A Novel Approach for clone app detection using VADER’s Algorithm

Software that imitates the capabilities of legitimate, legally responsible, and authentic applications is known as a fraudulent web application. It’s critical to keep track of which mobile applications are secure and which aren’t as the number of them in our daily lives increases. One cannot judge t...

Full description

Bibliographic Details
Main Authors: Antad Sonali, Khamkar Shreyas, Khambayate Ayush, Khandare Om, Khaire Atharva, Khambadkar Prasad, Khanchandni Deep
Format: Article
Language:English
Published: EDP Sciences 2023-01-01
Series:ITM Web of Conferences
Subjects:
Online Access:https://www.itm-conferences.org/articles/itmconf/pdf/2023/06/itmconf_icdsac2023_01003.pdf
_version_ 1797745602515173376
author Antad Sonali
Khamkar Shreyas
Khambayate Ayush
Khandare Om
Khaire Atharva
Khambadkar Prasad
Khanchandni Deep
author_facet Antad Sonali
Khamkar Shreyas
Khambayate Ayush
Khandare Om
Khaire Atharva
Khambadkar Prasad
Khanchandni Deep
author_sort Antad Sonali
collection DOAJ
description Software that imitates the capabilities of legitimate, legally responsible, and authentic applications is known as a fraudulent web application. It’s critical to keep track of which mobile applications are secure and which aren’t as the number of them in our daily lives increases. One cannot judge the truth, and the only basis for judging each application is the opposing viewpoints that are stated for each application. Once the false program has been installed, the perpetrators carry out retaliatory acts such as aggressive ad display to recoup revenue, intercepting sensitive data from your system, polluting the impact device, and so forth. Users frequently cannot tell the difference between legitimate and fraudulent applications By developing a place where people can ask questions before installing the program, It is suggested to employ sentiment analysis (VADERS), which is a revolutionary method for detecting fraudulent apps.. The outcome is determined by the ratings and comments provided by users who have already used the application. As a result, we will use sentiment analysis to examine the viewpoints once more. Sentiment analysis will be carried out using the VADERS approach, which analyses text.
first_indexed 2024-03-12T15:25:42Z
format Article
id doaj.art-57ca2a13eec7413b90bf05e467340f01
institution Directory Open Access Journal
issn 2271-2097
language English
last_indexed 2024-03-12T15:25:42Z
publishDate 2023-01-01
publisher EDP Sciences
record_format Article
series ITM Web of Conferences
spelling doaj.art-57ca2a13eec7413b90bf05e467340f012023-08-10T13:16:50ZengEDP SciencesITM Web of Conferences2271-20972023-01-01560100310.1051/itmconf/20235601003itmconf_icdsac2023_01003A Novel Approach for clone app detection using VADER’s AlgorithmAntad Sonali0Khamkar Shreyas1Khambayate Ayush2Khandare Om3Khaire Atharva4Khambadkar Prasad5Khanchandni Deep6Department of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologySoftware that imitates the capabilities of legitimate, legally responsible, and authentic applications is known as a fraudulent web application. It’s critical to keep track of which mobile applications are secure and which aren’t as the number of them in our daily lives increases. One cannot judge the truth, and the only basis for judging each application is the opposing viewpoints that are stated for each application. Once the false program has been installed, the perpetrators carry out retaliatory acts such as aggressive ad display to recoup revenue, intercepting sensitive data from your system, polluting the impact device, and so forth. Users frequently cannot tell the difference between legitimate and fraudulent applications By developing a place where people can ask questions before installing the program, It is suggested to employ sentiment analysis (VADERS), which is a revolutionary method for detecting fraudulent apps.. The outcome is determined by the ratings and comments provided by users who have already used the application. As a result, we will use sentiment analysis to examine the viewpoints once more. Sentiment analysis will be carried out using the VADERS approach, which analyses text.https://www.itm-conferences.org/articles/itmconf/pdf/2023/06/itmconf_icdsac2023_01003.pdfsentiment analysispositive – negative ratingsapp securitymachine learning modelsbehavioral feature extraction
spellingShingle Antad Sonali
Khamkar Shreyas
Khambayate Ayush
Khandare Om
Khaire Atharva
Khambadkar Prasad
Khanchandni Deep
A Novel Approach for clone app detection using VADER’s Algorithm
ITM Web of Conferences
sentiment analysis
positive – negative ratings
app security
machine learning models
behavioral feature extraction
title A Novel Approach for clone app detection using VADER’s Algorithm
title_full A Novel Approach for clone app detection using VADER’s Algorithm
title_fullStr A Novel Approach for clone app detection using VADER’s Algorithm
title_full_unstemmed A Novel Approach for clone app detection using VADER’s Algorithm
title_short A Novel Approach for clone app detection using VADER’s Algorithm
title_sort novel approach for clone app detection using vader s algorithm
topic sentiment analysis
positive – negative ratings
app security
machine learning models
behavioral feature extraction
url https://www.itm-conferences.org/articles/itmconf/pdf/2023/06/itmconf_icdsac2023_01003.pdf
work_keys_str_mv AT antadsonali anovelapproachforcloneappdetectionusingvadersalgorithm
AT khamkarshreyas anovelapproachforcloneappdetectionusingvadersalgorithm
AT khambayateayush anovelapproachforcloneappdetectionusingvadersalgorithm
AT khandareom anovelapproachforcloneappdetectionusingvadersalgorithm
AT khaireatharva anovelapproachforcloneappdetectionusingvadersalgorithm
AT khambadkarprasad anovelapproachforcloneappdetectionusingvadersalgorithm
AT khanchandnideep anovelapproachforcloneappdetectionusingvadersalgorithm
AT antadsonali novelapproachforcloneappdetectionusingvadersalgorithm
AT khamkarshreyas novelapproachforcloneappdetectionusingvadersalgorithm
AT khambayateayush novelapproachforcloneappdetectionusingvadersalgorithm
AT khandareom novelapproachforcloneappdetectionusingvadersalgorithm
AT khaireatharva novelapproachforcloneappdetectionusingvadersalgorithm
AT khambadkarprasad novelapproachforcloneappdetectionusingvadersalgorithm
AT khanchandnideep novelapproachforcloneappdetectionusingvadersalgorithm