Search Rank Fraud and Malware Detection in Google Play

Authors

  • Haritha T  Student, Department of Computer Science and Engineering, Shree Institute of Technical Education, Tirupati, Andhra Pradesh, India
  • G. Baby Lakshmi Prasanna  Assistant Professor, Department of Computer Science and Engineering, Shree Institute of Technical Education, Tirupati, Andhra Pradesh, India

Keywords:

Fairplay, Phishing, Phishing, Machine Learning and Digging Calculations.

Abstract

Deceitful practices in Google Play, the most prevalent Android application advertise, fuel look rank mishandle and phishing To distinguish malware, past work has centered FairPlay, a novel framework that finds and use follows left behind by fraudsters, to identify both malware and applications subjected to look rank extortion. Phishing costs Internet clients billions of dollars for each year. It alludes to drawing strategies utilized by character criminals to angle for individual data in a lake of clueless web clients. Phishers utilize ridiculed email, phishing programming to take individual data and budgetary record points of interest, for example, usernames and passwords. This paper manages strategies for recognizing phishing sites by breaking down different highlights of amiable and phishing URLs by Machine learning procedures. We examine the techniques utilized for recognition of phishing sites in view of lexical highlights, have properties and page significance properties. We consider different information digging calculations for assessment of the highlights with a specific end goal to improve comprehension of the structure of URLs that spread phishing. The adjusted parameters are helpful in choosing the well-suited machine learning calculation for isolating the phishing locales from considerate destinations.

References

  1. Phishing Trends Report for Q3 2012, Anti Phishing Working Group. http://antiphishing.o rg.
  2. Report on Phishing, Binatio nal Working Group on Cross-Border Mass Marketing Fra ud, October 2006
  3. Ma, L. K. Saul, S. Savage, and G. M. Voelker,” Beyond Blacklists: Learning to Detect Phishing Web Sites from Suspicious URLs”, Proc.of SIGKDD ’09.
  4. Ma, L. K. Saul, S. Savage, and G. M. Voelker, ”Learning to Detect Phishing URLs”, ACM Transactions on Intelligent Systems and Technology, Vol. 2, No. 3, Article 30, Publication date: April 2011.
  5. Garera S., Provos N., Chew M., Rubin A. D., “A Framework for Detection and measurement of phishing attacks”, In Proceedings of the ACM Workshop on Rapid Malcode (WORM), Alexandria, VA.
  6. K. McGrath, M. Gupta, “Behind Phishing: An Examination of Phisher Modi Operandi”, In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET).
  7. DMOZ Open Directory Proj ect. http://www.dmoz.org.
  8. http://www.phishtank.com.
  9. The Web Information Company, www.alexa.com.Rogers, “Google Page Ra nk – Whitepaper”,
  10. http://www.sirgroane.net/google-page-rank/PR Checker,
  11. http://www.prchecker.info/check_page_rank.php
  12. WHOIS look up, www.who is.net, www.whois.com

Downloads

Published

2018-09-30

Issue

Section

Research Articles

How to Cite

[1]
Haritha T, G. Baby Lakshmi Prasanna, " Search Rank Fraud and Malware Detection in Google Play, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 7, pp.213-217, September-October-2018.