Home > Computer Science > Computer Security > Volume-4 > Issue-4 > Fraud Malware Detection in Google Play Store

Fraud Malware Detection in Google Play Store

Call for Papers

Volume-7 | Issue-2

Last date : 26-Apr-2023

Best International Journal
Open Access | Peer Reviewed | Best International Journal | Indexing & IF | 24*7 Support | Dedicated Qualified Team | Rapid Publication Process | International Editor, Reviewer Board | Attractive User Interface with Easy Navigation

Journal Type : Open Access

First Update : Within 7 Days after submittion

Submit Paper Online

For Author

Research Area

Fraud Malware Detection in Google Play Store

V. Booma | G. Gayathri

V. Booma | G. Gayathri "Fraud Malware Detection in Google Play Store" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4, June 2020, pp.1730-1734, URL: https://www.ijtsrd.com/papers/ijtsrd31686.pdf

Android mobile applications become an simple target for the attacker because of its open source background. Also user’ lack of knowledge the process of installing and usage of the apps. To categorize fake and malware apps, all the earlier methods listening carefully on getting permission from the user and executing that particular mobile apps. A malware detection structure that discover fraudulent developer, to detect search rank fraud as well as malware in Google Play Store. The fraud application is detected by aggregate the three pieces of proof such as ranking based, co-review based and rating based evidence. It combine efficiently for all the evidence for fraud detection. Detect fraud ranking in daily Apps head board. Avoid ranking manipulation. In the proposed system the detecting of normal and harmful application is analyzed by the SVM Algorithm. This system will analyze the uploaded application that are to be classifying the status which is dangerous application or normal application. The client can view the both the normal and harmful apps in ASP.NET. They can download the application after screening the secret manner. After using the apps the client can give the review on that downloaded apps. By the known review post for any application the admin will analyze the ASP.NET application for giving the ranking. The reviews are analyzed by the SVM Algorithm.

Data mining, Malware Detection, Support vector Machine (SVM)

Volume-4 | Issue-4, June 2020
IJTSRD | www.ijtsrd.com | E-ISSN 2456-6470
Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)

International Journal of Trend in Scientific Research and Development - IJTSRD having online ISSN 2456-6470. IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas like Sciences, Technology, Innovation, Engineering, Agriculture, Management and many more and it is recommended by all Universities, review articles and short communications in all subjects. IJTSRD running an International Journal who are proving quality publication of peer reviewed and refereed international journals from diverse fields that emphasizes new research, development and their applications. IJTSRD provides an online access to exchange your research work, technical notes & surveying results among professionals throughout the world in e-journals. IJTSRD is a fastest growing and dynamic professional organization. The aim of this organization is to provide access not only to world class research resources, but through its professionals aim to bring in a significant transformation in the real of open access journals and online publishing.

Thomson Reuters
Google Scholer