Detection Of Fraud Ranking For Mobile App Using IP Address Recognition Technique
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
fraudulent activity in mobile app market means intruders or app developers use shady means to increase their app rating to bring their app in top 20 list to inflate their app sale. Knowledge engineering domain usually uses the methodologies to extract the useful knowledge from the given large data. Ongoing rapid growths of online data have created the need of KDD. Also ongoing rapid growth of online rating and review system to the app, make fraud app has been launched in the mobile market and let them be downloaded and used by many users. The fraud mobile app is not worth to use and wasting device memory. Sometimes such app is created with malicious software which is harmful to the device. To avoid this situation the fraud app should be find out. In existing work, fraud rankings are detected by applying the mining algorithm in app review. Local anomaly was detected instead of global anomaly. The analysis had been done reported. Human evaluators evaluated and produce the result. Time complexity is more to evaluate. To overcome this drawback, FRDS is proposed. To detect the fraud app, app’s reviews should be checked. To check whether the app reviews are fraud or not, the Fraud Ranking Detection System is proposed. In the mobile market, each mobile has its own unique IP Address. Hence, each user has unique IP Address. When giving the reviews to app, user IP Address is extracted by using the IP Address recognition technique. So that, from one IP Address number of reviews cannot be provided to same app. In this way fraud review is prevented in proposed work. This approach decreases the evaluation time of the result, hence it is efficient than the existing approach.
Authors and Affiliations
Esther Nowroji. S, Vanitha. S
Cloud Computing in India: Challenges, Progress and Future.
Cloud Computing is one of the emerging fields of Technologies in today's time. In the recent times, it has taken the usage of Internet to an all together different level. The concept of 'pay-for-what-you-use' makes it c...
Environmental Assessment & Impact of Lakes in Jabalpur
Water is essential for life. Contamination of such water sources is a big problem creating health hazards. Hence the present study was undertaken to characterize the parameters of five historical lakes of Jabalpur city....
Design of Adjustable V Block
In various branches of industry (for example, in paper, electric, ship and power plant industry), large and heavy cylindrical elements play very important role. Two pipes are first supported by fixed v blocks before joi...
Digital Watermarking on Multimedia Application
This paper incorporates the detail investigation of Digital watermarking clarification, idea and the principle commitments in this field, for example, classes of watermarking procedure that show which watermarking techn...
Snubberless Soft-switching (zcs/zvs) Closed loop Current-fed Half-bridge Converter Based PV Inverter
Snubber circuit dissipates some amount of the output power along with increase in circulating current through the components, increasing their conduction losses and also increases the components count, converter complex...