauthorized access of social accounts through web and mobile devices
Most components described in the System design section will require a more
detailed discussion. Other lower-level components and subcomponents may need to
be described as well. Each subsection of this section will refer to or contain a detailed
description of a system software component. The design process for identifying the
subsystems making up a system and the framework for sub-system control and
communication is architectural design. The output of this design process is a
description of the software architecture.
Admin or User
Wamp Server
Web Browser.
Internet
Database
Mysql
Page 17
Prevention of unauthorized access of social accounts through web and mobile devices
Page 18
Prevention of unauthorized access of social accounts through web and mobile devices
Page 19
Prevention of unauthorized access of social accounts through web and mobile devices
Modeling
Language (UML)
is
standardized
general-
Page 20
Prevention of unauthorized access of social accounts through web and mobile devices
engineering,
a class
diagram in
the Unified
Modeling
Language (UML) is a type of static structure diagram that describes the structure of a
system by showing the system's classes, their attributes, operations (or methods), and
the relationships among the classes. The class diagram is the main building block
of object oriented modeling. It is used both for general conceptual modeling of the
systematic of the application, and for detailed modeling translating the models
into programming code. Class diagrams can also be used for data modeling.
Application
+firstname
+lastname
+contact_number
DBconnect
+connection
+database
1
+open()
+close()
* +edit_profile()
+edit_group()
+edit_friends()
Maintains
+general_information()
profile
photos
+firstname
*
+lastname
+contact_number
+photo_id
+photo_description
+add_pic()
+edit_Album()
+edit_friendlist()
+edit_groups()
Page 21
Prevention of unauthorized access of social accounts through web and mobile devices
DBconnect
+connection
+database
+dbconnect()
+open()
+close()
Alert message
+send_message()
+send_email()
Registered user
+firstname
+lastname
+address
+email_id
Admin
+username
+password
+add_friend()
+remove_Friend()
+edit_profile()
+edit_group()
+view_feedback()
+block_user()
+unblock_user()
Profile
+first name
+employment information
+general info
friend_ list
+find_friend()
+remove_friend()
photos
+photo_id
+album_name
+add_photo()
+add_album()
+remove_photo()
Page 22
Prevention of unauthorized access of social accounts through web and mobile devices
System
login
edit photos
edit groups
user
edit friend list
Page 23
Prevention of unauthorized access of social accounts through web and mobile devices
<<include>>
login
<<include>>
edit photo
database confimation
view/edit profile
send message/email
user
edit groups
Admin
<<extend>>
edit friend
block/unblock user
recieve message/email
Page 24
Prevention of unauthorized access of social accounts through web and mobile devices
user
register
login_verify
homepage
database
profile
message
address_book
groups
pics
friends
1 : site()
2 : store info()
3 : register()
4
5 : login()
6 : verify()
7 : goto homepage()
8 : edit()
9
10 : send/recieve msgs()
11
12 : edit and view contacts()
13
14 : create and edit groups()
15
16 : upload and view pics()
17
18 : add and search friends with nick name()
19
20
21
22
23
24
Page 25
Prevention of unauthorized access of social accounts through web and mobile devices
user
register
login_verify
homepage
database
profile
message
address_book
groups
pics
friends
1 : site()
2 : store info()
3 : register()
4
5 : login()
6 : verify()
7 : goto homepage()
8 : edit()
9
10 : send/recieve msgs()
11
12 : edit and view contacts()
13
14 : create and edit groups()
15
16 : upload and view pics()
17
18 : add and search friends with nick name()
19
20
21
22
23
24
Page 26
Prevention of unauthorized access of social accounts through web and mobile devices
LOGIN
false
Verify
true
User Home Page
PROFILE
EDIT
PROFILE
PICS
ADDRESS
BOOK
FRIENDS
ADD and
VIEW PICS
INVITE and
ACCEPT
MESSAGES
SEND
MSG
RECEIVE
MSG
LOGOUT
application
Page 27
COMMUNITY
SEARCH and
JOIN
Create Topic
and post Reply
Prevention of unauthorized access of social accounts through web and mobile devices
Concurrency is widely used in many new applications because of the
usefulness of parallel processing. Examples of concurrency can be found in
preemptive multitasking systems, multiple processor computers, and special networks
of computers that work together to run a single program.
Page 28
Prevention of unauthorized access of social accounts through web and mobile devices
Activity diagrams are graphical representations of workflows of stepwise
activities and actions with support for choice, iteration and concurrency. In
the Unified Modeling Language, activity diagrams can be used to describe the
business and operational step-by-step workflows of components in a system. An
activity diagram shows the overall flow of control.
Login
Edit Profile
Pics
Messages
Profile
Send
Message
Receive
Message
Add Pics
View Pics
Add
Contact
Logout
Friends and
Community
Address
book
Page 29
View
Contact
Search and
add Friend
Prevention of unauthorized access of social accounts through web and mobile devices
A swim lane (or swimlane) is a visual element used in process flow diagrams,
or flowcharts that visually distinguishes responsibilities for sub-processes of
a business process. Swim lanes may be arranged either horizontally or vertically. In
the accompanying example, the swimlanes are named Customer, Sales, Contracts,
Legal, and Fulfillment, and are arranged vertically.
Authentication
HOME PAGE
Activities
END SESSION
EDIT
PROFILE
PROFILE
SEND
MESSAGE
MESSAGES
RECIEVE
MESSAGE
ADD PICS
LOGIN
HOME PAGE
PICS
Logout
VIEW
PICS
CREATE
COMMUNITY
COMMIUNITY
JOIN
COMMUNITY
FRIENDS
SEARCH AND
ADD FRIENDS
Chapter 6
ISE DEPT, SDMCET, DHARWAD
Page 30
Prevention of unauthorized access of social accounts through web and mobile devices
IMPLEMENTATION PHASE
6.1 Implementation Details:
The coding has been done in PHP language making use of WAMP server and
MySQL is used for back end i.e database design.
The modules used are:
Login/sign up
IP tracking
Sending sms
Changing of password
Editing Friends
Editing photos
6.2 Algorithm:
6.2.1 Algorithm for login and signup:
This module gives the description for users who need to sign up for our social
networking site. After registering he/she will login by the given nick name or
username. After logging in they can edit their profiles.
Algorithm:
Step 1: User will go to register form and fills in the personal, contact and educational
information.
Step 2: After getting registered by making use of the username and password he/she
will login
Step 3: Then the user can continue with the remaining work.
Code:
LOGIN:
<?php
Page 31
Prevention of unauthorized access of social accounts through web and mobile devices
$nickname=$_POST["nickname"];
$pwd=$_POST["pwd"];
$sql="select * from login where uname='$nickname' and pwd='$pwd'";
$res=mysql_query($sql);
.
$sql="select * from profile where uname='$nickname'";
$res=mysql_query($sql);
$row=mysql_fetch_array($res);
$_SESSION["uname"]=$nickname;
$_SESSION["profile_id"]=$row["profile_id"];
header('location: home.php');
}
else
{
$sql="select count(*) as cnt from logcheck where uname='".$nickname."' ";
$res=mysql_query($sql);
$row =mysql_fetch_array($res);
}
?>
Output:
This code enables user to login.
Sign up:
<?php require('dbConnect.php'); ?>
<?php
include ("upload_class.php"); //classes is the map where the class file is stored (one above the
root)
$fname=$_POST["fname"];
$lname=$_POST["lname"];
$gender=$_POST["gender"];
Page 32
Prevention of unauthorized access of social accounts through web and mobile devices
$dob=$_POST["dob"];
$age=$_POST["age"];
$p_address=$_POST["p_address"];
$c_address=$_POST["c_address"];
$phone_no=$_POST["phone_no"];
$rstatus=$_POST["rstatus"];
$mobile_no=$_POST["mobile_no"];
..
$max_size = 8192*8192; // the max. size for uploading
?>
Output:
This code enables user to register themselves to application and also enables
uploading of the photo i.e profile picture
Page 33
Prevention of unauthorized access of social accounts through web and mobile devices
$data="Someone%20is%20using%20ur%20id.%20From%20the%20IP%20address:%20".
$cip."%20and%20with%20following%20pwds:";
$sql = "insert into logcheck values( '".$nickname."','".$pwd."')";
mysql_query($sql);
$sql="select * from logcheck where uname='".$nickname."'";
$res=mysql_query($sql);
while($row=mysql_fetch_array($res))
{
$data.=$row["pwd"].",";
}
Output:
The particular Ip will be tracked
Page 34
Prevention of unauthorized access of social accounts through web and mobile devices
}
?>
<?php include('sms.php'); ?>
<?php
$sql = "insert into logcheck values( '".$nickname."','".$pwd."')";
mysql_query($sql);
send_sms($mobile_number, $data);
?>
Output:
An message in formatSomeone is using your id from IP address 127.0.01 and with following passwords
77,@wer4,45545. Your password has changed to 9430.
$newpwd=rand(1000,9999);
$sql="update login set pwd='$newpwd' where uname='".$nickname."'";
mysql_query($sql);
$data.="%20Your%20Password%20has%20been%20changed%20to:%20$newpwd";
send_sms($mobile_number, $data);
?>
Output:
Page 35
Prevention of unauthorized access of social accounts through web and mobile devices
Someone is using your id from IP address 127.0.01 and with following passwords
77,@wer4,45545. Your password has changed to 9430.
Page 36
Prevention of unauthorized access of social accounts through web and mobile devices
<p>Age: <?php echo $row["age"]; ?></p></td>
<?php
$sql2="select * from friend_request where requester_id='".$_SESSION["profile_id"]."' and
profile_id='".$row["profile_id"]."'";
$res2=mysql_query($sql2);
if($row2=mysql_fetch_array($res2))
{
?>
<td width="166"><p>Friend Request Pending</p>
<?php
}
else
{
?>
<td width="166"><p><a href="add_request.php?request_to=<?php echo
$row["profile_id"]; ?>">Make Friend </a></p>
.
Output:
Particular person is searched and result is obtained.
Code for adding friend:
<?php require('dbConnect.php'); ?>
<?php session_start(); ?>
<?php
$request_to=$_REQUEST["request_to"];
?>
<?php
$rid=$_REQUEST["request_id"];
$res=mysql_query("select * from friend_request where friend_request_id='$rid'");
$row=mysql_fetch_array($res);
$friend_id=$row["requester_id"];
$group=$row["friend_type"];
Page 37
Prevention of unauthorized access of social accounts through web and mobile devices
$profile_id=$_SESSION["profile_id"];
mysql_query("update friend_request set status='Approved' where friend_request_id='$rid'");
$sql="insert into my_friend values(null,'$profile_id','$friend_id','$group')";
mysql_query($sql);
$sql="insert into my_friend values(null,'$friend_id','$profile_id','$group')";
mysql_query($sql);
?>
<script>
alert("Friend Added");
history.back();
</script>
Page 38
Prevention of unauthorized access of social accounts through web and mobile devices
$extra_msg[3] = "Select at least on file.";
$extra_msg[4] = "Select the file(s) for upload.";
$extra_msg[5] = "You have tried to upload <b>".$this->bad_filenames." files</b> with invalid
characters inside the filename.";
}
return $extra_msg[$msg_num];
}
// this method checkes the number of files for upload
// this example works with one or more files
function count_files() {
foreach ($this->names_array as $test) {
if ($test != "") {
$this->number_of_files++;
}
}
if ($this->number_of_files > 0) {
return true;
} else {
return false;
}
}
Output:
The picture will be uploaded to his profile.
Page 39
Prevention of unauthorized access of social accounts through web and mobile devices
Chapter 7
TESTING PHASE
ISE DEPT, SDMCET, DHARWAD
Page 40
Prevention of unauthorized access of social accounts through web and mobile devices
Page 41
Prevention of unauthorized access of social accounts through web and mobile devices
2.
3.
4.
5.
6.
7.
8.
Password
First name, Last name and Middle name
Age
Date of Birth
Address
Contact details
Educational and Professional details
UC1-2
UC1-3
Pre condition
Register user
Expected result
Register user
Register user
Server should
Error message
Filled
be running and
kept blank.
Fields cannot be
website is
empty is
opened.
displayed
Server should
Filled
be running and
are filled
Register user
empty is
opened.
displayed
Username is
Server should
Error message
username is
opened.
Server should
Enter username
which has
special
characters,
symbols.
Enter a
valid
be running and
unique
be running and
duplicate
username
website is
username.
already exists is
opened.
UC1-5
Register user
Fields cannot be
website is
website is
UC1-4
Input
tested
No.
UC1-1
Condition to be
displayed
Length of
Server should
Enter password
Error message
password is
be running and
Password must
greater than or
website is
than 6
be at least 6
equal to 6.
opened.
characters.
characters in
Page 42
Prevention of unauthorized access of social accounts through web and mobile devices
length
UC1-6
Register user
Age is greater
Server should
Error message
than or equal to
be running and
than 18
Invalid age
18
website is
Server should
Enter name
Error message
be running and
with digits or
Invalid name is
website is
some special
displayed
opened.
characters
Contact number
Server should
Enter name
Error message
is correct
be running and
with digits or
Invalid contact
website is
some special
number is
opened.
characters
displayed
Email ID is
Server should
Enter invalid
Error message
correct
be running and
email-id
Invalid email
opened.
UC1-7
UC1-8
UC1-9
Register user
Register user
Register user
Name is correct
website opened.
UC1-10
Register user
ID is displayed
Contact number
Server should
Enter name
Error message
is correct
be running and
with digits or
Invalid contact
website is
some special
number is
opened.
characters
displayed
Page 43
Prevention of unauthorized access of social accounts through web and mobile devices
4.
5.
6.
7.
Pre condition
Input
Expected result
tested
No.
UC2-1
Condition to be
Create / delete
Specify
Server should be
Community
If it is creation
community
Community
running and
name
then a group is
name/Deleting
website is
created or if it is
must be present
group is deleted
Page 44
Prevention of unauthorized access of social accounts through web and mobile devices
UC2-2
Add friends
Specify the
Server should be
Persons
Request is sent to
person whom
running and
name
that person
website is
opened.
UC2-3
UC2-4
UC2-5
Specify the
Server should be
Persons
Person is deleted
person whom
running and
name
you want to
website is
delete.
opened.
Send
Specify person
Server should be
Persons
Message is sent
Scraps/Messages
name to who
running and
name
successfully.
scrap has to be
website is
sent.
opened.
Server should be
Specify
Photos uploaded
that has to be
running and
Photo
successfully.
uploaded
website is
number
Delete friends
Upload photos
opened.
UC2-6
Edit profile
Basic
information to be
edited
Server should be
running and
website is
opened.
Specify
details
Page 45
Profile updated
Prevention of unauthorized access of social accounts through web and mobile devices
Use Case
input
tested
No.
UC3-1
Pre condition
result
Login details
Server should be
Error message
validation
running and
left empty
Fields cannot
website is opened.
UC3-2
Expected
Login details
Username exists
validation
be empty is
Server should be
Enter
running and
username
displayed
Error message
Username
does not exist
is displayed
not exist
UC3-3
UC3-4
UC3-5
Login details
Server should be
Enter invalid
Error message
validation
entered valid
running and
user name
Invalid
username
displayed
Error message
Password
field empty is
displayed
Login details
If user has
Server should be
Enter only
validation
entered his
running and
username and
username.
Login details
Server should be
User enters
Error message
validation
username and
running and
username and
User name
corresponding
password
UC3-6
username is
and password
which does
does not
not match
match is
Login details
Server should be
User name
displayed
Opens the
validation
username and
running and
and password
authentication
corresponding
password
matching.
Page 46
page.
Prevention of unauthorized access of social accounts through web and mobile devices
Here whether the same user will receive the text message simultaneously from
different IP address or not will be checked.
4.2 Inputs to Module:
Login with wrong password
Condition to be
No.
tested
UC4-1
UC4-2
Pre condition
Expected
result
Message
User must
Server should be
Incorrect
Error messag
validation
receive an
running and
password is
incorrect
message
website is
password an
opened.
3 times
message is
Message
User must
Server should be
Incorrect
sent.
Error messag
validation
receive an
running and
password is
incorrect
message from
website is
given at same
password an
different IP
opened.
time from
message is se
different terminal
address
UC4-3
Input
Message
Different user
Server should be
Incorrect
Error messag
validation
must receive
running and
password is
incorrect
message from
website is
password an
same IP address
opened.
3 times for
message is se
different users
account
Next we carried out an integrated white box test which involved the working
of the application as a whole. In this the user registered by giving his all basic
information. After that user logged in by giving specific nickname /username and
password. Next the edit friend list module was integrated in which add friend and
ISE DEPT, SDMCET, DHARWAD
Page 47
Prevention of unauthorized access of social accounts through web and mobile devices
delete friend modules worked appropriately and perfect result were obtained. After
this the next module edit photos were included which also gave perfect results. Then
the most important aspect i.e the tracking of IP address was done and successfully
messages were being sent to the intended users. Users were able to get messages from
different IP address and also different users getting messages from same location i.e
IP address regarding their accounts suspicious activity.
CHAPTER 8
Page 48
Prevention of unauthorized access of social accounts through web and mobile devices
Page 49
Prevention of unauthorized access of social accounts through web and mobile devices
Page 50
Prevention of unauthorized access of social accounts through web and mobile devices
CHAPTER 9
APPLICATIONS
Since our main concentration is to identify suspect tracking, the applied
technology can be used in various fields to track the suspicious activity.
The same idea can even be extended in any type of suspect tracking which
involves huge network of people.
Page 51
Prevention of unauthorized access of social accounts through web and mobile devices
It can be used in social networking sites to identify the suspect user profiles.
CHAPTER 10
CONCLUSION
Independent developers are now capable of delivering applications that would
be impossible without large team of resources. For example, developers have
combined Google maps with numerous other sources of information to develop new
and useful applications. By making data available the idea of how to apply it is what
becomes important. The developer is no longer concerned with basic plumbing and is
freed up to think in broader terms in terms of overall application features.
ISE DEPT, SDMCET, DHARWAD
Page 52
Prevention of unauthorized access of social accounts through web and mobile devices
In this, we have proposed a light-weight web system to identify aliases of a
person on the Web. By using the presented technology, we will be able to detect
persons with alias names. Here we are presenting the methodology to prevent the
suspicious activities. By this application the user will get to know the information
about the IP address from which the suspicious activity is going on. Since the users
will receive the message containing the new password, they can later log in with this
new password and change their password accordingly.
This project gives the idea as how to use the advanced PHP functions and
integrate different parts of the application. Many social networking sites do give the
security aspects but here our application ensures that the users data are more secure
and safe.
CHAPTER 11
FUTURE SCOPE
The work described above and included in this special theme section
contributes to an on-going dialogue about the importance of social network sites, both
for practitioners and researchers. Vast, uncharted waters still remain to be explored.
Methodologically, SNS(Social Networking Websites) researchers' ability to make
causal claims is limited by a lack of experimental or longitudinal studies.
ISE DEPT, SDMCET, DHARWAD
Page 53
Prevention of unauthorized access of social accounts through web and mobile devices
The technologies used can be further extended to provide great levels of
security in other fields. From our iPhone, well be able to get movie recommendations
from those in our network. Well also be able to read reviews that our friends found
helpful and find show times for the theatres in our vicinity, and then well be able to
check the location of our friends to determine how quickly they can meet us. Hackers
accessing using iphones can also be tracked and suspicious activity can be stopped.
REFERENCE
BOOKS:
Since we are using php as front end and Mysql as backend this books helps in
learning many concepts.
Page 54
Prevention of unauthorized access of social accounts through web and mobile devices
Since we are dealing with the tracking of IP address, this helped us to know
the concepts of IP.
WEBSITES:
www.cse.msu.edu.com
www.processimpact.com
http://www.techwr-l.com
www.w3schools.com
www.wikipedia,org
http://www.plus2net.com/php_tutorial/php_ip.php
http://www.wallpaperama.com/forums/how-to-display-ip-address-php-scriptcode-function-from-visitor-user-t399.html
http://www.daniweb.com/web-development/php/threads/139854/php-scriptfor-upload-photos
http://www.reconn.us/content/view/30/51/
http://www.webdeveloper.com/forum/showthread.php?t=170285
http://download.cnet.com/SMS-Messaging-Server/3000-10440_410415638.html
IEEE PAPERS:
Page 55
Prevention of unauthorized access of social accounts through web and mobile devices
Page 56