Professional Documents
Culture Documents
INFORMATION TECHNOLOGY
Presented by:
D.Akhila (17491A1207)
G.Jahnavi (17491A1211)
N.Preethi (17491A1220)
T.Bhaanu (17491A1229)
V.Srikanth (17491A1255)
CONTENTS
1. Abstract
2. Introduction
3. Existing System
4. Proposed System
5. Requirements
6. Modules
7. Modules Description
8. Conclusion
Abstract
In this module, we divide the datasets into 80:20 ratio. After
that, we have to give training to our model to identify the
malware apps and links in android.
After completing the training on the model. We have to
verify whether the model is working properly or not. For that
reason, we have to check the model with the test data.
Pre-processing
For analyzing the input data with the datasets we are using the
feature selection and genetic algorithm. In feature selection
algorithms we are using the SVM algorithm for better
accuracy. We are also using a Neural network algorithm to
compare which is better
We are mixing the genetic algorithm with both algorithms and
we can also test them independently so that we can identify
which is better.
Display Accuracy Graph
After completing the analysis report we can see the analysis
in the form of a graph that how much accurate we are getting
by using these algorithms.
The graph indicates, the x-axis represents algorithm name and
the y-axis represents accuracy and in all SVM got high
accuracy.
conclusion
As the number of threats posed to Android platforms is
increasing day to day, spreading mainly through malicious
applications, it is very important to design a framework which
can detect such malwares with accurate results.. The proposed
methodology attempts to make use of Genetic Algorithm to
get most optimized feature subset used to train machine
learning algorithms in most efficient way.
THANK YOU