BEHAVIORAL MODEL FOR LIVE DETECTION OF APPS BASED ATTACK

Authors

  • S.Lalitha , Chandra Ananya, Gudesi Bhanusha , Y.Anjali

Keywords:

Security risk, Control assaults, , Spyware, Botnets, Malware, Privacy leakage attacks, vulnerability, Behavioral Model Analysis.

Abstract

A lot of people are starting to take an interest in and buy smart phones that have application platforms. Many security risks have emerged as a result of the widespread usage of various apps. Permission control assaults, phishing, spyware, botnets, malware, and privacy leakage attacks are all forms of attacks that pose hazards. Invalid access control, data confidentiality breaches, and app authorization issues are among other concerns.

Downloads

Download data is not yet available.

References

A. of Chief Police Officers, ―Good practice guide for computer based electronic evidence,‖ ACPO, Tech. Rep.

K. Kent, S. Chevalier, T. Grance, and H. Dang, ―Guide to integrating forensic techniques into incident response,‖ National Institute of Standards and Technology, Tech. Rep.

Downloads

Published

2023-12-24

How to Cite

S.Lalitha , Chandra Ananya, Gudesi Bhanusha , Y.Anjali. (2023). BEHAVIORAL MODEL FOR LIVE DETECTION OF APPS BASED ATTACK. Pegem Journal of Education and Instruction, 13(4), 762–785. Retrieved from https://pegegog.net/index.php/pegegog/article/view/4036

Issue

Section

Article