Professional Documents
Culture Documents
No
xi
National Conference on Advanced Research in Computer Science and Technology - March 2019
Abstract: Today life, every one used the mobile apps. Many users don’t know which
application is useful for their. Smart phone and which is not and which apps exploit their
ignorance etc. Exploiting the unawareness / ignorance of users, some fraudulent activities
happened through mobile applications. In this situation, App designers use shady means,
such as raise the App values or App ratings to commit fraud. In this paper, various
techniques as well as methods for security measurements, analysis and prioritization within
the peak of mobile platforms will be presented. Such as ranking based evidences, rating
based evidences, feedback review based evidences and their historical records. These three
types of evidences are used to create Evidence Aggregation Certificate. We evaluate the
proposed system with real world App data collected from the iOS App store over a span of
time. In this experiment, we validate the effectiveness of the proposed system and show the
scalability of the detection algorithm as well as some regularity of ranking fraud activities.
Additionally, increases understanding and awareness of security on mobile application
platforms to avoid detection, and counter measures used by the operating systems.
Keywords: mobile apps, security awareness, mobile platform, threats, vulnerability.
1. Introduction Currently Smartphone and mobile devices
have become incredibly important among
Security is one of the biggest challengers people around the world. Because they
in today’s interconnected world. Network have offered same capabilities as well as
security focuses on protecting computers, facilities that desktop works stations have
networks, programs, and data from provided. However, security aspect still is
unintended or unauthorized access, a big Challenge.
change, or destruction As soon as your PC
is connected to the Internet, you are being 2. Applications in Network
targeted by unlimited number of malicious Security Process
programs, viruses, hackers and other
unknown new threats appearing every day Data Mining is the procedure of mining
Not only this but also the information you knowledge from data. The information or
send and received might be intercepted, knowledge extracted so can be used for
read and even altered .The field of network any of the following applications:
security is a very dynamic and highly • Fraud Detection
technical field dealing with all aspects of • Customer Retention
scanning, hacking and securing systems • Production Control
against intrusions.
• Science Exploration