Predicting Fraud Apps using Hybrid Learning Approach

International Journal of Computer Science and Engineering
© 2018 by SSRG - IJCSE Journal
Volume 5 Issue 6
Year of Publication : 2018
Authors : K.Aishwarya, C.Selvi

How to Cite?

K.Aishwarya, C.Selvi, "Predicting Fraud Apps using Hybrid Learning Approach," SSRG International Journal of Computer Science and Engineering , vol. 5,  no. 6, pp. 1-5, 2018. Crossref,


Mobile phone has become the target for risky and snoopy applications. The android’s current risk communication technique depends on users to identify the permissions that an app is requesting. But the users are unaware of permissions as it requires some technical knowledge. Therefore, android’s protection against malicious application is risk communication method where any user who wishes to install an app will be warned about permissions, the application would call for and then the user has to take the proper decision. In Google play, the users frequently download and use several applications from various unknown vendors. Therefore, the protection against malware applications should depend on decisions made by users. The main part of protection against malware on mobile devices is to alert the users about malware and permit them to take decisions about whether to choose and install specific apps. Compute risk score that users can apply while choosing applications whether they want to use that app or not.


Android Devices, Security Fraud detection, Reviews.


[1] Mahmudur Rahman, Mizanur Rahman, Bogdan Carbunar, and Duen Horng Chau, ―Search Rank Fraud and Malware Detection in Google Play, IEEE Transactions On Knowledge And Data Engineering,Vol. 29,No.6 June 2017. 
[2] M.Nauman, S. Khan, and X. Zhang, ―Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints,‖ Proc. Fifth ACM Symp. Information, Computer and Comm. Security, pp. 328-332, 2010. 
[3] K.L.R.S.Himaja, Mrs.T. Sri Lakshmi,"Providing Security to User Data using OTP and Image CAPTCHA",International Journal of Computer & Organization Trends (IJCOT),Volume - 6 Issue - 6 2016. 
[4] Christopher S. Gates, Ninghui Li, Senior Member, IEEE, Hao Peng, Bhaskar Sarma, Yuan Qi, Rahul Potharaju, Cristina NitaRotaru, Member, IEEE Computer Society, and Ian Molloy ―Generating Summary Risk Scores for Mobile Applications,‖ IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 11, NO. 3, MAY-JUNE 2014. 
[5] A.P.Felt, K. Greenwood, and D. Wagner, ―The Effectiveness of Application Permissions,‖ Proc. Second USENIX Conf. Web Application Development, (WebApps ’11), 2011. 
[6] Dr.V.P.Eswaramurthy , M.Arthi,"A Survey on Image Mining Techniques"International Journal of Computer & Organization Trends (IJCOT),Volume - 4 Issue - 5 2014.
[7] Christopher S. Gates, Jing Chen, Ninghui Li, Senior Member, IEEE, and Robert W. Proctor, ―Effective Risk Communication for Android Apps,‖ IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 3, 2014. 
[8] T.Vidas, N. Christin, and L.F. Cranor, ―Curbing Android Permission Creep,‖ Proc. Workshop Web 2.0 Security and Privacy, vol. 2, 2011. 
[9] H.R.Divakar, Dr.B.R.Prakash,"Classics of Deep Learning Approach for Human Behaviour Ontology: A Survey",International Journal of Computer Trends and Technology (IJCTT),Volume-51 Number-1,2017. 
[10] B.P.Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy, ―Android Permissions: A Perspective Combining Risks and Benefits,‖ Proc. 17th ACM Symp. Access Control Models and Technologies (SACMAT ’12), 2012. 
[11] M.Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, ―RiskRanker: Scalable and Accurate Zero-Day Android Malware Detection,‖ Proc. 10th Int’l Conf. Mobile Systems, Applications, and Services, (MobiSys ’12), pp. 281-294, 2012. 
[12] SY Yerima, S Sezer, G McWilliams - IET Information Security, 2014 - ―Analysis of Bayesian classificationbased approaches for Android malware detection.‖