Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Mrs. A. Manga Devi, Beeraka Chaitanya, Gunuru Kiran Kishor, Talupuri Jahnavi, D Durga Bhavani, P S S Basheeranjali
DOI Link: https://doi.org/10.22214/ijraset.2024.61177
Certificate: View Certificate
With the rapid advancement of technology, fraudulent phone calls, such as spam and hazardous calls, have become a major issue for the telecom industry, resulting in annual financial losses of millions of dollars worldwide. Phishing and spamming via phone or mobile devices, as well as fraudulent phone calls, have become common dangers to individuals and organizations. Machine learning (ML) and artificial intelligence (AI) have evolved into excellent approaches for detecting and understanding fraudulent or damaging calls. This paper presents an overview of AI-based methods for detecting and evaluating spam or fraud, as well as an evaluation of their shortcomings and potential solutions. A new method for detecting fraudulent calls is proposed, which has shown extraordinary precision and accuracy. A dataset of actual fraudulent calls was used to evaluate the suggested approach. The results also showed that the technique was extremely accurate in detecting possibly fraudulent or spammy calls, as well as malicious calls. Countermeasures can be developed using the knowledge gathered from the research of fraud calls, which showed scammers\' methods and approaches.
I. INTRODUCTION
The use of mobile phones has increased as technology advances. The development of different play store apps on various major platforms, like popular Android and iOS, has exploded. It has become a major problem in the business intelligence area due to its rapid daily expansion through its daily use, marketing, and development. The market is becoming more competitive as a result [7]. Companies and software developers are in intense competition with each other to prove their product quality and invest a lot of time and effort in hiring clients to maintain their future success. Customer ratings, and updates on each program they have the opportunity to download play a very important role. This can be a strategy for engineers to identify their flaws and integrate them into the design of a new product that meets the needs of the people. [5].
As a general practice, instead of relying on traditional marketing strategies, under the trees App developers have the ability to majorly support their apps, and ultimately, manage the rank in the App Store. This is often accomplished by using so-called "bot ranch" or "water army" to increase the number of downloads and audits [15].
Occasionally, for the benefit of the developers, they will hire groups of people who will collectively commit fraud and offer spamming comments and ratings on an application. Crowd turfing is the word for this type of behaviour. As a result, it is critical to ensure that consumers are presented with accurate and authentic feedback prior to installing an app in order to minimize errors. In order to overcome and analyse the many comments and ratings that are supplied for
each application, an automated method is required [6]. Because mobile phones are such a common requirement, it is critical that suspicious program be designated as fraud so that play store users may uniquely identify them. It will be impossible for the user to tell if the remarks or ratings that they scroll over are a scam or genuine for their advantage. By offering a comprehensive perspective of ranking fraud detection system, we propose a system that would identify such fake applications on the Play or App store [2]. We can acquire the probability of determining whether an app is fake or not, therefore we present a system that uses four features that are in app purchases, Contains Ad, ratings and reviews to determine the probability of an app whether it's scamming its consumers or not [5]. We start the system by taking into account these four features that are the most crucial in determining the target. Then based on these features the collected data through scraping is being trained through various classification models and then selecting the right and accurate model for the system. In this stage of the selection, we got various models with different accuracy Naive Bayes with 83%, Logistic Regression with 84% and Decision tree with 85% accuracy [2].
II. LITERATURE SURVEY
Nevon Projects has proposed such a comprehensive framework that can be expanded with additional evidence generated by the domain to detect quality fraud. It is one of the most advanced projects to detect fraudulent applications using information algorithms. This program provides only 75-80% accuracy in detecting fraudulent applications.
On paper [7], they provided a complete overview of the facts and a recommended fraud detection framework. They tested three types of verification: Quality-based guarantees, rating based guarantees, review-based validation. In [2] paper, they view only updates as parameters with algorithm naïve bayes. They have developed a system that involves detecting fraudulent applications through emotional commenting and data processing. In [3] paper, first take a look at the app based totally on analytics evaluation as a way to decide whether the software is fake or proper. When enhancing your e-mail, use to test spelling of the file. through the usage of a simple facts set of rules and a manage analyst that exposes app fraud and once more primarily based on feedback from users we provide key-word analysis and based totally on scale. in this manner we also assist with what the consumer thinks approximately our app. on this fraud detection utility, the administrator also offers an app hyperlink that ought to be delivered to the software in which the person when logged in can see the app details and spot the hyperlink for that software. For us in which managers upload the app and offer a hyperlink for that from the Apple keep and Google Play store. to improve our app, we are able to ask the consumer after the usage of our app to get comments, we use this sort of remarks from the consumer and help us enhance the app where the consumer the use of our app will at once see all apps analysed via the administrator and introduced by way of admin. Consequently, the user receives all the records approximately that app and whether the app is fake or not. While an administrator pronounces fraud rather than their fraud, that saves the consumer time and offers person safety.
III. SYSTEM ANALYSIS
A. Existing System
The existing system for the "Fraud App Detection of Google Play Store Apps Using Decision Tree" project involves addressing the increasing need to distinguish between safe and potentially fraudulent mobile applications. With the proliferation of various mobile apps, it becomes essential to assess their safety. The system relies on four key parameters: ratings, reviews, in-app purchases, and the presence of ads within the apps. To make predictions, three machine learning models are employed: Decision Tree classifier, Logistic Regression, and Naïve Bayes. The evaluation of these models is based on four performance metrics: F1 score, Recall, Precision, and Accuracy. A desirable F1 score should exceed 0.7, and a recall score surpassing 0.5 is considered satisfactory, especially when accompanied by higher precision and accuracy. Upon analysis, the Decision Tree model emerged as a robust choice, exhibiting an accuracy of 85%, an F1 score of 0.815, a recall value of 0.85, and a precision of 0.87.
DISADVANTAGES OF THE EXISTING SYSTEM
B. Proposed System
The proposed system for enhancing the "Fraud App Detection of Google Play Store Apps Using Decision Tree" project aims to address the identified limitations and further improve the accuracy and reliability of fraudulent app detection.
To broaden the feature set, additional dynamic features will be incorporated, considering the evolving nature of mobile applications. This might involve real-time monitoring of app behaviours, tracking changes over time, and analysing user engagement patterns. To mitigate the impact of data imbalance, advanced sampling techniques or ensemble learning methods could be explored. The proposed system will also integrate sentiment analysis and natural language processing to better understand and interpret user reviews, accounting for potential biases and linguistic variations. Moreover, the model architecture will be optimized, possibly exploring more advanced machine learning algorithms or deep learning approaches to capture intricate relationships within the data. Finally, emphasis will be placed on developing a user-friendly interface to facilitate easy interpretation of the model's predictions, promoting transparency and user trust in the fraud detection system. Through these enhancements, the proposed system aims to achieve a more robust and adaptive solution for identifying fraudulent apps on the Google Play Store.
ADVANTAGES OF PROPOSED SYSTEM
Certainly, here are five potential advantages of the proposed system for the "Fraud App Detection of Google Play Store Apps Using Decision Tree":
IV. SYSTEM DESIGN
SYSTEM ARCHITECTURE
Below diagram depicts the whole system architecture.
V. SYSTEM IMPLEMENTATION
MODULES
User Interface and Reporting: The system includes a user-friendly interface for users to interact with and interpret the model's predictions. This module allows users to input app details or queries and receive clear and interpretable reports on the likelihood of fraud. Visualizations and concise summaries aid in presenting the results, enhancing user understanding and trust in the system.
VI. RESULTS AND DISCUSSION
The sole purpose of the given proposed system is majorly to review the fraud detection of Google play store applications and to use the four parameter methods to differentiate certain fraudulent applications or commonly referred to as spam applications. Experimental analysis is performed on different types of methodology in the proposed manner for the detection of fraud or fake applications. Our system will receive fraud with four types of evidence, such as ad-based ratings, in-app purchases and evidence-based reviews. In addition, the development-based integration approach
incorporates all four aspects to detect fraud. Various machine learning model were implemented which provided different results for the accuracy. By analysis, we found that our given proposed method provides 85% accuracy compared to other algorithms. While independent thinking still exists, the Decision Tree section performs better compared to other models such as the recession and the Naïve Bayes. It is an intuitive algorithm for separation problems. It is a reliable real-time guess, a setback problem. Decision trees can manage non-linear data sets effectively. It plays a role in decision-making in various fields of life, including engineering, social planning, business, and even law
In the Era of growing technology, the threat to security is also becoming a major issue and a part of it, today we have a number of apps listed on the Google app stores which also includes various fraud apps that are threat to users’ privacy and data. In our model we have worked precisely to detect fraudulent software using 4 parameters including scales, review scores, in-app purchases and content additions. We compared the accuracy of the three algorithms when the resolution tree appeared to be 85% higher. The framework is measurable and can be expanded to further proven domain-based fraudulent evidence. Demonstrated the effectiveness of the proposed system, algorithm detection measurement and standardization of level fraud operations. This can be used effectively to rate fraudulent play store application in play store for security purposes.
[1] Fawcett, T., Provost, F. Adaptive Fraud Detection. Data Mining and Knowledge Discovery 1, 291–316 (1997).doi:10.1023/A:1009700419189 [2] H. Weng et al., \"Online E-Commerce Fraud: A Large-Scale Detection and Analysis,\" 2018 IEEE 34th International Conference on Data Engineering (ICDE), Paris, France, 2018, pp. 1435-1440, doi: 10.1109/ICDE.2018.00162. [3] S. M. Gowri, G. Sharang Ramana, M. Sree Ranjani and T. Tharani,\"Detection of Telephony Spam and Scams using Recurrent Neural Network (RNN) Algorithm,\" 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2021, pp. 1284-1288, doi: 10.1109/ICACCS51430.2021.9441982. [4] Abidogun, Olusola Adeniyi. \"Data mining, fraud detection and mobile telecommunications: call pattern analysis with unsupervised neural networks.\" PhD diss., University of the Western Cape, 2005. [5] S. Sandhya, N. Karthikeyan, R. Sruthi “Machine learning method for detecting and analysis of fraud phone calls datasets” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878 (Online), Volume-8 Issue-6, March 2020 [6] Mohammad Iquebal Akhter, Dr. Mohammad Gulam Ahamad“Detecting Telecommunication fraud using neural networks through data mining” international Journal of Scientific & Engineering Research, Volume 3, Issue 3, March-2012. [7] I. Murynets, M. Zabarankin, R. P. Jover and Panagia, \"Analysis and detection of SIMbox fraud in mobility networks,\" IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, Canada, 2014, pp. 1519-1526, doi: 10.1109/INFOCOM.2014.6848087. [8] Crawford, M., Khoshgoftaar, T.M., Prusa,J.D. et al. Survey of review spam detection using machine learning techniques. Journal of Big Data 2, 23 (2015).doi:10.1186/s40537-015-0029-9. [9] Marzuoli A, Kingravi H, Dewey D and Pienta R. (2016). Uncovering the Landscape of Fraud and Spam in the Telephony Channel 2016 15th IEEE International Conference on Machine Learning and Applications(ICMLA). 10.1109/ICMLA.2016.0 153. 978-1-5090-6167-9. (853-858). [10] B. Teh, M. B. Islam, N. Kumar, M. K. Islam and U. Eaganathan,\"Statistical and Spending Behavior based Fraud Detection of Card-based Payment System,\"2018 International Conference on Electrical Engineering and Informatics (ICELTICs), Banda Aceh, Indonesia, 2018, pp. 78-83, doi: 10.1109/ICELTICS.2018.8548878. [11] H. Tu, A. Doupe, Z. Zhao, and G.-J. Ahn, “ Sok: Everyone hates’robocalls: A survey of techniques against telephone spam,” 2016 IEEE Symposium on Security and Privacy (SP), pp. 320 338, 2016. [12] M. Crawford, T.M. Khoshgoftaar, J.D Prusa, A.N. Richter, H. Al Najada, \"Survey of review spam detection using machine learning techniques\", Journal Of Big Data, 2, pp. 1-24, 42015.
Copyright © 2024 Mrs. A. Manga Devi, Beeraka Chaitanya, Gunuru Kiran Kishor, Talupuri Jahnavi, D Durga Bhavani, P S S Basheeranjali. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET61177
Publish Date : 2024-04-28
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here