Skip to main content

Mobile Apps Classification with Risk Score by Exploiting the Enriched Information of App Context

  • Conference paper
  • First Online:
Proceedings of the International Conference on Data Engineering and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 468))

  • 1467 Accesses

Abstract

With the use of mobile devices increasing rapidly day by day, huge numbers of mobile apps are coming into the market, many of which provide same functionality; as a result, having a proper classification of these apps can be useful for various purposes like making it time efficient and easy to the user for selecting the required app, understanding the user preferences which can motivate the intelligent personalized services, etc. But for having proper mobile app usage analysis, effective classification of apps is required for which detailed information about the apps is needed. However this is a nontrivial task as limited contextual information is available. As the information available about the apps is short and sparse, the classification of these apps can also be considered as coming in the category of classification of short and spares text. To classify these short and spares text, various methods are present that can be used to classify the mobile apps. In this paper, we have presented a method in which we extract the information about the apps from the sources like information from the labels (app name), information from the web search engine (snippets), contextual usage logs of users and the permissions the app requests before installation. This gives an effective and secure classification of the apps as source for most of these apps are some unknown vendors and so they are having the higher possibility of being malicious. With the contextual information collected the designed system is able to recommend the apps to the user based on their preferences.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. H. Zhu, E. Chen, H. Xiong and H. Cao, “Mobile App Classification with Enriched Contextual Information,” IEEE Transactions on mobile computing, (Volume:13, Issue:07), 7 July 2014.

    Google Scholar 

  2. M. Sahami and T.D. Heilman, “A web-based kernel function for measuring the similarity of short text snippets,” in Proc. WWW, Edinburgh, U.K., pp. 377–386, 2006.

    Google Scholar 

  3. Z. Broder et al., “Robust classification of rare queries using web knowledge,” in Proc. SIGIR, Amsterdam, Netherlands, pp. 231–238, 2007.

    Google Scholar 

  4. Wen-tau and C. Meek, “Improving Similarity Measures for Short Segments of Text”, in Proc. 22nd Nat. Conf. Artif. Intell., vol. 2. 2007, pp. 1489–1494.

    Google Scholar 

  5. X.-H. Phan et al., “A hidden topic-based framework toward building applications with short web documents,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 7, pp. 961–976, Jul. 2010.

    Google Scholar 

  6. H. Ma, H. Cao, Q. Yang, E. Chen, and J. Tian, “A habit mining approach for discovering similar mobile users,” in Proc. WWW, Lyon, France, pp. 231–240, 2012.

    Google Scholar 

  7. H. Zhu, H. Cao, E. Chen, H. Xiong, and J. Tian, “Exploiting enriched contextual information for mobile app classification,” in Proc CIKM, Maui, HI, USA, pp. 1617–1621, 2012.

    Google Scholar 

  8. Christopher S. Gates, et al., “Generating Summary Risk Scores For Mobile Applications”, IEEE Transactions on dependable and secure computing, (Volume:11, Issue:03), May–June 2014.

    Google Scholar 

  9. W. Enck, P. Gilbert, B. Chun, L.P. Cox, J. Jung, P. McDaniel, and A.N Sheth, “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” Proc. Ninth USENIX Conf. Operating Systems Design and Implementation, article 1–6, 2010.

    Google Scholar 

  10. A.P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android Permissions Demystified,” Proc. 18th ACM Conf. Computer and Comm. Security, pp. 627–638, 2011.

    Google Scholar 

  11. E. Chin, A.P. Felt, V. Sekar, and D. Wagner, “Measuring User Confidence in Smartphone Security and Privacy,” Proc. Eighth Symp. Usable Privacy and Security, (SOUPS’12), article 1, 2012.

    Google Scholar 

  12. B.P. Sarma et al., “Android Permissions: A Perspective Combining Risks and Benefits,” Proc. 17th ACM Symp. Access Control Models and Technologies (SACMAT12), 2012.

    Google Scholar 

  13. William M. Darling, “A theoritical and practical implementation Tutorial on Topic Modeling and Gibbs Sampling” December 1, 2011.

    Google Scholar 

  14. K. Nigam et al., “Using Maximum Entropy for Text Classification,” IJCAI Workshop Machine Learning for Information Filtering 1999, pp. 61–67.

    Google Scholar 

  15. NaïveBayesClassification, http://www.saedsayad.com/naive_bayesian.html.

  16. Android Manifest Permission Details, http://developer.android.com/reference/android/Manifest.permission.html.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prajakta P. Lokhande .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Lokhande, P.P., Lahane, S.R. (2017). Mobile Apps Classification with Risk Score by Exploiting the Enriched Information of App Context. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 468. Springer, Singapore. https://doi.org/10.1007/978-981-10-1675-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1675-2_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1674-5

  • Online ISBN: 978-981-10-1675-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics