Supervised Machine Learning Framework for Fraud and Malware Detection in Android Apps
Main Article Content
Abstract
At present, everyone is dependent upon its Smartphone for banking, communication, business,
gaming and many more functionalities. But,Ransomware is one of today's most severe Internet
security challenges and also Android applications also effective by the various types of Trojan attacks
respectively. Indeed, most Internet issues, including spam e-mails and denial of service attacks, are
triggered by malware and android applications also facing this issue. In many words, Smartphone’s
that are infected by Ransomware are also networked into botnets, and often assaults are performed on
hostile, assaulting networks. From untrusted internet sites may be likely to contribute to
maladministration. These executables are changed intelligently to circumvent antivirus specifications
by anomalous users. In this article, an improved identification approach for harmful executables is
suggested by evaluating Portable Executable (PE) executable files and utilizing an extraction process
for support vector machine (SVM)classification. We also learned a supervised binary classifier using
these features from regular and malicious PE data on Android applications. We have checked our
system on a comprehensive publicly accessible dataset and obtained a rating maximum accuracy
compared to the state of art approaches respectively.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.