Anomaly detection on android system

2Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to the proliferation of mobile phones in recent years there are many advantages and some disadvantages in smart-phones usage. Many applications like E-commerce, Social media and games get access of user’s permission to use some privileges. Normally while installing any application the users grant permission to the particular application to access all the privileges. While installing the app in smart-phones, it has tie-up with some advertisement company. So that to benefit the app developer these ads will run in the app background. This paper describe the advertisements can behave maliciously some times. This malicious behavior extracts personal information like user’s contact and files by using the permission access policy of particular app. This data theft may happen without the knowledge of user. The malicious ad will upload the collected information to the desired server. In this paper proposed third party server is used to validate the advertisement before the ad gets loaded into the app.

Author supplied keywords

Cite

CITATION STYLE

APA

Usha, D., Niveditha, V. R., & Sharadha Priya, K. (2019). Anomaly detection on android system. International Journal of Innovative Technology and Exploring Engineering, 9(1), 4310–4313. https://doi.org/10.35940/ijitee.A4951.119119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free