International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 136 | Views: 300 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017 | Popularity: 7.1 / 10


     

Reliable and Secure Classification Techniques for Spotting Malware in Mobile

Pooja B. Kote, S. M. Rokade


Abstract: Nowadays there are many advanced techniques to hide from static and dynamic analysis tools in mobile. To get rid of this when attacking a mobile device an effective approach is required for the diagnosis of the application. In current approach to evaluate android app use of only simple code and pattern. The hacker can override this combination of diagnosis of pattern, as a result which may infect the device with the malware. This paper introduce approach which is using various techniques like patterns, flow based, behaviour based, state based and do analysis of each individual data by its associated specialized algorithms. The results obtained are fused to get the final results of that application. This paper aims to find malware using multi-classification technique. The algorithms will be used are Call Graph Based Classification, Neural network based Classification, and Naive Byes Based Classification. Experimental results show the feasibility and effectiveness of the proposed approach to detect the malware.


Keywords: android, call graph, malware detection, naive byes, neural network


Edition: Volume 6 Issue 6, June 2017


Pages: 671 - 673



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Pooja B. Kote, S. M. Rokade, "Reliable and Secure Classification Techniques for Spotting Malware in Mobile", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 671-673, https://www.ijsr.net/getabstract.php?paperid=ART20174219, DOI: https://www.doi.org/10.21275/ART20174219



Similar Articles

Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 723 - 730

A Study: Use of Machine Learning for Cyber Security

Nidhi Kataria Chawla, Monika Gaur

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 873 - 877

Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM

Shital Kuber, Prof. Digambar Padulkar

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1736 - 1740

Malware Detection System using ID3 Algorithm for Android

Trupti D. Deshmukh, Vrunda K. Bhusari

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1779 - 1783

Malware Detection and Tracer Approach for Operating System

Dokuparthi Prasanthi, V. Rama Krishna

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 550 - 554

N-Gram Analysis in SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection

Pagidimarri Venu, Dasu Vaman Ravi Prasad

Share this Article
Top