. Now a day, demand of smart phone apps is at its peak level. Every day
millions of apps are uploaded and many of them are vulnerable which will
compromise our important phone data. There are many techniques have evolved
which will help the user to detect such malware and stay protected. But none of
the existing malware detection technique mainly focused on the malware
detection by using the network traffic behavior. In the following proposed
work, malware detection phase is completely different. We will find out the
Spyware, Trojan kind malware and also the application which carried out this
work. We will compare the traces with the reference feature parameters and
detect the suspicious behavior. - See more at: .
No comments:
Post a Comment