• 제목/요약/키워드: Internet-based Applications

검색결과 1,458건 처리시간 0.03초

Google Play Malware Detection based on Search Rank Fraud Approach

  • Fareena, N;Yogesh, C;Selvakumar, K;Sai Ramesh, L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권11호
    • /
    • pp.3723-3737
    • /
    • 2022
  • Google Play is one of the largest Android phone app markets and it contains both free and paid apps. It provides a variety of categories for every target user who has different needs and purposes. The customer's rate every product based on their experience of apps and based on the average rating the position of an app in these arch varies. Fraudulent behaviors emerge in those apps which incorporate search rank maltreatment and malware proliferation. To distinguish the fraudulent behavior, a novel framework is structured that finds and uses follows left behind by fraudsters, to identify both malware and applications exposed to the search rank fraud method. This strategy correlates survey exercises and remarkably joins identified review relations with semantic and behavioral signals produced from Google Play application information, to distinguish dubious applications. The proposed model accomplishes 90% precision in grouping gathered informational indexes of malware, fakes, and authentic apps. It finds many fraudulent applications that right now avoid Google Bouncers recognition technology. It also helped the discovery of fake reviews using the reviewer relationship amount of reviews which are forced as positive reviews for each reviewed Google play the android app.

창업단계의 인터넷 비즈니스 성공요인에 관한 탐색적 연구 (Success Factors of Internet-based Business in the Start-up Phase)

  • 김승운
    • Journal of Information Technology Applications and Management
    • /
    • 제10권4호
    • /
    • pp.65-84
    • /
    • 2003
  • The Purpose of this study is to Identify and analyze the factors that determine the survival or success of internet-based companies in the start-up phase. The reason why we focus on companies which are in the early stage of development is because internet business is still at its early stage, and statistics indicate that many internet businesses have failed during the start-up phase. Using the model of new product outcomes proposed by Cooper(1979), we have formulated a conceptual model for more successful internet business ventures. On the basis of this model, the relationship between the financial and non-financial performance and various variables in the model is analyzed. For collecting empirical data, a web-based survey questionnaire was designed. A total of 97 usable questionnaires were gathered from internet companies nationwide. The results showed that controllable variables such as the commercial entity and information acquired during the new business process are related to the non-financial performance, while environment variables such as the compatibility of the resource base of the firm with the business, including a few controllable variables, are related to the financial performance. Future research needs to explore more precisely how the success factors are different according to the types of internet businesses and/or the stages of growth of the business.

  • PDF

서비스 기반 안드로이드 어플리케이션의 설계 및 구현 프로세스 (A Process to Design and Implement Service-based Android Applications)

  • 이호중;라현정;금창섭;김수동
    • 정보처리학회논문지D
    • /
    • 제18D권4호
    • /
    • pp.245-260
    • /
    • 2011
  • 인터넷의 빠른 보급과 함께 발전한 모바일 디바이스는 유연한 이동성과 함께 언제 어디서나 네트워크에 연결되는 특성을 가지고 있고, 어플리케이션들을 실행할 수 있다. 그러나, 모바일 디바이스의 특성인 자원 제약성에 영향을 받기 때문에 복잡한 기능을 하는 어플리케이션을 실행시킬 수가 없다. 그러므로, 일부 기능을 외부에 위치하거나 외부 서비스를 이용하는 접근 방법에 대해 연구가 진행되고 있다. 안드로이드는 대표적인 모바일 플랫폼 중 하나로, 제한된 자원을 가지는 모바일 디바이스 상에서 여러 모바일 어플리케이션들을 실행시킬 수 있도록 설계되었다. 서비스 개념과 안드로이드 플랫폼을 이용한 서비스 기반 안드로이드 어플리케이션은 어플리케이션 기능이 분산되었다는 점과 안드로이드에 특화된 컴포넌트를 포함하고 있다는 점에서 전형적인 소프트웨어와 차이점을 가지고 있다. 그러므로, 일반적으로 널리 적용된 객체지향 분석 및 설계 기법은 서비스 기반의 안드로이드 모바일 어플리케이션 개발에는 그대로 적용되기가 어렵다. 본 논문은 기존 개발 프로세스를 확장하여 서비스 기반 안드로이드 어플리케이션의 개발 프로세스를 제안한다. 우선 서비스 기반 안드로이드 어플리케이션을 개발함에 있어서 발생되는 설계 이슈를 도출한다. 그리고, 각 도출된 이슈를 해결하기 위하여 기존의 객체지향 개발 프로세스를 확장한다. 확장된 프로세스는 이슈를 구체적으로 해결하기 위한 상세 지침과 설계 결과 양식을 포함한다. 마지막으로, 사례연구를 통해 확장된 프로세스의 적용 결과를 보여준다. 본 논문에서 제안된 설계 프로세스는 서비스 기반 안드로이드 어플리케이션 개발을 보다 체계적이고 효과적으로 수행하는데 기본적인 방법론 지침으로 활용될 수 있다.

Applying the Policy scheme to the IntServ

  • Song, Wang-Cheol
    • Journal of information and communication convergence engineering
    • /
    • 제1권3호
    • /
    • pp.109-114
    • /
    • 2003
  • There is an emergence of Internet applications that have real-time requirements. These applications require IP to support guaranteed capacity, higher priority and lower packet loss rate. To address this, the Internet Engineering Task Force (IETF) is developing a set of protocols and standards for Integrated Services on the Internet. Using RSVP and policies to manage the allocation of network resources in order to provide different levels of service is a topic of great interest to service providers. Currently, it is not possible to dynamically reallocate resources during an application's session. This paper discusses how policies in conjunction with new service class can provide a more enhanced network resource allocation by allowing for this dynamic reallocation.

LSTM Android Malicious Behavior Analysis Based on Feature Weighting

  • Yang, Qing;Wang, Xiaoliang;Zheng, Jing;Ge, Wenqi;Bai, Ming;Jiang, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권6호
    • /
    • pp.2188-2203
    • /
    • 2021
  • With the rapid development of mobile Internet, smart phones have been widely popularized, among which Android platform dominates. Due to it is open source, malware on the Android platform is rampant. In order to improve the efficiency of malware detection, this paper proposes deep learning Android malicious detection system based on behavior features. First of all, the detection system adopts the static analysis method to extract different types of behavior features from Android applications, and extract sensitive behavior features through Term frequency-inverse Document Frequency algorithm for each extracted behavior feature to construct detection features through unified abstract expression. Secondly, Long Short-Term Memory neural network model is established to select and learn from the extracted attributes and the learned attributes are used to detect Android malicious applications, Analysis and further optimization of the application behavior parameters, so as to build a deep learning Android malicious detection method based on feature analysis. We use different types of features to evaluate our method and compare it with various machine learning-based methods. Study shows that it outperforms most existing machine learning based approaches and detects 95.31% of the malware.

M2M Architecture: Can It Realize Ubiquitous Computing in Daily life?

  • Babamir, Seyed Morteza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권2호
    • /
    • pp.566-579
    • /
    • 2012
  • Ubiquitous computing called pervasive one is based on the thought of pervading ability of computation in daily life applications. In other words, it aims to include computation in devices such as electronic equipment and automobiles. This has led to disengagement of computers from desktop form. Accordingly, the notice in ubiquitous computing being taken of a world steeped in remote and wireless computer-based-services. Handheld and wearable programmed devices such as sense and control appliances are such devices. This advancement is rapidly moving domestic tasks and life from device-and-human communication to the device-and-device model. This model called Machine to Machine (M2M) has led to acceleration of developments in sciences such as nano-science, bio-science, and information science. As a result, M2M led to appearance of applications in various fields such as, environment monitoring, agricultural, health care, logistics, and business. Since it is envisaged that M2M communications will play a big role in the future in all wireless applications and will be emerged as a progressive linkage for next-generation communications, this paper aims to consider how much M2M architectures can realize ubiquitous computing in daily life applications. This is carried out after acquainting and initiating readers with M2M architectures and arguments for M2M. Some of the applications was not achievable before but are becoming viable owing to emergence of M2M communications.

Towards Agile Application Integration with M2M Platforms

  • Chen, Menghan;Shen, Beijun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.84-97
    • /
    • 2012
  • M2M (Machine-to-Machine) Technology makes it possible to network all kinds of terminal devices and their corresponding enterprise applications. Therefore, several M2M platforms were developed in China in order to collect information from terminal devices dispersed all over the local places through 3G wireless network. However, when enterprise applications try to integrate with M2M platforms, they should be maintained and refactored to adapt the heterogeneous features and properties of M2M platforms. Moreover, syntactical and semantic unification for information sharing among applications and devices are still unsolved because of raw data transmission and the usage of distinguished business vocabularies. In this paper, we propose and develop an M2M Middleware to support agile application integration with M2M platform. This middleware imports the event engine and XML-based syntax to handle the syntactical unification, makes use of Ontology-based semantic mapping to solve the semantic unification and adopts WebService and ETL techniques to sustain multi-pattern interactive approach, in order to agilely make applications integrated with the M2M platform. Now, the M2M Middleware has been applied in the China Telecom M2M platform. The operation results show that applications will cost less time and workload when being integrated with M2M platform.

Flexible deployment of component-based distributed applications on the Cloud and beyond

  • Pham, Linh Manh;Nguyen, Truong-Thang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1141-1163
    • /
    • 2019
  • In an effort to minimize operational expenses and supply users with more scalable services, distributed applications are actually going towards the Cloud. These applications, sent out over multiple environments and machines, are composed by inter-connecting independently developed services and components. The implementation of such programs on the Cloud is difficult and generally carried out either by hand or perhaps by composing personalized scripts. This is extremely error prone plus it has been found that misconfiguration may be the root of huge mistakes. We introduce AutoBot, a flexible platform for modeling, installing and (re)configuring complex distributed cloud-based applications which evolve dynamically in time. AutoBot includes three modules: A simple and new model describing the configuration properties and interdependencies of components; a dynamic protocol for the deployment and configuration ensuring appropriate resolution of these interdependencies; a runtime system that guarantee the proper configuration of the program on many virtual machines and, if necessary, the reconfiguration of the deployed system. This reduces the manual application deployment process that is monotonous and prone to errors. Some validation experiments were conducted on AutoBot in order to ensure that the proposed system works as expected. We also discuss the opportunity of reusing the platform in the transition of applications from Cloud to Fog computing.

USN metadata management agent using IoT-based EMRA

  • Lee, Jong-Sub
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제14권4호
    • /
    • pp.96-103
    • /
    • 2022
  • In this paper, we define EMRA-based USN metadata to describe sensor device, sensor node, and sensor network information at the application level. And the proposed method for effectively storing and retrieving USN metadata based on EMRA uses agent technology. As the sensor metadata proposed in this paper is based on SensorML, interoperability can be maintained in the USN environment, and the metadata management system can be directly utilized for metadata management in USN middleware or applications.

다이얼-업 인터넷 서비스를 위한 교환 가상 회선 기반의 프레임 릴레이 액세스 시스템 (Switched Virtual Circuit-based Frame Relay Access System for Dial-up Internet Services)

  • 박명아;이현우
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 추계종합학술대회 논문집
    • /
    • pp.15-18
    • /
    • 1998
  • Most existing FRADs support only permanent virtual circuit-based frame relay services. But several applications such as intranets, desktop video conferencing, remote access and voice applications typically do not require the dedicated bandwidth capabilities of PVCs because connections are only occasionally needed. So it drives the need of switched virtual circuit-based FRADs which offer potentail cost savings associated with dynamic bandwidth on demand connectivity. In this paper, we describe Frame Relay Network Access System(FNAS) that provides switched virtual circuit-based frame relay access for dial-up Internet services. The hardware configuration, software architecture and call processing flow of FNAS is explained.

  • PDF