Requirement Analysis Report SIH 1381 Analysis and Identification of Malicious Mobile Applications
Requirement Analysis Report SIH 1381 Analysis and Identification of Malicious Mobile Applications
SIH 1381
Analysis and Identification of Malicious Mobile
Applications
TABLE OF CONTENT:
◆ Functional Requirements:
1. User Registration
2. Login
3. Dashboard
4. Profile Management
5. Application Scanning
6. Real-time Monitoring
7. Behavioral Analysis
8. Alert and Notifications
9. Detailed Reporting
10. Educational Content
11. Feedback and Support
◆ Non-Functional Requirements:
1. Performance
2. Security
3. Usability
4. Scalability
5. Reliability
6. InterProbility
7. Maintainability
◆ Conclusion:
Analysis and Identification of Malicious Mobile
Applications
(SIH 1381)
Requirement Analysis
❖Functional Requirements:
1. User Registration:
The user registration feature enables new users to create accounts by providing
essential details such as their name, email address, and password.
2. Login:
➢ Users can securely log into the application using their chosen username
and password.
➢ Includes functionality for password recovery and reset.
3. Dashboard:
4. Profile Management:
5. Application Scanning:
6. Real-time Monitoring:
7. Behavioral Analysis:
9. Detailed Reporting:
❖Non-Functional Requirements:
1.Performance:
➢ Ensures optimal performance of the application under varying user loads and
operational conditions.
➢ Response times optimized to handle user interactions efficiently.
➢ Capable of supporting up to 10,000 concurrent users without compromising
performance.
2. Security:
3. Usability:
4. Scalability:
5. Reliability:
7. Maintainability:
❖ Conclusion: