You are on page 1of 16

JNTUH College of Engineering

Malicious Android Application Detection


Presented By Supervision
Prem Kumar Yeshamalla Dr.M.Nagaratna
20011F0023 Professor and Add. Controller of Examination
MCA 4th SEM CSE Department

Computer Science Department Oct-2022


Contents
• Introduction
• Proposed System
• Design
• Implementation of Algorithms
• Comparing Results
References
Introduction:
Since the introduction of the Android operating system, its popularity has
increased and continues to do so. Over time, attackers saw Android as a
lucrative target. The growth of Android malware has been steady, in terms of
both volume and complexity. Attackers have always tried to find a way to evade
new detection methods. It is necessary to develop new analysis and detection
methods in order to detect malicious activities.
Proposed System
• In proposed system we implements virus, Trogon, Adware,
Spyware, Spam, Bots.
• The goal of the worms to improve the apps permissions effectively
and efficiently.
• With help machine learning algorithms such as SVM and Decision
Tree algorithms make a comparison between training dataset and
trained dataset .
• Support vector machine algorithms act as a classifier which is used
to classify malicious application and benign app.
Basic Flow chart Diagram
Support Vector Machine
• Support Vector Machine or SVM is one of the most popular
Supervised Learning algorithms.
• The goal of the SVM algorithm is to create the best line or
decision boundary.
• SVM chooses the extreme points/vectors that help in creating
the hyperplane.
Decision tree
• Decision tree analysis is a predictive modelling tool that can be applied across
many areas.
• Decision trees are created by algorithmic approach.
• It can split the dataset in different ways by applying different conditions.
• Decision trees are the most powerful algorithms.
• They fall under the category of supervised learning algorithms
Code Snapshot
Importing Dataset
Implementation of SVM Algorithm
References
1. Y. Agarwal and M. Hall. Protect my privacy: Detecting and mitigating privacy leaks on ios devices using crowdsourcing. In
Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys ’13, New York, NY,
USA, 2013. ACM.

2. D . Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck. Drebin: Effective and explainable detection of android malware in
your pocket. In NDSS. The Internet Society, 2014

3. N. Cristianini and J. Shawe-Taylor. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods.
Cambridge University Press, 2000.

4. J. Crussell, R. Stevens, and H. Chen. MAdFraud: Investigating ad fraud in android applications. In 12th CMSAS, MobiSys ’14, New
York, NY, USA, 2014. ACM
Thank You

You might also like