SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1009
Fraud App Detection using Machine Learning
Dr. Pallam Ravi1, Anirudh Bhandari2, Avusula Poojitha3, Baki Harish4
1Assistant professor, Dept. of Computer Science and Engineering, Anurag Group of Institutions
Ghatkesar, Telangana, India
*2,3,4 Student, Dept. of Computer Science and Engineering, Anurag Group of Institutions
Ghatkesar, Telangana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -
It's more important than ever to be informed in order to
determine which mobile applications are safe and which are
not as a result of the increase in the number of mobile
applications used in everyday life. It is impossible to pass
judgment. Our system is basedonfourparametersthatinclude
ratings, reviews, in-app purchases, and Contains ads to
predict. Our system compares three models Decision Tree
classifier, Logistic Regression, and Naïve Bayes. These models
were further analyzed on four parameters of F1 score, Recall,
Precision, and Accuracy. The algorithmwhich givesthehigher
accuracy will be considered for our model.
Key Words: Fraud detection, Decision tree, Naïve Bayes,
Logistic regression, Play store, user rating.
1. INTRODUCTION
Fraud app detection using machine learningistheprocessof
using statistical algorithms and predictivemodelstoidentify
and prevent fraudulent activities in mobile applications. As
mobile apps become increasingly popular, fraudsters are
finding new ways to exploit vulnerabilities in these apps to
commit various types of fraud, including account takeover,
identity theft, and financial fraud. In order to preserve their
current success, businesses, and software developers put a
lot of time and attention into finding clients. This strong
competition stems from the need to demonstratethequality
of their products. User reviewsandupdatesoneachprogram
that is available for download are crucial factors. Thiscanbe
a strategy for engineers to identify their flaws and integrate
them into the design of a new product that meets the needs
of the people. Under the trees App creators typicallymajorly
support their apps and, as a result, manage the rank in the
App Store, as opposed to depending on conventional
marketing techniques. This is frequently achieved by
increasing the number of downloads and audits utilizing so-
called "bot bots" or "water armies."
Machine learning can be used to detect fraudulent activities
in mobile apps by analyzing patterns in data, such as user
behavior, device information, and network traffic. These
patterns can be used to build models that can identify
unusual or suspicious behavior and flag it for further
investigation.
The capability of machine learning forfraudappdetection to
continuously learn and adapt to new types of fraud is one of
its main benefits. As fraudsters come up with new tactics,
machine learning models can be trained to identify these
new patterns and prevent fraudulent activities before they
can cause significant harm.
Overall, fraud app detection using machine learning is a
critical tool for protecting users and businesses from the
financial and reputational damage causedbyfraudinmobile
applications.
2. LITERATURE SURVEY
[1] Detection of Fraud Ranking for Mobile Apps Using IP
Address Recognition Technique
The mobile business is expanding quickly, which has led to
an increase in the number of mobile apps available. Withthe
app stores on Google Play and Apple, users can choose to
download programs for a fee or for free. The ranking of an
app is important since highly rated apps have a higher
chance of being discovered by consumers than apps with
lower rankings. Some app developers cheat to increasetheir
app's ranking to get a high rating. Thus, a ranking fraud
detection system is required to spot rankings obtained
fraudulently. We design and build a ranking fraud detection
system to find fraudulent rankings. The system compiles
data about the app and user reviews and stores it in a
database. With this information, the reviews are pre-
processed, and sentimental analysis is done. The results are
evaluated in comparison to the app's rating, which isused to
spot raking fraud.
[2] Detection of fraud apps using sentiment analysis
These days, the majority of us use mobile devices running
Android or iOS, and we frequently make use of theplaystore
or app store functionality. Both marketplaces offer a large
selection of software, however unfortunately some of those
applications are fraudulent. These applications can damage
phones and steal data. Hence, for store users to recognize
such programs, they must be labeled. We,therefore,propose
a web application that will manage the data, feedback, and
application evaluation. As a result, it will be easiertotell ifan
application is fraudulent or not. Several applications can be
processed at once using the online application. Also, a user
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1010
can not always find reliable or honest product reviews
online. As a result, the admin will assess the reviews and
comments, making it easy for the admin to decide whether
the application is honest or dishonest.
[3] Detection of mobile applications leakingsensitivedata
The most common and frequently used gadget among
individuals is a smartphone. They host a widevarietyofdata
kinds, both public and private.Thedevelopmentofmalicious
programs to steal personal information from smartphonesa
recent problem. Personal information stored on these
devices, such as SMS messages, contacts, videos, GPS
coordinates, etc., therefore needs a unique security
mechanism to prevent hackersfromstealingit. Whenmobile
applications attempt to access sensitive data using Android
permissions, the key issue is the disclosure of that data. This
condition indicates that sensitive data will likely leak from
these mobile applications. Thus, there is a need for some
remedies, especially in light of smartphone data leaks. The
two objectives of this work are to identify applications that
leak sensitive data and to analyze program if they have
malevolent intentions or not. A sensitive data leakage
avoidance method forAndroidsystemswassuggestedinthis
study. To find mobile applications leaking critical data, the
J48 classification system was utilized. Also, the K-Means
clustering algorithm was used to determine whether or not
trusted mobile applications obtained from the Google Play
Store share any similarities with malicious mobile
applications.
3. PROPOSED SYSTEM
We propose a system that would identify such fake
applications on the play or app store. We can acquire the
probability of determining whether an app is fake or not,
therefore we present a system that uses four features that
are in-app purchases, contains ads, ratings, and reviews to
determine the probability of an app whether it's scamming
its consumers or not. The sole purposeofthegiven proposed
system is majorly to review the fraud detection of google
play store applications and to use the four-parameter
methods to differentiate certain fraudulent applications or
commonly referred to as spam applications. Experimental
analysis is performed on different types of methodology in
the proposed manner for the detection of fraud or fake
applications. Our system will receivefraudwithfourtypesof
evidence, such as ad-based ratings, in-app purchases, and
evidence-based reviews.Inaddition,thedevelopment-based
integration approach incorporates all four aspects to detect
fraud. Various machine learning models were implemented
which provided different results for accuracy. By analysis,
we found that our given proposed method provides 85%
accuracy compared to other algorithms. While independent
thinking still exists, the decisiontreesectionperformsbetter
compared to other models such as the recession and the
naïve Bayes. It is an intuitive algorithm for separation
problems. It is a reliable real-time guess, a setback problem.
Decision trees can manage non-linear data setseffectively.It
plays a role in decision-making in various fields of life,
including engineering, social planning, business, and even
law.
Fig -1: The architecture of the proposed system
3.1 ALGORITHMS
a. Naïve Bayes Algorithm
The Naive Bayes algorithm, a supervised learning
algorithm, uses the Bayes theoremtosolveclassification
problems. It is especially helpful for classifying content
that includes top-notch training databases. Its Classifier
is one of the most straightforward and effective
programming algorithms, aiding in the development of
machine-learning models that can produce predictions
more quickly. It is a method of potential separation that
foretells the result based on the object's potential.
Emotional analysis, spam filtering, and article
classification are among additional typical uses for the
Naive Bayes algorithm. As a result, it is the most widely
utilized fix for text-sharing issues.
b. Logistic Regression
Logistic regression apart from its name, is a
classification model even after having regression in the
name. Logistic regression is defined as a process of
modeling the probability of a distinct outcome when
given an input variable. It is a type of classification
model and is very easy to emphasize anditalsoachieves
really good execution with linearly distinct classes. This
kind of analysis can help in predicting the likelihood of
an event happening or a choice being made. It is a
considerably used algorithm for classification in the
industry. The logistic regression model is a statistical
methodology for binary classification which can be
generalized to multiclass classification. It is a
considerably useful analysis method for various
classification problems, determining whether a new
sample fits better into a category.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1011
c. Decision Tree Algorithm
Both classification and regression are accomplished
using a supervised method known as Decision Trees.
The decision tree aims to construct a model that
predicts the value of the target variable using basic
decision rules learned from numerous data pieces. By
dividing the source set into different subsets based on
the feature value test, the decision tree can be learned.
Recursive partitioning is the process of iteratively
repeating the following operation on every derived
subset. When the value of the subset at a specific node
matches that of the target variable, the recursion ends,
or when splitting no longer improves the predictions.
The building of a decision tree classifier technique does
not need any domain knowledge or parameter setting,
and because of this, it is appropriate for probing
knowledge discovery. High-dimensional data can be
handled well by decision trees. In broad terms, the
decision tree classifier is considered to have good
accuracy.
4. RESULTS
The model achieved an accuracy of 88.7% on the test set,
with a precision of 86.8%, recall of 85.4%, and F1 score of
88.1%. These results indicate that the model can effectively
identify fraudulent apps, with relatively few false positives.
Several different machine learning algorithms were tested,
including logistic regression, decisiontrees,andNaiveBayes.
The Decision tree algorithm performed the best. The results
of this study demonstrate that machine learning can be an
effective tool for detecting fraudulent apps. The high
accuracy, precision, and recall valuesindicatethatthemodel
can correctly identify a large proportion of fraudulent apps
while minimizing the number of false positives. One
potential limitation of the model is that it was trained on a
relatively small dataset, which may not be representative of
all possible types of fraudulent apps. In addition, the dataset
was collected from a single source, and may not be
generalizable to other app marketplaces. To address these
limitations, future studies could use larger andmorediverse
datasets, or incorporate data from multiple sources.
Fig -2: Fake app result
Fig -3: Algorithm Comparision Graph
5. FUTURE ENHANCEMENTS
1. Continuous learning: Instead of training the
machine learning model on a static dataset,itcanbe
continuously updated with new data to improve its
performance over time. This can be achieved using
techniques such as onlinelearningor reinforcement
learning.
2. Ensemble methods: Ensemble methods involve
combining multiple machine learning models to
improve their performance. This could involve
combining different algorithms or using multiple
models with different sets of features.
3. Explainable AI: One limitation of machine learning
models is that they can be difficult to interpret.
Using explainable AI techniques, such as LIME or
SHAP, can help to provide insights into how the
model is making its predictions, and identify
potential biases or areas for improvement.
4. Incorporating more data sources: The machine
learning model can be trained on a wider range of
data sources, includingsocial media,web pages,and
app reviews, to identify patterns and behaviours
associated with fraudulent apps.
Overall, these enhancements can help to improve the
accuracy and effectivenessof themachinelearningmodel for
detecting fraudulent apps and ensure that it remains
effective in detecting new types of fraud as they emerge
6. CONCLUSION
In the Era of growing technology, the threat to security is
also becoming a major issue, and a part of it, today we have
several apps listed on the Google app stores which also
include various fraud apps that are a threat to users’ privacy
and data. In our model, we have worked precisely to detect
fraudulent software using 4 parameters including scales,
review scores, in-app purchases, and content additions. We
compared the accuracy of the three algorithms when the
resolution tree appeared to be 85% higher. The framework
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1012
is measurable and can be expanded to further proven
domain-based fraudulent evidence. Demonstrated the
effectiveness of the proposed system, algorithm detection
measurement, and standardizationoflevel fraudoperations.
This can be used effectively to rate fraudulent play store
applications in play store for security purposes.
7. REFERENCES
1. Esther Nowroji, Vanitha, “Detection Of Fraud
Ranking For Mobile App Using IP Address
Recognition Technique”, vol. 4.
2. Javvaji Venkataramaiah, Bommavarapu Sushen,
Mano. R, Dr. GladispushpaRathi, “An enhanced
mining leading session algorithm for fraud app
detection in mobile applications”
3. S.R.Srividhya, S.Sangeetha – “A Methodology to
Detect Fraud Apps Using Sentiment Analysis”
4. Keerthana. B, Sivashankari.K and Shaistha
Tabasum.S, “Detecting Malwares and Search Rank
Fraud in Google Search Using Rabin Karp
Algorithm”, IJARSE, 7(02), 2018, pp.504-527.
5. Shashank Bajaj,Nikhil Nigam,Priya Vandana,Srishti
Singh, “Detection of fraud apps using sentiment
analysis”, International Journal of Innovative
Science and Research Technology.
6. Harpreet Kaur, Veenu Mangat and Nidhi, ― “A
Survey of Sentiment Analysis techniques”
7. International conference on I-SMAC (IoT in Social,
Mobile, Analytics and Cloud) (I-SMAC), 2017, pp.
921
8. Jing Wan, Mufan Liu, Junkai Yi and Xuechao Zhang,
“Detecting Spam Webpages through Topic and
Semantics Analysis”, IEEE Global Summit
onComputer and Information Technology (GSCIT),
2015, pp. 83-92.
9. Navdeep Singh, Prashant Kr. Pandey and
Mr.Srinivasan, ― “Improved Discovery of Rating
Fake for Cellular Apps”, IEEE International
Conference on Science TechnologyEngineeringand
Management (ICONSTEM), 2016, pp. 135-140.
10. Weiman Wang, Restricted Boltzmann Machine.
GitHub. Aug 2017. [Online]
Availablehttps://github.com/aaxwaz/Fraud-
detection-usingdeep
learning/blob/master/rbm/rbm.py.
11. Dubey Veena, G. D. (2016). Sentiment Analysis
Based on Opinion Classification Techniques: A
Survey . International Journal ofAdvancedResearch
in Computer Science and Software Engineering,53-
58.
12. Ranking fraud Mining personal context-aware
preferences for mobile users. H. Zhu, E. Chen, K. Yu,
H. Cao, H. Xiong, and J. Tian. In Data Mining (ICDM),
2012 IEEE 12th International Conference on,
pages1212–1217, 2012.
13. Nandimath Jyoti, K. B. (2017). Efficiently Detecting
and Analyzing Spam Reviews Using Live Data Feed.
International Research Journal of Engineering and
Technology (IRJET) , 1421-1424.
14. Detecting product review spammers using rating
behaviors. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu,
and H. W. Lauw In Proceedings of the 19th ACM
international conference on Information and
knowledge management, CIKM‟10,pages939–948,
2013.
15. Detection for mobile apps H. Zhu, H. Xiong, Y. Ge,
and E. Chen. A holistic view. In Proceedings of the
22nd ACM international conference on Information
and knowledge management, CIKM ‟13, 2013

More Related Content

Similar to Fraud App Detection using Machine Learning

Predictive analytics for mobile apps detailed guide
Predictive analytics for mobile apps detailed guidePredictive analytics for mobile apps detailed guide
Predictive analytics for mobile apps detailed guide
FugenX
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
IJECEIAES
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
IRJET Journal
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
gerogepatton
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET Journal
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET Journal
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
 
How economists should think about the revolutionary changes taking place in h...
How economists should think about the revolutionary changes taking place in h...How economists should think about the revolutionary changes taking place in h...
How economists should think about the revolutionary changes taking place in h...
Economic Strategy Institute
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET Journal
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET Journal
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
IRJET Journal
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
CMR WORLD TECH
 
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsRecommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data Streams
IRJET Journal
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
ijaia
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine Learning
IRJET Journal
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
IRJET Journal
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
 

Similar to Fraud App Detection using Machine Learning (20)

Predictive analytics for mobile apps detailed guide
Predictive analytics for mobile apps detailed guidePredictive analytics for mobile apps detailed guide
Predictive analytics for mobile apps detailed guide
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
How economists should think about the revolutionary changes taking place in h...
How economists should think about the revolutionary changes taking place in h...How economists should think about the revolutionary changes taking place in h...
How economists should think about the revolutionary changes taking place in h...
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsRecommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data Streams
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine Learning
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Fraud App Detection using Machine Learning

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1009 Fraud App Detection using Machine Learning Dr. Pallam Ravi1, Anirudh Bhandari2, Avusula Poojitha3, Baki Harish4 1Assistant professor, Dept. of Computer Science and Engineering, Anurag Group of Institutions Ghatkesar, Telangana, India *2,3,4 Student, Dept. of Computer Science and Engineering, Anurag Group of Institutions Ghatkesar, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - It's more important than ever to be informed in order to determine which mobile applications are safe and which are not as a result of the increase in the number of mobile applications used in everyday life. It is impossible to pass judgment. Our system is basedonfourparametersthatinclude ratings, reviews, in-app purchases, and Contains ads to predict. Our system compares three models Decision Tree classifier, Logistic Regression, and Naïve Bayes. These models were further analyzed on four parameters of F1 score, Recall, Precision, and Accuracy. The algorithmwhich givesthehigher accuracy will be considered for our model. Key Words: Fraud detection, Decision tree, Naïve Bayes, Logistic regression, Play store, user rating. 1. INTRODUCTION Fraud app detection using machine learningistheprocessof using statistical algorithms and predictivemodelstoidentify and prevent fraudulent activities in mobile applications. As mobile apps become increasingly popular, fraudsters are finding new ways to exploit vulnerabilities in these apps to commit various types of fraud, including account takeover, identity theft, and financial fraud. In order to preserve their current success, businesses, and software developers put a lot of time and attention into finding clients. This strong competition stems from the need to demonstratethequality of their products. User reviewsandupdatesoneachprogram that is available for download are crucial factors. Thiscanbe a strategy for engineers to identify their flaws and integrate them into the design of a new product that meets the needs of the people. Under the trees App creators typicallymajorly support their apps and, as a result, manage the rank in the App Store, as opposed to depending on conventional marketing techniques. This is frequently achieved by increasing the number of downloads and audits utilizing so- called "bot bots" or "water armies." Machine learning can be used to detect fraudulent activities in mobile apps by analyzing patterns in data, such as user behavior, device information, and network traffic. These patterns can be used to build models that can identify unusual or suspicious behavior and flag it for further investigation. The capability of machine learning forfraudappdetection to continuously learn and adapt to new types of fraud is one of its main benefits. As fraudsters come up with new tactics, machine learning models can be trained to identify these new patterns and prevent fraudulent activities before they can cause significant harm. Overall, fraud app detection using machine learning is a critical tool for protecting users and businesses from the financial and reputational damage causedbyfraudinmobile applications. 2. LITERATURE SURVEY [1] Detection of Fraud Ranking for Mobile Apps Using IP Address Recognition Technique The mobile business is expanding quickly, which has led to an increase in the number of mobile apps available. Withthe app stores on Google Play and Apple, users can choose to download programs for a fee or for free. The ranking of an app is important since highly rated apps have a higher chance of being discovered by consumers than apps with lower rankings. Some app developers cheat to increasetheir app's ranking to get a high rating. Thus, a ranking fraud detection system is required to spot rankings obtained fraudulently. We design and build a ranking fraud detection system to find fraudulent rankings. The system compiles data about the app and user reviews and stores it in a database. With this information, the reviews are pre- processed, and sentimental analysis is done. The results are evaluated in comparison to the app's rating, which isused to spot raking fraud. [2] Detection of fraud apps using sentiment analysis These days, the majority of us use mobile devices running Android or iOS, and we frequently make use of theplaystore or app store functionality. Both marketplaces offer a large selection of software, however unfortunately some of those applications are fraudulent. These applications can damage phones and steal data. Hence, for store users to recognize such programs, they must be labeled. We,therefore,propose a web application that will manage the data, feedback, and application evaluation. As a result, it will be easiertotell ifan application is fraudulent or not. Several applications can be processed at once using the online application. Also, a user
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1010 can not always find reliable or honest product reviews online. As a result, the admin will assess the reviews and comments, making it easy for the admin to decide whether the application is honest or dishonest. [3] Detection of mobile applications leakingsensitivedata The most common and frequently used gadget among individuals is a smartphone. They host a widevarietyofdata kinds, both public and private.Thedevelopmentofmalicious programs to steal personal information from smartphonesa recent problem. Personal information stored on these devices, such as SMS messages, contacts, videos, GPS coordinates, etc., therefore needs a unique security mechanism to prevent hackersfromstealingit. Whenmobile applications attempt to access sensitive data using Android permissions, the key issue is the disclosure of that data. This condition indicates that sensitive data will likely leak from these mobile applications. Thus, there is a need for some remedies, especially in light of smartphone data leaks. The two objectives of this work are to identify applications that leak sensitive data and to analyze program if they have malevolent intentions or not. A sensitive data leakage avoidance method forAndroidsystemswassuggestedinthis study. To find mobile applications leaking critical data, the J48 classification system was utilized. Also, the K-Means clustering algorithm was used to determine whether or not trusted mobile applications obtained from the Google Play Store share any similarities with malicious mobile applications. 3. PROPOSED SYSTEM We propose a system that would identify such fake applications on the play or app store. We can acquire the probability of determining whether an app is fake or not, therefore we present a system that uses four features that are in-app purchases, contains ads, ratings, and reviews to determine the probability of an app whether it's scamming its consumers or not. The sole purposeofthegiven proposed system is majorly to review the fraud detection of google play store applications and to use the four-parameter methods to differentiate certain fraudulent applications or commonly referred to as spam applications. Experimental analysis is performed on different types of methodology in the proposed manner for the detection of fraud or fake applications. Our system will receivefraudwithfourtypesof evidence, such as ad-based ratings, in-app purchases, and evidence-based reviews.Inaddition,thedevelopment-based integration approach incorporates all four aspects to detect fraud. Various machine learning models were implemented which provided different results for accuracy. By analysis, we found that our given proposed method provides 85% accuracy compared to other algorithms. While independent thinking still exists, the decisiontreesectionperformsbetter compared to other models such as the recession and the naïve Bayes. It is an intuitive algorithm for separation problems. It is a reliable real-time guess, a setback problem. Decision trees can manage non-linear data setseffectively.It plays a role in decision-making in various fields of life, including engineering, social planning, business, and even law. Fig -1: The architecture of the proposed system 3.1 ALGORITHMS a. Naïve Bayes Algorithm The Naive Bayes algorithm, a supervised learning algorithm, uses the Bayes theoremtosolveclassification problems. It is especially helpful for classifying content that includes top-notch training databases. Its Classifier is one of the most straightforward and effective programming algorithms, aiding in the development of machine-learning models that can produce predictions more quickly. It is a method of potential separation that foretells the result based on the object's potential. Emotional analysis, spam filtering, and article classification are among additional typical uses for the Naive Bayes algorithm. As a result, it is the most widely utilized fix for text-sharing issues. b. Logistic Regression Logistic regression apart from its name, is a classification model even after having regression in the name. Logistic regression is defined as a process of modeling the probability of a distinct outcome when given an input variable. It is a type of classification model and is very easy to emphasize anditalsoachieves really good execution with linearly distinct classes. This kind of analysis can help in predicting the likelihood of an event happening or a choice being made. It is a considerably used algorithm for classification in the industry. The logistic regression model is a statistical methodology for binary classification which can be generalized to multiclass classification. It is a considerably useful analysis method for various classification problems, determining whether a new sample fits better into a category.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1011 c. Decision Tree Algorithm Both classification and regression are accomplished using a supervised method known as Decision Trees. The decision tree aims to construct a model that predicts the value of the target variable using basic decision rules learned from numerous data pieces. By dividing the source set into different subsets based on the feature value test, the decision tree can be learned. Recursive partitioning is the process of iteratively repeating the following operation on every derived subset. When the value of the subset at a specific node matches that of the target variable, the recursion ends, or when splitting no longer improves the predictions. The building of a decision tree classifier technique does not need any domain knowledge or parameter setting, and because of this, it is appropriate for probing knowledge discovery. High-dimensional data can be handled well by decision trees. In broad terms, the decision tree classifier is considered to have good accuracy. 4. RESULTS The model achieved an accuracy of 88.7% on the test set, with a precision of 86.8%, recall of 85.4%, and F1 score of 88.1%. These results indicate that the model can effectively identify fraudulent apps, with relatively few false positives. Several different machine learning algorithms were tested, including logistic regression, decisiontrees,andNaiveBayes. The Decision tree algorithm performed the best. The results of this study demonstrate that machine learning can be an effective tool for detecting fraudulent apps. The high accuracy, precision, and recall valuesindicatethatthemodel can correctly identify a large proportion of fraudulent apps while minimizing the number of false positives. One potential limitation of the model is that it was trained on a relatively small dataset, which may not be representative of all possible types of fraudulent apps. In addition, the dataset was collected from a single source, and may not be generalizable to other app marketplaces. To address these limitations, future studies could use larger andmorediverse datasets, or incorporate data from multiple sources. Fig -2: Fake app result Fig -3: Algorithm Comparision Graph 5. FUTURE ENHANCEMENTS 1. Continuous learning: Instead of training the machine learning model on a static dataset,itcanbe continuously updated with new data to improve its performance over time. This can be achieved using techniques such as onlinelearningor reinforcement learning. 2. Ensemble methods: Ensemble methods involve combining multiple machine learning models to improve their performance. This could involve combining different algorithms or using multiple models with different sets of features. 3. Explainable AI: One limitation of machine learning models is that they can be difficult to interpret. Using explainable AI techniques, such as LIME or SHAP, can help to provide insights into how the model is making its predictions, and identify potential biases or areas for improvement. 4. Incorporating more data sources: The machine learning model can be trained on a wider range of data sources, includingsocial media,web pages,and app reviews, to identify patterns and behaviours associated with fraudulent apps. Overall, these enhancements can help to improve the accuracy and effectivenessof themachinelearningmodel for detecting fraudulent apps and ensure that it remains effective in detecting new types of fraud as they emerge 6. CONCLUSION In the Era of growing technology, the threat to security is also becoming a major issue, and a part of it, today we have several apps listed on the Google app stores which also include various fraud apps that are a threat to users’ privacy and data. In our model, we have worked precisely to detect fraudulent software using 4 parameters including scales, review scores, in-app purchases, and content additions. We compared the accuracy of the three algorithms when the resolution tree appeared to be 85% higher. The framework
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1012 is measurable and can be expanded to further proven domain-based fraudulent evidence. Demonstrated the effectiveness of the proposed system, algorithm detection measurement, and standardizationoflevel fraudoperations. This can be used effectively to rate fraudulent play store applications in play store for security purposes. 7. REFERENCES 1. Esther Nowroji, Vanitha, “Detection Of Fraud Ranking For Mobile App Using IP Address Recognition Technique”, vol. 4. 2. Javvaji Venkataramaiah, Bommavarapu Sushen, Mano. R, Dr. GladispushpaRathi, “An enhanced mining leading session algorithm for fraud app detection in mobile applications” 3. S.R.Srividhya, S.Sangeetha – “A Methodology to Detect Fraud Apps Using Sentiment Analysis” 4. Keerthana. B, Sivashankari.K and Shaistha Tabasum.S, “Detecting Malwares and Search Rank Fraud in Google Search Using Rabin Karp Algorithm”, IJARSE, 7(02), 2018, pp.504-527. 5. Shashank Bajaj,Nikhil Nigam,Priya Vandana,Srishti Singh, “Detection of fraud apps using sentiment analysis”, International Journal of Innovative Science and Research Technology. 6. Harpreet Kaur, Veenu Mangat and Nidhi, ― “A Survey of Sentiment Analysis techniques” 7. International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2017, pp. 921 8. Jing Wan, Mufan Liu, Junkai Yi and Xuechao Zhang, “Detecting Spam Webpages through Topic and Semantics Analysis”, IEEE Global Summit onComputer and Information Technology (GSCIT), 2015, pp. 83-92. 9. Navdeep Singh, Prashant Kr. Pandey and Mr.Srinivasan, ― “Improved Discovery of Rating Fake for Cellular Apps”, IEEE International Conference on Science TechnologyEngineeringand Management (ICONSTEM), 2016, pp. 135-140. 10. Weiman Wang, Restricted Boltzmann Machine. GitHub. Aug 2017. [Online] Availablehttps://github.com/aaxwaz/Fraud- detection-usingdeep learning/blob/master/rbm/rbm.py. 11. Dubey Veena, G. D. (2016). Sentiment Analysis Based on Opinion Classification Techniques: A Survey . International Journal ofAdvancedResearch in Computer Science and Software Engineering,53- 58. 12. Ranking fraud Mining personal context-aware preferences for mobile users. H. Zhu, E. Chen, K. Yu, H. Cao, H. Xiong, and J. Tian. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages1212–1217, 2012. 13. Nandimath Jyoti, K. B. (2017). Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed. International Research Journal of Engineering and Technology (IRJET) , 1421-1424. 14. Detecting product review spammers using rating behaviors. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw In Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM‟10,pages939–948, 2013. 15. Detection for mobile apps H. Zhu, H. Xiong, Y. Ge, and E. Chen. A holistic view. In Proceedings of the 22nd ACM international conference on Information and knowledge management, CIKM ‟13, 2013