Open Access Open Access  Restricted Access Subscription or Fee Access

Identifying and Ranking Risk Using Probabilistic Generative Models

S. Suhashini, A. Vanitha Muthu, T. Nagamani

Abstract


The world has been changed to Smart Phone World, therefore more issues also been developed. One of the main advantage of smart phone is “Apps” .But without any knowledge user installs the app, hence it results in threats. So to avoid this lots of technique have been evolved .But none give the best solution. Therefore, this will be reduced by using the Probabilistic Generative Method. Hence, this method reduces the risk problem gradually.


Keywords


App Security, Low Risk App, Risk Level, Datasets

Full Text:

PDF

References


N. Amor, S. Benferhat, and Z. Elouedi. Naive bayesvs decision trees in intrusion detection systems. In Proceedings of the 2004 ACM symposium on Applied computing, pages 420–424. ACM, 2004.

K. Au, Y. Zhou, Z. Huang, P. Gill, and D. Lie. Short paper: a look at smartphone permission models. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pages 63–68. ACM, 2011

D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security, pages 73–84. ACM, 2010.

C. M. Bishop. Pattern Recognition and Machine Learning (Information Science and Statistics).Springer, 2007.

D. Blei, A. Ng, and M. Jordan. Latent dirichlet allocation.J. Mach. Learning Research, 3, 2003.

W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1–6. USENIX Association, 2010

W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri.A study of Android application security.In Proceedings of the 20th USENIX conference on Security, SEC’11, pages 21–21, Berkeley, CA, USA, 2011.USENIX Association.

W. Enck, M. Ongtang, and P. McDaniel.On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security, CCS ’09, pages 235–245, New York, NY, USA, 2009. ACM.

B. Fathi. Engineering windows 7 : User account control, October 2008. MSDN blog on User Account Control.

A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner.Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, pages 627–638. ACM, 2011

A. Felt, K. Greenwood, and D. Wagner.The effectiveness of application permissions.In Proc. of the USENIX Conference on Web Application Development, 2011.

A. P. Felt, K. Greenwood, and D. Wagner.The effectiveness of install-time permission systems for third-party applications. Technical Report UCB/EECS-2010-143, EECS Department, University of California, Berkeley, Dec 2010.

J. Goodman and W. Yih.Online discriminative spam filter training. In Proceedings of the Third Conference on Email and Anti-Spam (CEAS), 2006

W. A. Magat, W. K. Viscusi, and J. Huber.Consumer processing of hazard warning information. Journal of Risk and Uncertainty, 1(2):201–32, June 1988.

V. Metsis, I. Androutsopoulos, and G. Paliouras. Spam filtering with naive bayes-which naive bayes. In Third conference on email and anti-spam (CEAS), volume 17, pages 28–69, 2006 applications: Attack strategies and defense. In Engineering Secure Software and Systems.Springer, 2012.


Refbacks

  • There are currently no refbacks.