SlideShare a Scribd company logo
1 of 2
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4042
System to Identify AND Define Security Threats TO THE Users ABOUT
THE Illegitimate Installed Applications
Shashank Machare1, Mahesh Patil2, Ashwini Bansode3, Tanvi Pawar4, Mr. A.N Gedam5
1,2,3,4Student, Dept. of Computer Engineering, A.I.S.S.M.S. Polytechnic, Pune, Maharashtra, India
5Lecturer, Dept. of Computer Engineering, A.I.S.S.M.S. Polytechnic, Pune, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract – Mobile security is one of the most important
aspect when it comes to keeping our data secure from any
external attack like phishing, data hacking and many other
attacks that can have very disastrous effects that may also
lead to social disturbance, as in one’s private data can be
made public by the attackers. Indeed, one of the main reason
for such attacks to get executed, the hacker need to get into
the victim’s mobile phone’s system through which it can look
for the loopholes that will lead him/her to the data that
could be extracted by using the hacking techniques. Access
to a very large amount of data in various formats like
images and videos can be gained by simply getting inside
the phone memory through a third-party application that
has access to the phone’s memory. Hence, there’s a need of
an application software that will detect such applications by
scanning throughout the phones memory and inform the
user about the possible threats posed by them.
KeyWords: Application, Software, Security, Memory,
third-party applications, scanning.
1. INTRODUCTION
The android systems are usually found to be vulnerable to
the external threats as the mobile devices are all the time
exposed to the spywares and malwares that are spread
throughout the internet abundantly. The hackers can
easily gain access to a mobile phone which is connected to
the internet through the website which the device is
currently logged on. Hacker does the work of gaining
access in the user’s mobile device by using various
techniques and harmful spywares. Data can be observed,
and also exploited by the hackers easily. This can also be
done by getting into the victim’s phone’s operating system
through an .apk file. Usually, the applications are
downloaded from the android play store which comes
with the very famous google play protect scanning feature
that helps in keeping the platform free from such
applications that carry special encoded software programs
to intentionally observe and steal user data from the
phone memory. Of course everyone are aware that the
play store is not the only source to download applications
from, one such platform is the infamous ‘Internet’, by
using an application browser we can access the web which
is daily flooded with so many harmful applications that
have been specially designed to steal the user data.
Applications downloaded from the internet through a
browser usually are not scanned for malwares, hence
putting the user data at risk. These applications may carry
specialized codes, on execution may look for private user
data from the system memory and send it to the hacker’s
servers through the internet connection. We usually refer
to such application as third-party applications and are
installed by the user themselves unaware of the threats
they may pose. Many times the applications are auto
downloaded or installed in the phone memory whenever
we visit a harmful website. Hence it is necessary to have
an application that does the work of detecting such
applications files lying inside the phone memory or are
installed without the user knowledge.
1.1 PROBLEM DEFINITION
The main purpose of making an application that can scan
through the phone memory and identify the underlying
applications files that have been downloaded and are
present in the system storage without the user’s
knowledge is to completely nullify the possibility of a
security threat i.e data loss or hacking by the hackers.
1.2 LITERATURE SURVEY
All the modern devices come with in-built system to fight
against the already acknowledged viruses by the operating
system developers, which is updated through the regular
security patches. But one main features missing in it is
about finding the applications that have been installed or
only downloaded and are yet to be installed in the phone
memory from the unknown sources and could be easily
identified as illegitimate application files that may
potentially harm a device. So here we propose a ‘System to
identify and define security threats to the users about the
illegitimate installed applications’. By using ‘MobiSecure’
application, the users can find the applications files that
have been downloaded into their phone’s memory without
their knowledge.
2. PROPOSED METHODOLOGY
The proposed framework is an application that has all the
ability to look throughout the phone memory for the
application files usually with ‘.apk’ extension. The main
reason behind the development of application is the ability
to offer real-time diagnosis of latest installed or
downloaded files that can lead to cyber-attacks. The
normal mobile phone users should be aware of every
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4043
installed application and their corresponding threats,
which ideally are not known to majority of them, hence we
aim at providing the users information about the threats a
latest installed application software or file may contain.
‘System to identify and define security threats to the users
about the illegitimate installed applications’ has following
features:
 User and Device Interface
 File scanning function
 Threat finding feature
 Suggestion of threats to the user
 Listing the application files that are system-default
hidden
3. SYSTEM ARCHITECTURE AND FUNCTIONING
The application developed is capable of running on
minimum API 19 level that is it will support 97.3%
android devices. The application has 2 main modules
namely, Home page and Result display page. Our
application is designed to scan for illegitimate applications
that have been installed from unknown sources eg.
Browser, shared through different media sharing
platforms etc. Such application acts as the medium for
various cyber attacks that would be executed by the
hackers.
Explaining the modules:
1. Home page
Home page consist of a short summary to our application
and its features and a scan button which on clicked starts
to look for .apk files that usually don’t come from a
legitimate source, provided the data on the phone memory
is accessible.
2. Result page
As soon as the scan is complete, the results from the scan
i.e list of application is displayed on the result page with a
short description. Also to make it more convenient for the
users to take action on those applications, we provide with
an option that will trigger the deletion of that specific
application file from the phone memory hence nullifying
all the risk the user were first exposed to.
Fig -1: System Architecture
4. CONCLUSION
Using mobile application that has the capability of
identifying the applications that may contain malware can
substantially decrease the threat of various cyber attacks
that are drastically increasing in this growing world of
computers. ‘MobiSecure’ can nullify the risk of cyber
attacks by identifying the applications that have been
installed from illegitimate sources and providing the user
an option to delete those applications from the phone
memory.
5. REFERENCES
[1] P.K.Dixit, “Android”, 2014.
[2] Philip K. Dick, “Do Androids Dream Of Electric Sheep?:
The inspiration behind Blade Runner and Blade
Runner 2049” , 16 Feb 2012
[3] Dave Maclean, Satya Komatineni, Grant Allen “Pro
Android 5 (Apress)” , 2015
[4] Anubhav Pradhan,Anil V. Deshpande, ”Composing
Mobile App, Learn | Explore | Apply” , 2014
[5] Clifton ,“Andriod User Interfce Design: Implementing
Material Design for Developers” , 3 Mar 2016
[6] Jon Erickson, “Hacking: The art of exploitation”, 2nd
Edition
[7] Steven Furnell, “Mobile Security: A pocket guide”, July
2009

More Related Content

What's hot

Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIJIR JOURNALS IJIRUSA
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...MOBIQUANT TECHNOLOGIES
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...eSAT Journals
 
Security and privacy in smartphones
Security and privacy in smartphonesSecurity and privacy in smartphones
Security and privacy in smartphonesMysa Vijay
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for androidJPINFOTECH JAYAPRAKASH
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...IJNSA Journal
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedNoNameCon
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security FirewallIRJET Journal
 
Android open-source operating System for mobile devices
Android open-source operating System for mobile devicesAndroid open-source operating System for mobile devices
Android open-source operating System for mobile devicesIOSR Journals
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperMichael Murphy
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsJPINFOTECH JAYAPRAKASH
 
How to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeHow to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeJai Mehta
 

What's hot (20)

Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
Android anti virus analysis
Android anti virus analysisAndroid anti virus analysis
Android anti virus analysis
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...
 
Security and privacy in smartphones
Security and privacy in smartphonesSecurity and privacy in smartphones
Security and privacy in smartphones
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Irjet v7 i4693
Irjet v7 i4693Irjet v7 i4693
Irjet v7 i4693
 
Android malware
Android malwareAndroid malware
Android malware
 
Android malware
Android malwareAndroid malware
Android malware
 
Mobile security
Mobile securityMobile security
Mobile security
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security Firewall
 
Android open-source operating System for mobile devices
Android open-source operating System for mobile devicesAndroid open-source operating System for mobile devices
Android open-source operating System for mobile devices
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
 
I018145157
I018145157I018145157
I018145157
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applications
 
How to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeHow to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security Knowledge
 

Similar to System to Identify Security Threats from Illegitimate Apps

Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...IJECEIAES
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine LearningIRJET Journal
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDIRJET Journal
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSBRNSSPublicationHubI
 
I03402059063
I03402059063I03402059063
I03402059063theijes
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityMohammad Khreesha
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyserTim Youm
 

Similar to System to Identify Security Threats from Illegitimate Apps (20)

Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine Learning
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
185
185185
185
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
I03402059063
I03402059063I03402059063
I03402059063
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Android security
Android securityAndroid security
Android security
 
Android security
Android securityAndroid security
Android security
 

More from aissmsblogs

Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdfPaper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdfaissmsblogs
 
PPT- RVN (1).pptx
PPT- RVN (1).pptxPPT- RVN (1).pptx
PPT- RVN (1).pptxaissmsblogs
 
Newsletter _Brother’s kitchen. updated.pdf
Newsletter _Brother’s kitchen. updated.pdfNewsletter _Brother’s kitchen. updated.pdf
Newsletter _Brother’s kitchen. updated.pdfaissmsblogs
 
Research paper description suk
Research paper description sukResearch paper description suk
Research paper description sukaissmsblogs
 
Research paper mrpr
Research paper mrprResearch paper mrpr
Research paper mrpraissmsblogs
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124aissmsblogs
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeastaissmsblogs
 
422 3 smart_e-health_care_using_iot_and_machine_learning
422 3 smart_e-health_care_using_iot_and_machine_learning422 3 smart_e-health_care_using_iot_and_machine_learning
422 3 smart_e-health_care_using_iot_and_machine_learningaissmsblogs
 
Ijsartv6 i336122
Ijsartv6 i336122Ijsartv6 i336122
Ijsartv6 i336122aissmsblogs
 

More from aissmsblogs (20)

Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdfPaper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
Paper publications details of all Staff-2019-20(Other).xlsx - M R Talware.pdf
 
PPT- RVN (1).pptx
PPT- RVN (1).pptxPPT- RVN (1).pptx
PPT- RVN (1).pptx
 
Newsletter _Brother’s kitchen. updated.pdf
Newsletter _Brother’s kitchen. updated.pdfNewsletter _Brother’s kitchen. updated.pdf
Newsletter _Brother’s kitchen. updated.pdf
 
45 (1)
45 (1)45 (1)
45 (1)
 
Research paper description suk
Research paper description sukResearch paper description suk
Research paper description suk
 
Research paper mrpr
Research paper mrprResearch paper mrpr
Research paper mrpr
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeast
 
422 3 smart_e-health_care_using_iot_and_machine_learning
422 3 smart_e-health_care_using_iot_and_machine_learning422 3 smart_e-health_care_using_iot_and_machine_learning
422 3 smart_e-health_care_using_iot_and_machine_learning
 
Ijsartv6 i336122
Ijsartv6 i336122Ijsartv6 i336122
Ijsartv6 i336122
 
Ijsrdv6 i120151
Ijsrdv6 i120151Ijsrdv6 i120151
Ijsrdv6 i120151
 
Ijsrdv8 i10424
Ijsrdv8 i10424Ijsrdv8 i10424
Ijsrdv8 i10424
 
Ijsrdv8 i10550
Ijsrdv8 i10550Ijsrdv8 i10550
Ijsrdv8 i10550
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Ijsrdv8 i10398
Ijsrdv8 i10398Ijsrdv8 i10398
Ijsrdv8 i10398
 
Ijsrdv7 i10842
Ijsrdv7 i10842Ijsrdv7 i10842
Ijsrdv7 i10842
 
Ijsrdv8 i10772
Ijsrdv8 i10772Ijsrdv8 i10772
Ijsrdv8 i10772
 
Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
 
Irjet v7 i3290
Irjet v7 i3290Irjet v7 i3290
Irjet v7 i3290
 
Ijsrdv7 i10318
Ijsrdv7 i10318Ijsrdv7 i10318
Ijsrdv7 i10318
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

System to Identify Security Threats from Illegitimate Apps

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4042 System to Identify AND Define Security Threats TO THE Users ABOUT THE Illegitimate Installed Applications Shashank Machare1, Mahesh Patil2, Ashwini Bansode3, Tanvi Pawar4, Mr. A.N Gedam5 1,2,3,4Student, Dept. of Computer Engineering, A.I.S.S.M.S. Polytechnic, Pune, Maharashtra, India 5Lecturer, Dept. of Computer Engineering, A.I.S.S.M.S. Polytechnic, Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – Mobile security is one of the most important aspect when it comes to keeping our data secure from any external attack like phishing, data hacking and many other attacks that can have very disastrous effects that may also lead to social disturbance, as in one’s private data can be made public by the attackers. Indeed, one of the main reason for such attacks to get executed, the hacker need to get into the victim’s mobile phone’s system through which it can look for the loopholes that will lead him/her to the data that could be extracted by using the hacking techniques. Access to a very large amount of data in various formats like images and videos can be gained by simply getting inside the phone memory through a third-party application that has access to the phone’s memory. Hence, there’s a need of an application software that will detect such applications by scanning throughout the phones memory and inform the user about the possible threats posed by them. KeyWords: Application, Software, Security, Memory, third-party applications, scanning. 1. INTRODUCTION The android systems are usually found to be vulnerable to the external threats as the mobile devices are all the time exposed to the spywares and malwares that are spread throughout the internet abundantly. The hackers can easily gain access to a mobile phone which is connected to the internet through the website which the device is currently logged on. Hacker does the work of gaining access in the user’s mobile device by using various techniques and harmful spywares. Data can be observed, and also exploited by the hackers easily. This can also be done by getting into the victim’s phone’s operating system through an .apk file. Usually, the applications are downloaded from the android play store which comes with the very famous google play protect scanning feature that helps in keeping the platform free from such applications that carry special encoded software programs to intentionally observe and steal user data from the phone memory. Of course everyone are aware that the play store is not the only source to download applications from, one such platform is the infamous ‘Internet’, by using an application browser we can access the web which is daily flooded with so many harmful applications that have been specially designed to steal the user data. Applications downloaded from the internet through a browser usually are not scanned for malwares, hence putting the user data at risk. These applications may carry specialized codes, on execution may look for private user data from the system memory and send it to the hacker’s servers through the internet connection. We usually refer to such application as third-party applications and are installed by the user themselves unaware of the threats they may pose. Many times the applications are auto downloaded or installed in the phone memory whenever we visit a harmful website. Hence it is necessary to have an application that does the work of detecting such applications files lying inside the phone memory or are installed without the user knowledge. 1.1 PROBLEM DEFINITION The main purpose of making an application that can scan through the phone memory and identify the underlying applications files that have been downloaded and are present in the system storage without the user’s knowledge is to completely nullify the possibility of a security threat i.e data loss or hacking by the hackers. 1.2 LITERATURE SURVEY All the modern devices come with in-built system to fight against the already acknowledged viruses by the operating system developers, which is updated through the regular security patches. But one main features missing in it is about finding the applications that have been installed or only downloaded and are yet to be installed in the phone memory from the unknown sources and could be easily identified as illegitimate application files that may potentially harm a device. So here we propose a ‘System to identify and define security threats to the users about the illegitimate installed applications’. By using ‘MobiSecure’ application, the users can find the applications files that have been downloaded into their phone’s memory without their knowledge. 2. PROPOSED METHODOLOGY The proposed framework is an application that has all the ability to look throughout the phone memory for the application files usually with ‘.apk’ extension. The main reason behind the development of application is the ability to offer real-time diagnosis of latest installed or downloaded files that can lead to cyber-attacks. The normal mobile phone users should be aware of every
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4043 installed application and their corresponding threats, which ideally are not known to majority of them, hence we aim at providing the users information about the threats a latest installed application software or file may contain. ‘System to identify and define security threats to the users about the illegitimate installed applications’ has following features:  User and Device Interface  File scanning function  Threat finding feature  Suggestion of threats to the user  Listing the application files that are system-default hidden 3. SYSTEM ARCHITECTURE AND FUNCTIONING The application developed is capable of running on minimum API 19 level that is it will support 97.3% android devices. The application has 2 main modules namely, Home page and Result display page. Our application is designed to scan for illegitimate applications that have been installed from unknown sources eg. Browser, shared through different media sharing platforms etc. Such application acts as the medium for various cyber attacks that would be executed by the hackers. Explaining the modules: 1. Home page Home page consist of a short summary to our application and its features and a scan button which on clicked starts to look for .apk files that usually don’t come from a legitimate source, provided the data on the phone memory is accessible. 2. Result page As soon as the scan is complete, the results from the scan i.e list of application is displayed on the result page with a short description. Also to make it more convenient for the users to take action on those applications, we provide with an option that will trigger the deletion of that specific application file from the phone memory hence nullifying all the risk the user were first exposed to. Fig -1: System Architecture 4. CONCLUSION Using mobile application that has the capability of identifying the applications that may contain malware can substantially decrease the threat of various cyber attacks that are drastically increasing in this growing world of computers. ‘MobiSecure’ can nullify the risk of cyber attacks by identifying the applications that have been installed from illegitimate sources and providing the user an option to delete those applications from the phone memory. 5. REFERENCES [1] P.K.Dixit, “Android”, 2014. [2] Philip K. Dick, “Do Androids Dream Of Electric Sheep?: The inspiration behind Blade Runner and Blade Runner 2049” , 16 Feb 2012 [3] Dave Maclean, Satya Komatineni, Grant Allen “Pro Android 5 (Apress)” , 2015 [4] Anubhav Pradhan,Anil V. Deshpande, ”Composing Mobile App, Learn | Explore | Apply” , 2014 [5] Clifton ,“Andriod User Interfce Design: Implementing Material Design for Developers” , 3 Mar 2016 [6] Jon Erickson, “Hacking: The art of exploitation”, 2nd Edition [7] Steven Furnell, “Mobile Security: A pocket guide”, July 2009