You are on page 1of 3

S. No TOPIC P.

No

21. COMBINATORIAL AUCTION MECHANISM FOR RESOURCE 103


ALLOCATION IN CLOUD COMPUTING ENVIRONMENT
Mr. G.Magesh

22. RECENT TRENDS AND ADVANCED RESEARCH CHALLENGES IN 106


WIRELESS SENSOR NETWORKS
Ms.G.Sivagami

23. IMAGE REPRESENTATION THROUGH DISPARITY MAP FOR LARGE 112


SCALE STEREO IMAGES
Dr.V.Kavitha

24. DATAMINING TECHNIQUES AND ITS APPLICATIONS 120


Ms.R.Durgadevi

25. A SURVEY ON CLUSTERING TECHNIQUES AND ALGORITHMS 125


Mr. A. Narayanan

26. RECENT TRENDS AND DEVELOPMENTS IN CLOUD COMPUTING 128


Ms.A.G.Gayathri

27. CRIME DETECTION TECHNIQUES AND APPLICATIONS OF DATA 135


MINING
Ms.K. Vidhya, Mr.M.R.Rajagopal

28. A STUDY ON WEB MINING 139


Ms.T. Aiswarya, Mr.T.Venkatesan

29. SECURITY ISSUES AND SOLUTIONS IN E-PAYMENT SYSTEM 142


Ms.K. Nithya, Dr. S. Malathi

30. A STUDY ON DIGITAL MARKETING 146


Mr.G.Nadimudhu

31. A SURVEY ON STATUS OF BPOs IN RURAL SECTORS 149


Mr.M.R.Rajagopal

32. MOBILE APPS SECURITY USING NETWORK TECHNIQUES 154


S.Suganya, Dr. S. Malathi

xi
National Conference on Advanced Research in Computer Science and Technology - March 2019

MOBILE APPS SECURITY USING NETWORK TECHNIQUES

S.Suganya1, Dr. S.Malathi2


1
M.Phil., Scholar, Department of Computer Science, Swami Dayananda College
of Arts and Science, Manjakkudi.
2
Assistant Professor, Department of Computer Science, Swami Dayananda
College of Arts and Science, Manjakkudi.

Abstract: Today life, every one used the mobile apps. Many users don’t know which
application is useful for their. Smart phone and which is not and which apps exploit their
ignorance etc. Exploiting the unawareness / ignorance of users, some fraudulent activities
happened through mobile applications. In this situation, App designers use shady means,
such as raise the App values or App ratings to commit fraud. In this paper, various
techniques as well as methods for security measurements, analysis and prioritization within
the peak of mobile platforms will be presented. Such as ranking based evidences, rating
based evidences, feedback review based evidences and their historical records. These three
types of evidences are used to create Evidence Aggregation Certificate. We evaluate the
proposed system with real world App data collected from the iOS App store over a span of
time. In this experiment, we validate the effectiveness of the proposed system and show the
scalability of the detection algorithm as well as some regularity of ranking fraud activities.
Additionally, increases understanding and awareness of security on mobile application
platforms to avoid detection, and counter measures used by the operating systems.
Keywords: mobile apps, security awareness, mobile platform, threats, vulnerability.
1. Introduction Currently Smartphone and mobile devices
have become incredibly important among
Security is one of the biggest challengers people around the world. Because they
in today’s interconnected world. Network have offered same capabilities as well as
security focuses on protecting computers, facilities that desktop works stations have
networks, programs, and data from provided. However, security aspect still is
unintended or unauthorized access, a big Challenge.
change, or destruction As soon as your PC
is connected to the Internet, you are being 2. Applications in Network
targeted by unlimited number of malicious Security Process
programs, viruses, hackers and other
unknown new threats appearing every day Data Mining is the procedure of mining
Not only this but also the information you knowledge from data. The information or
send and received might be intercepted, knowledge extracted so can be used for
read and even altered .The field of network any of the following applications:
security is a very dynamic and highly • Fraud Detection
technical field dealing with all aspects of • Customer Retention
scanning, hacking and securing systems • Production Control
against intrusions.
• Science Exploration

ISBN: 978-93-0132-00-6 154

You might also like