SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 318
PROVIDE SECURITY ABOUT RISK SCORE IN MOBILE
APPLICATION’S
Bhambare Monali S1
, Kapse Poonam M2
, Gangurde Kirti S3
, Dane Tanuja S4
1
Student, Computer Engineering, SND College of Engineering, Yeola, SPPU, Maharashtra, India
2
Student, Computer Engineering, SND College of Engineering, Yeola, SPPU, Maharashtra, India
3
Student, Computer Engineering, SND College of Engineering, Yeola, SPPU, Maharashtra, India
4
Student, Computer Engineering, SND College of Engineering, Yeola, SPPU, Maharashtra, India
Guided By:
Prof. Shaikh I. R., Professor of Computer Engineering, SND College of Engineering Yeola, SPPU, Maharashtra, India.
Abstract
Now days as the use of mobile devices is increasing rapidly day by day, huge number of mobile apps are coming into the market.
These apps ask the user access to various kinds of permissions, and also many of these perform the same task. The user comes at
risk with presence of some malicious app due to access of permission it will get, as android provides a stand –alone defense
mechanism with respect to malicious apps. Where it warns the user about the permissions the app requires, trusting that the user
will make proper decision, which requires the user to have the technical knowledge and time, which is not user friendly for each
user. Also classification of these apps can be useful in understanding the user preferences and can motivate the intelligent
personalized services. But to effectively classify the app is a nontrivial task as limited contextual information is available.
To address these two issues an approach is proposed where the apps will be classified first using the enriched contextual
information from web search engine, then with the contextual features from the context-rich device logs of mobile users and
calculating the risk score for the app in order to generate a user friendly metric for the user to use when choosing the app. This
will help us to get effective classification of the mobile apps and protect the user’s mobile devices from malicious apps.
Key Words: - Mobile apps classification, risk, malware, web knowledge, enriched contextual information.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
We proposed one mobile apps which is used cover the risk
of apps and classified the score. We proposed an efficient
and effective approach to classify the mobile apps based on
extraction of implicit and explicit real world features. Also
web-based contextual information for training a multiclass
mobile apps classifier with the use of risk factor score
estimation. Now a day as per our observation, use of mobile
devices is increasing rapidly day by day, huge number of
mobile apps are coming to the market. Generally user access
to various kinds of permission and also many of these
perform the same task. As large number of these apps comes
with similar functionality, having a proper classification of
them make it easy and time efficient for user to select apps
with security.
Also classification of these apps can be useful to
understanding user‟s preferences and can motivate
intelligent personalized services. Before being installed
these apps ask user access to various kinds of permissions.
The user comes at risk with presence of some malicious
apps, due to access of permission it will get, as android
provides a stand-alone defense mechanism with respect to
malicious apps. Before the app is installed it just gives list of
permissions the app will be accessing and leaves the
decision of trusting app on user. But to make this decision it
is requires that the user should have some technical
knowledge and also as this request of permission comes for
every app users lose interest in this warning. They ignore it
and mostly make their decisions based on the reviews and
ratings.
The risk score will be given in simple manner to the user
just like we have rating of apps that is in easy to understand
manner. So that the user will have another metric to use
while selecting the app and to protect their data from
malicious apps. Calculating the risk score for the app in
order to generate a user to use when choosing the app. This
will help us to get effective classification of the mobile apps
and protect the users mobile devices from malicious apps.
2. LITERATURE SURVEY:
The Problem Automatically classify the mobile apps can
also be considered as a problem or risk to classify the small
and scattered text.
Now a days the smartphone users are increasing rapidly in
huge manner most of android users. They will perform all
the activity or regular work with android apps respect to his
android smartphone. We can say the desktop or laptop will
replace with smartphones but the smartphone user will look
on his security concern so the need to arises security for
user's data. Now a day most of the launcher provides
security for android smartphone but this is not much enough
to provide security for smartphone so we will go to provide
For developing proposed system we will look some related
papers are as follow
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 319
 In [1] their work has presented a general framework to
process the small and scattered text document on the
web. The hidden topics discover from external large
scale data or documentation collection that is universal
data set.
 In [2] their work presented a similarity kernel function
based on approach to find the similarity in between the
small text. The system has searched the traditional cosine
similarity calculate like cosine coefficient produce
inadequate results such as suppose for the two small text
like Artificial Intelligence and AI.
 In [3] classifying queries is an important task. But
searched queries are mostly small, thus carry scattered
information to provide correct classification. Their work
have proposed a method for classify these small queries
using blind feedback technique.
 In [4] Discovering the users have similar interest can be
used for various applications such as recommendation,
segmentation for market analysis. Their work have
proposed approach which search snippets to build vector
space for both usage and classifies the apps using cosine
space distance.
2.1. Research Methodology:
 To exploit the relevancy between App name and
category labels, here the information about the app will
be extracted using the app words (labels). what happens
here is suppose given an App a and its category label c,
the basic features that can react the relevance between a
and c are considered. The weights of these features can
be learned in the training process of the machine learning
model.
 For extracting the web based textual features, two kind
of specific features will be considered i.e. explicit
feedback of vector space model and implicit feedback of
semantic topics, they will be used to capture the
relevance between the apps and there corresponding
category labels.
 Three types of contextual features which are used to
extract the real world contextual features will be
considered. Pseudo feedback will be taken i.e. here for a
pre-selected and labeled app; contextual record of the
usage of the app is collected from the context logs of
mobile user. In implicit feedback latent semantic
meaning behind the collected contextual information will
be considered. Then at last frequent context patterns will
be used i.e here the mutually related context-value pair
for the apps will be exploited, for that mining algorithm
like GCPM or BP-Growth can be used.
 For classifying the app we need to train the classifier to
integrate multiple effective features, for this supervised
classification models like naive bayes , SVMs, decision
tree or maximum entropy can be used.
 To make this classification of the app more efficient and
effective we will be extracting the meta information of
the apps like the list of permissions they request to
access from the user and also the usage statistics. Here
using the rarity of the critical permission and the pairs of
critical permissions used we will calculate the risk of the
app in a simple user-friendly manner. Using the machine
learning technique and heuristics, technique can be
presented to generate the risk signals and risk score.
Naive Bayes has been extensively used both in the
context of spam detection and anomaly detection in
network traffic flows. In the context of Android,
however, there has been limited work. So using this will
improve the classification of app as we will get a strong
defense against the malicious application. The figure
given below explains the improved classification of the
app with the risk score, i.e. here inside the app store after
extracting and integrating all the features we will get the
app classified in its accurate category along with its risk
score.
3. PROPOSED SYSTEM:
In our proposed system have classification of the mobile
apps, we will be collecting information from various
methods such as web search engine, real world contextual
data, contextual log information of users etc. From this data,
we obtain the features for the mobile apps appearing in these
logs. Then with the help of machine learning model
available, we will have train data to the classifier give us the
appropriate classification of the app.
To explain this in a more systematic way, consider given
taxonomy T, and an app A and specified system parameter
S, according to our approach, which will be extracted from
the relevant web search and the contextual information
about the app. To be more specific suppose we have app „A‟
and then it will be classified into the S which consist of list
of categories in order like {c1,c2,c3....cS}. Here for the
effective feature selection an important task, is to train the
machine learning model because the names of the apps are
short and sparse as a result when a new app comes, whose
partial or all the words present in the name are not present in
the training data then the app will not be properly classified,
so to overcome this we are extracting the features from
different sources so that the relevance between this app and
the categories can be obtained from these features. The
system implemented will act as a standardization which can
be used for various systems like app stores, target
advertising, recommendation system, user segmentation etc.
The system works according to the following phases.
Architecture of proposed system:
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 320
4. CONCLUSIONS
We discuss the main things of communicating the risk of an
application to users, and propose several methods to rating
this risk for security of mobile apps. We test these methods
on big real-world data sets to understand each method‟s
ability to assign risk score to the mobile apps. One effective
method is the RSS method which has several advantages. It
is monotonic, and it can provide feedback as to why risk is
high for a specific app and how a developer could reduce
that risk for mobile apps security. It performs well in
identifying most current malware mobile apps as high risk
score for security. This method allows for highly-critical and
less-critical permissions to affect the all overall risk score of
apps in an easy to understand way for user's , making it
more secure as well as difficult to hack when compared with
other models.
REFERENCES
[1]. “Generating Summary Risk Score for Mobile
Application” – Christopher S. Gates. IEEE Transaction
On Dependable And Secure Computing. May-June
2014.
[2]. “Mobile App Classification with Enriched Contextual
Information” – Hengshu Zhu. IEEE Transaction On
Mobile Computing. May-June 2014.
[3]. “Classifying the mobile application with risk score by
using enriched information of App context. – Journal
Paper ISO – 2015.
[4]. “Naïve Bayes vs Decision Trees in Intrusion Detection
Systems” – Nahla Ben Amor. 2004 ACM Symposium
on Applied Computing.
BIOGRAPHIES
Monali S. Bhambare.
Computer Department
SND College of Engineering & Research
Center. Yeola Dist. : Nashik
Poonam M. Kapse.
Computer Department
SND College of Engineering & Research
Center. Yeola Dist. : Nashik
Kirti S. Gangurde.
Computer Department
SND College of Engineering & Research
Center. Yeola Dist. : Nashik
Tanuja S. Dane
Computer Department
SND College of Engineering & Research
Center. Yeola Dist. : Nashik

More Related Content

What's hot

IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET Journal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...IJECEIAES
 
Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityKamal Spring
 
IRJET- Bus Monitoring System using Android Application
IRJET-  	  Bus Monitoring System using Android ApplicationIRJET-  	  Bus Monitoring System using Android Application
IRJET- Bus Monitoring System using Android ApplicationIRJET Journal
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET Journal
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence Athari_1996
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authoritieseSAT Publishing House
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login SessionIRJET Journal
 
IEEE_BigDataService_2017_paper_10
IEEE_BigDataService_2017_paper_10IEEE_BigDataService_2017_paper_10
IEEE_BigDataService_2017_paper_10Vinusha Anem
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...IRJET Journal
 

What's hot (19)

EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATIONEFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel Identity
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing security
 
IRJET- Bus Monitoring System using Android Application
IRJET-  	  Bus Monitoring System using Android ApplicationIRJET-  	  Bus Monitoring System using Android Application
IRJET- Bus Monitoring System using Android Application
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
IEEE_BigDataService_2017_paper_10
IEEE_BigDataService_2017_paper_10IEEE_BigDataService_2017_paper_10
IEEE_BigDataService_2017_paper_10
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 

Similar to Provide security about risk score in mobile application’s

Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine LearningIRJET Journal
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store IRJET Journal
 
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MININGA DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MININGIRJET Journal
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniquesgerogepatton
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET Journal
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET Journal
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSBRNSSPublicationHubI
 
IRJET- Travel Sequence Application
IRJET-  	  Travel Sequence ApplicationIRJET-  	  Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET Journal
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDIRJET Journal
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine LearningIRJET Journal
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...IRJET Journal
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
Mobile App Analytics
Mobile App AnalyticsMobile App Analytics
Mobile App AnalyticsNynne Silding
 

Similar to Provide security about risk score in mobile application’s (20)

Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
 
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MININGA DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile Apps
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
IRJET- Travel Sequence Application
IRJET-  	  Travel Sequence ApplicationIRJET-  	  Travel Sequence Application
IRJET- Travel Sequence Application
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
 
I018145157
I018145157I018145157
I018145157
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine Learning
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
Mobile App Analytics
Mobile App AnalyticsMobile App Analytics
Mobile App Analytics
 
J017325660
J017325660J017325660
J017325660
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 

Provide security about risk score in mobile application’s

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 318 PROVIDE SECURITY ABOUT RISK SCORE IN MOBILE APPLICATION’S Bhambare Monali S1 , Kapse Poonam M2 , Gangurde Kirti S3 , Dane Tanuja S4 1 Student, Computer Engineering, SND College of Engineering, Yeola, SPPU, Maharashtra, India 2 Student, Computer Engineering, SND College of Engineering, Yeola, SPPU, Maharashtra, India 3 Student, Computer Engineering, SND College of Engineering, Yeola, SPPU, Maharashtra, India 4 Student, Computer Engineering, SND College of Engineering, Yeola, SPPU, Maharashtra, India Guided By: Prof. Shaikh I. R., Professor of Computer Engineering, SND College of Engineering Yeola, SPPU, Maharashtra, India. Abstract Now days as the use of mobile devices is increasing rapidly day by day, huge number of mobile apps are coming into the market. These apps ask the user access to various kinds of permissions, and also many of these perform the same task. The user comes at risk with presence of some malicious app due to access of permission it will get, as android provides a stand –alone defense mechanism with respect to malicious apps. Where it warns the user about the permissions the app requires, trusting that the user will make proper decision, which requires the user to have the technical knowledge and time, which is not user friendly for each user. Also classification of these apps can be useful in understanding the user preferences and can motivate the intelligent personalized services. But to effectively classify the app is a nontrivial task as limited contextual information is available. To address these two issues an approach is proposed where the apps will be classified first using the enriched contextual information from web search engine, then with the contextual features from the context-rich device logs of mobile users and calculating the risk score for the app in order to generate a user friendly metric for the user to use when choosing the app. This will help us to get effective classification of the mobile apps and protect the user’s mobile devices from malicious apps. Key Words: - Mobile apps classification, risk, malware, web knowledge, enriched contextual information. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION We proposed one mobile apps which is used cover the risk of apps and classified the score. We proposed an efficient and effective approach to classify the mobile apps based on extraction of implicit and explicit real world features. Also web-based contextual information for training a multiclass mobile apps classifier with the use of risk factor score estimation. Now a day as per our observation, use of mobile devices is increasing rapidly day by day, huge number of mobile apps are coming to the market. Generally user access to various kinds of permission and also many of these perform the same task. As large number of these apps comes with similar functionality, having a proper classification of them make it easy and time efficient for user to select apps with security. Also classification of these apps can be useful to understanding user‟s preferences and can motivate intelligent personalized services. Before being installed these apps ask user access to various kinds of permissions. The user comes at risk with presence of some malicious apps, due to access of permission it will get, as android provides a stand-alone defense mechanism with respect to malicious apps. Before the app is installed it just gives list of permissions the app will be accessing and leaves the decision of trusting app on user. But to make this decision it is requires that the user should have some technical knowledge and also as this request of permission comes for every app users lose interest in this warning. They ignore it and mostly make their decisions based on the reviews and ratings. The risk score will be given in simple manner to the user just like we have rating of apps that is in easy to understand manner. So that the user will have another metric to use while selecting the app and to protect their data from malicious apps. Calculating the risk score for the app in order to generate a user to use when choosing the app. This will help us to get effective classification of the mobile apps and protect the users mobile devices from malicious apps. 2. LITERATURE SURVEY: The Problem Automatically classify the mobile apps can also be considered as a problem or risk to classify the small and scattered text. Now a days the smartphone users are increasing rapidly in huge manner most of android users. They will perform all the activity or regular work with android apps respect to his android smartphone. We can say the desktop or laptop will replace with smartphones but the smartphone user will look on his security concern so the need to arises security for user's data. Now a day most of the launcher provides security for android smartphone but this is not much enough to provide security for smartphone so we will go to provide For developing proposed system we will look some related papers are as follow
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 319  In [1] their work has presented a general framework to process the small and scattered text document on the web. The hidden topics discover from external large scale data or documentation collection that is universal data set.  In [2] their work presented a similarity kernel function based on approach to find the similarity in between the small text. The system has searched the traditional cosine similarity calculate like cosine coefficient produce inadequate results such as suppose for the two small text like Artificial Intelligence and AI.  In [3] classifying queries is an important task. But searched queries are mostly small, thus carry scattered information to provide correct classification. Their work have proposed a method for classify these small queries using blind feedback technique.  In [4] Discovering the users have similar interest can be used for various applications such as recommendation, segmentation for market analysis. Their work have proposed approach which search snippets to build vector space for both usage and classifies the apps using cosine space distance. 2.1. Research Methodology:  To exploit the relevancy between App name and category labels, here the information about the app will be extracted using the app words (labels). what happens here is suppose given an App a and its category label c, the basic features that can react the relevance between a and c are considered. The weights of these features can be learned in the training process of the machine learning model.  For extracting the web based textual features, two kind of specific features will be considered i.e. explicit feedback of vector space model and implicit feedback of semantic topics, they will be used to capture the relevance between the apps and there corresponding category labels.  Three types of contextual features which are used to extract the real world contextual features will be considered. Pseudo feedback will be taken i.e. here for a pre-selected and labeled app; contextual record of the usage of the app is collected from the context logs of mobile user. In implicit feedback latent semantic meaning behind the collected contextual information will be considered. Then at last frequent context patterns will be used i.e here the mutually related context-value pair for the apps will be exploited, for that mining algorithm like GCPM or BP-Growth can be used.  For classifying the app we need to train the classifier to integrate multiple effective features, for this supervised classification models like naive bayes , SVMs, decision tree or maximum entropy can be used.  To make this classification of the app more efficient and effective we will be extracting the meta information of the apps like the list of permissions they request to access from the user and also the usage statistics. Here using the rarity of the critical permission and the pairs of critical permissions used we will calculate the risk of the app in a simple user-friendly manner. Using the machine learning technique and heuristics, technique can be presented to generate the risk signals and risk score. Naive Bayes has been extensively used both in the context of spam detection and anomaly detection in network traffic flows. In the context of Android, however, there has been limited work. So using this will improve the classification of app as we will get a strong defense against the malicious application. The figure given below explains the improved classification of the app with the risk score, i.e. here inside the app store after extracting and integrating all the features we will get the app classified in its accurate category along with its risk score. 3. PROPOSED SYSTEM: In our proposed system have classification of the mobile apps, we will be collecting information from various methods such as web search engine, real world contextual data, contextual log information of users etc. From this data, we obtain the features for the mobile apps appearing in these logs. Then with the help of machine learning model available, we will have train data to the classifier give us the appropriate classification of the app. To explain this in a more systematic way, consider given taxonomy T, and an app A and specified system parameter S, according to our approach, which will be extracted from the relevant web search and the contextual information about the app. To be more specific suppose we have app „A‟ and then it will be classified into the S which consist of list of categories in order like {c1,c2,c3....cS}. Here for the effective feature selection an important task, is to train the machine learning model because the names of the apps are short and sparse as a result when a new app comes, whose partial or all the words present in the name are not present in the training data then the app will not be properly classified, so to overcome this we are extracting the features from different sources so that the relevance between this app and the categories can be obtained from these features. The system implemented will act as a standardization which can be used for various systems like app stores, target advertising, recommendation system, user segmentation etc. The system works according to the following phases. Architecture of proposed system:
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 320 4. CONCLUSIONS We discuss the main things of communicating the risk of an application to users, and propose several methods to rating this risk for security of mobile apps. We test these methods on big real-world data sets to understand each method‟s ability to assign risk score to the mobile apps. One effective method is the RSS method which has several advantages. It is monotonic, and it can provide feedback as to why risk is high for a specific app and how a developer could reduce that risk for mobile apps security. It performs well in identifying most current malware mobile apps as high risk score for security. This method allows for highly-critical and less-critical permissions to affect the all overall risk score of apps in an easy to understand way for user's , making it more secure as well as difficult to hack when compared with other models. REFERENCES [1]. “Generating Summary Risk Score for Mobile Application” – Christopher S. Gates. IEEE Transaction On Dependable And Secure Computing. May-June 2014. [2]. “Mobile App Classification with Enriched Contextual Information” – Hengshu Zhu. IEEE Transaction On Mobile Computing. May-June 2014. [3]. “Classifying the mobile application with risk score by using enriched information of App context. – Journal Paper ISO – 2015. [4]. “Naïve Bayes vs Decision Trees in Intrusion Detection Systems” – Nahla Ben Amor. 2004 ACM Symposium on Applied Computing. BIOGRAPHIES Monali S. Bhambare. Computer Department SND College of Engineering & Research Center. Yeola Dist. : Nashik Poonam M. Kapse. Computer Department SND College of Engineering & Research Center. Yeola Dist. : Nashik Kirti S. Gangurde. Computer Department SND College of Engineering & Research Center. Yeola Dist. : Nashik Tanuja S. Dane Computer Department SND College of Engineering & Research Center. Yeola Dist. : Nashik