Professional Documents
Culture Documents
Irjet V4i12226 PDF
Irjet V4i12226 PDF
Sathyamangalam, India
----------------------------------------------------------------------***----------------------------------------------------------------------
ABSTRACT - The use of mobile devices including Tablets, developers use search ranking algorithm to promote their
Smart watch, and note books are increasing day by day. apps to the top while searching. After downloading mobile
Android has the major share in the mobile application applications from Google play users are asked to give the
market. Android mobile applications become an easy target ratings and reviews about that particular downloaded
for the attackers because of its open source environment. applications. However fraudulent developers give fake
Also user’s ignorance the process of installing and usage of ratings and reviews about their application promote their
the apps. To identify fake and malware applications, all the application to the top. There are two typical approaches
previous methods focused on getting permission from the used for detecting malware in Google Play. Thus are Static
user and executing that particular mobile application. A and Dynamic. The dynamic approach needs apps to be run
malware detection framework that discovers and break in a secure environment to detect its benign. The static
traces left behind by fraudulent developers, to detect search approach is not used as the need to give all types of attack
rank fraud as well as malware in Google Play. The fraud app in early stage itself but that is impossible as everyday
is detected by aggregating the three pieces of evidence such attackers find the new way to inject malware on
as ranking based, co-review based and rating based applications.
evidence. Finally aggregating all the activities of front
running apps, it can be achieve certain accuracy in 2. LITERATURE REVIEW
classifying benign standard datasets of malware, fraudulent
and legitimate apps. Additionally, we apply incremental In paper [3] the author proposes the static method
learning approach to characterize a large number of data to detect the malware in mobile applications. In this
sets. It combined effectively for all the evidences for fraud system using reverse engineering concept the source code
detection. To accurately locate the ranking fraud, there is a for the suspicious APK files. After that using structured
need to mining the active period’s namely leading sessions, mapping author builds the structure for the classes. Finally
of mobile Apps. using data flow concept several patterns for the different
type of threats has been created and use them to detect the
KEYWORDS - Mobile applications, Malware, Ranking, malware in applications. Depending upon the number of
Rating, Google Play. threading pattern the effectiveness of this method is
calculated.
1. INTRODUCTION
In paper [1] the author proposed a new method to
Google play first releases its app in 2008.Since detect malware in mobile applications by examining the
that it distributes applications to all the Android users. In runtime behavior of that particular application in the
Google Play Store, it provides services that user can mobile environment. The author proposes that unexpected
discover the particular application, purchase those behavior mobile app can vary from one application to
applications and install it on their mobile devices. Since other applications. Also, it varies from the environment of
Android is open source environment all the detail about that particular application running on different devices.
the application users can be easily accessed by the Using Xposed framework user can change the user and
application developers through Google play. In Google play system application without modifying the application
1.8 Million mobile applications are available and that is package(APK).Depend upon that user can set particular
downloaded by over 25 billion users across the world. This conditions to identify the malware in the mobile
leads to greater chance of installing malware to the applications.
applications that could affect users mobile devices. Google
play store uses its own security system known as Bouncer In paper [2] the author proposes some of modern
system [6] to remove the malicious apps from its store. machine learning algorithms to detect malware. For that
However, this method is not effective as testing some apps these algorithms are applied to the metadata collected
using virus tools many apps are found as malicious which from the Google Play. While all of the existing methods for
are not detected by Bouncer system [6]. Fraudulent detecting algorithm focused on inherent characteristics of
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1225
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
the particular mobile app this gives a direct method to as Page Rank and query term frequency. This is different
detect the applications. For the setup of the experiments from ranking fraud detection for mobile Apps. They
the collected 25k data from Google Play. Developers categorize all existing algorithms into three categories
update their applications in particular interval of days based on the type of information they use: content-based
whereas fake applications could not be updated since its methods, link-based methods, and methods based on non-
upload of the Google Play. All of these works focused on traditional data such as user behavior, clicks, HTTP
only linear models Future work may focus on non-liners sessions. In turn, there is a sub categorization of link-based
models. category into five groups based on ideas and principles
used: labels propagation, link pruning and reweighting,
In paper [5] the author aims to protect the review labels refinement, graph regularization, and feature based.
spanners or spam reviews. The spammer may target only
on the specific protect. After that, they gave fake reviews to S. Paper Title Techniques Advantages Drawbacks
that particular mobile app by creating the different no
account to review that account. The author proposes a Detecting
novel based scoring method to detect every single review Static
Mobile
of the particular product. The author creates highly approaches
Application User can Manually
suspicious as a subset. By using web-based spammer to malware
Malicious define their should
evaluation software the fakeness of the review is detection
1 Behaviors own threat define all
calculated. After the completion of the evaluation, the based on
Based on Data to identify threat
result shows the effective to predict the fake reviews. reverse
Flow of malware. patterns.
code of the
Source
In paper [8] the authors have studied the problem application.
Code.[3]
of detecting hybrid shilling attacks on rating data. The Not
proposed approach is based on the semi-supervised Detect any
Mobile Working
learning and can be used for trustworthy product XPosed type of
2 Malware for all type
recommendation. This paper presents a Hybrid Shilling Framework Unexpected
Exposed[1] of
Attack Detector, or HySAD for short, to tackle these behavior.
malicious.
problems. In particular, HySAD introduces MCRelief to Android
select effective detection metrics, and Semi supervised malware
Naive Bayes (SNBλ) to precisely separate Random-Filler detection
model attackers and Average-Filler model attackers from Detect all
from Google Machine Too Slow
normal users. type of
3 Play meta- Learning to detect
Threat
data: Technique. Malware..
In paper [4], author proposed novel technique for Pattern.
Selection of
computing a rank aggregation on the basis of matrix
important
completion to avoid noise and incomplete data. Proposed
features.[2]
method solves a structured matrix-completion problem
A novel
over the space of skew-symmetric matrices. The author 4 After
scheme to
proves a recovery theorem detailing when proposed evaluation
detect The
approach will work. They also perform a detailed it proves
review scoring
evaluation of proposed approach with synthetic data and Detecting that
spammers methods
an anecdotal study with Netflix ratings. To find the product proposed
who try to to
solutions, they utilized the svp solver for matrix review ranking and
influence compute
completion. Rank aggregation is combined with the spammers supervised
review the degree
structure of skew-symmetric matrices. Author applied for using rating methods
ratings on of spam
latest advances in the theory and algorithms of matrix behaviors. [5] are
some target for each
completion to skew-symmetric matrices. Author enhanced effective in
products or reviewer.
existing algorithm for matrix completion to handle skew- discovering
product
symmetric data. spammers.
groups.
In paper[10], author reported a survey on Web Hysad: a semi
Detect all
spam detection, which comprehensively introduces the supervised Based on
type of Not
principles and algorithms in the literature. Indeed, the 5 hybrid Historical
Ranking Effective.
work of Web ranking spam detection is mainly based on shilling attack Ranking.
Methods.
the analysis of ranking principles of search engines, such detector for
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1226
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
trustworthy
product.[8]
Novel
Proposed
technique
method
for
solves a
computing
Rank structured
a rank Matrix
aggregation matrix
aggregation operation
via nuclear completion
6 on the basis are
norm problem
of matrix difficult to
minimized. over the
completion perform.
[4] space of
to avoid
skew
noise and
symmetric
incomplete
matrices.
data
3. PROPOSED SYSTEM:
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1227
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
REFERENCES:
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1228