International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017

Reliable and Secure Classification Techniques for Spotting Malware in Mobile

Pooja B. Kote, S. M. Rokade

Nowadays there are many advanced techniques to hide from static and dynamic analysis tools in mobile. To get rid of this when attacking a mobile device an effective approach is required for the diagnosis of the application. In current approach to evaluate android app use of only simple code and pattern. The hacker can override this combination of diagnosis of pattern, as a result which may infect the device with the malware. This paper introduce approach which is using various techniques like patterns, flow based, behaviour based, state based and do analysis of each individual data by its associated specialized algorithms. The results obtained are fused to get the final results of that application. This paper aims to find malware using multi-classification technique. The algorithms will be used are Call Graph Based Classification, Neural network based Classification, and Naive Byes Based Classification. Experimental results show the feasibility and effectiveness of the proposed approach to detect the malware.

Keywords: android, call graph, malware detection, naive byes, neural network

Edition: Volume 6 Issue 6, June 2017

Pages: 671 - 673


How to Cite this Article?

Pooja B. Kote, S. M. Rokade, "Reliable and Secure Classification Techniques for Spotting Malware in Mobile", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174219, Volume 6 Issue 6, June 2017, 671 - 673

30 PDF Views | 37 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'android'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1167 - 1170

Secured Location Based Bus Route Locator Application for Android Mobiles

Dayanand G Savakar, Ravi Hosur

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1846 - 1849

An Innovative Technique to Detect Malicious Applications in Android

Sharvari Prakash Chorghe, Dr. Narendra Shekokar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2792 - 2799

NASAM: Novel Approach to Secure Android Devices from Malware based on Apps Behaviour

Sagar Vitthal Shinde, Amrita A. Manjrekar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1 - 4

Personalized Ads Using Smart Phones over Cloud Environment

T. Lalitha, M. Chandra Naik

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1591 - 1593

Virtual Fruits Market

Kalyani P. Khodaskar

Share this article



Similar Articles with Keyword 'malware detection'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1846 - 1849

An Innovative Technique to Detect Malicious Applications in Android

Sharvari Prakash Chorghe, Dr. Narendra Shekokar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2792 - 2799

NASAM: Novel Approach to Secure Android Devices from Malware based on Apps Behaviour

Sagar Vitthal Shinde, Amrita A. Manjrekar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 873 - 877

Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM

Shital Kuber, Prof. Digambar Padulkar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1402 - 1405

SII Model for Self-Start Detection on the Propagation Dynamics of Modern Email Malware

Preetha S M, Suryapriya S

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 6, June 2017

Pages: 1526 - 1529

A Proposal for Worm Malware Detection by Using Association Rules

Karim Hashim Al-Saedi, Osama Mohammed Qasim

Share this article



Similar Articles with Keyword 'neural network'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1968 - 1973

Face Recognition Revisited on Pose, Alignment, Color, Illumination and Expression-PyTen

Mugdha Tripathi

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2715 - 2717

Privacy Preserving ANN Over Cloud

Babaso Shinde, Ajay Gupta

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2929 - 2931

A Closure Looks to Data Mining Techniques for Prediction of Heart Disease

Rajwant Kaur, Sukhpreet Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1773 - 1778

Image Steganography Scheme Using Neural Network in Wavelet Transform Domain

Anamika Sharma, Ajay Kushwaha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1158 - 1164

Chinese Sign Language Alpha-Numeric Character Classification using Neural Network

R. B. Mapari, G. U. Kharat

Share this article
Top