Darkshield: Mobile Intrusion Detection using Post-Authentication Failure Analysis and Android Security APIS
DOI:
https://doi.org/10.15662/IJARCST.2026.0903005Keywords:
Smartphone security, mobile theft detection, intrusion detection, offline SMS alert, face recognition, SIM change detection, GPS tracking, Cloudinary, Android securityAbstract
Smartphones store sensitive personal, financial, and confidential data, making them frequent targets for theft and unauthorized access. Traditional security methods such as PINs, passwords, and biometrics mainly prevent entry but offer limited protection after repeated intrusion attempts. This paper presents DarkShield, an Android-based intrusion detection and anti-theft system that proactively detects suspicious unlock attempts and alerts the rightful owner. When multiple incorrect PIN or password entries are detected, the system captures the intruder’s image, retrieves the current GPS location, uploads the evidence to cloud storage, and sends alerts through SMS and email. SMS notifications include the location and image link, while emails contain location details and the captured image as an attachment. The system also supports offline SMS alerts, online email notifications, and SIM change detection for unauthorized SIM replacement. To reduce false alerts, a machine learning-based face recognition module verifies whether the captured face matches the authorized user. By integrating evidence capture, location tracking, dual alert mechanisms, SIM monitoring, and intelligent face verification, DarkShield provides an effective solution for smartphone theft detection and unauthorized access prevention.
References
1. Mrs. E. Shalini and Dr. V. Shanthi, “A Novel Location-Based Anti-Theft Image Capture Application with Culprit Identification for Smartphones,” Testing, Psychometrics, Methodology in Applied Psychology, ISSN: 1972-6325, Volume 32, Special Issue S5, May 2025.
2. Godavarthy Sri Padma Praneeth, Chadarasi Bhavana Sai, Chakka Sravya, and Chinthalapudi Bala Padmaja Praveena, “Intruder Detection and Email Alerting System,” International Journal of Progressive Research in Engineering Management and Science, ISSN: 2583-1062, Volume 04, Issue 05, May 2024.
3. Mrs. Priyanka Gupta, Sahebrao Waghmare, Sham Gavane, and Aditya Dhurv, “Anti-Theft Device Tracking System,” International Journal for Multidisciplinary Research, E-ISSN: 2582-2160, Volume 6, Issue 2, March–April 2024.
4. Mattipelli Sandeep Kumar, Mohammad Iliyas, Pottimuttu Saiteja, Mohammad Aslam, and K. Sathiyapriya, “A Forensics Activity Logger to Extract User Activity from Devices,” International Journal of Innovative Research in Science, Engineering and Technology, ISSN (O): 2319-8753, ISSN (P): 2347-6710, Volume 14, Issue 4, April 2025.
5. P. Preethi et al., “Theft Alert Call and SMS,” International Journal of Current Science, ISSN: 2250-1770, Volume 15, Issue 3, July 2025.
6. F. M. David, E. M. Chan, J. C. Carlyle, and R. H. Campbell, “Android Security: A Survey of Issues and Solutions,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 1–23, 2013.
7. W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth, “TaintDroid: An Information-Flow Tracking System for Real-Time Privacy Monitoring on Smartphones,” in Proceedings of the USENIX OSDI, 2010.
8. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, “Andromaly: A Behavioral Malware Detection Framework for Android Devices,” Journal of Intelligent Information Systems, vol. 38, no. 1, pp. 161–190, 2012.
9. Y. Zhou and X. Jiang, “Dissecting Android Malware: Characterization and Evolution,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 95–109, 2012.
10. N. Peiravian and X. Zhu, “Machine Learning for Android Malware Detection Using Permission and API Calls,” in Proceedings of the IEEE International Conference on Tools with Artificial Intelligence (ICTAI), pp. 300–305, 2013.
11. Howard, M. Sandler, G. Chu, et al., “Searching for MobileNetV3,” in Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp. 1314–1324, 2019.
12. F. Schroff, D. Kalenichenko, and J. Philbin, “FaceNet: A Unified Embedding for Face Recognition and Clustering,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815–823, 2015.
13. S. Nath, B. Priyantha, D. Kotz, and C. Cornelius, “Smartphone-Based Intrusion Detection Systems Using Sensor Data,” IEEE Sensors Journal, vol. 14, no. 6, pp. 123–130, 2014.
14. Android Developers, “Fused Location Provider API Guide,” Google LLC, 2024.
15. Android Developers, “SmsManager API Reference,” Google LLC, 2024.
16. Seedha Devi, V., Mahalakshimi, P. V., & Anitha, A. (2026). Automated skin disease analysis and detection using AI-powered mobile application. International Journal of Research and Applied Innovations (IJRAI), 9(3), 531–539. https://doi.org/10.15662/IJRAI.2026.0903004
17. Pandi Prabha, S., & Rengarajan, A. (2025, February). Decentralized Resource Allocation Model Using Multi-agent Reinforcement Learning for Cloud Environment. In International Conference on Universal Threats in Expert Applications and Solutions (pp. 71-82). Singapore: Springer Nature Singapore.
18. Alangaram, S., Udaykiran, M., Rajkumar, K., & Yogeeswaran, T. (2026). Enhancing customer churn prediction and retention for e-commerce. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 9(3), 803–813. https://doi.org/10.15662/IJARCST.2026.0903003
19. Saravanan, M., Sivaganesan, S., & Rajamani, V. Performance analysis of Very Sparse Matrix Converter fed Three Phase cage Induction Drive using Conventional Space Vector Modulation.
20. Socrates, S., Shanmugapriya, M., Murugeshwari, B., & Angalaeswari, S. (2024). Efficient Design for Implantable Device Constant Current Induction Doubly Fed Generating Incorporating Grid Connectivity. In Intelligent Solutions for Sustainable Power Grids (pp. 382-392). IGI Global Scientific Publishing.
21. MATHEW, A. (2025). BEYOND THE BURNER: THE SYSTEMIC RISKS OF DISPOSABLE EMAIL ECOSYSTEMS.
22. Santhoshini, G., & Anbazhagan, K. (2014, February). An object based software tool for software measurement. In International Conference on Information Communication and Embedded Systems (ICICES2014) (pp. 1-5). IEEE.
23. Alangaram, S., Kiswar, M., Ajay, B., & Ezhilkumaran, P. (2026). Socialflow AI: Voice to social media scheduler. International Journal of Research and Applied Innovations (IJRAI), 9(3), 540–547. https://doi.org/10.15662/IJRAI.2026.0903005
24. Rajasekar, M., Nahar, G., Jagatheeswaran, S., Chinthamani, S. A. M., Mohammed, S. H., & Al-Hilali, A. (2024, May). The Roadmap to Classify Malware Using ML Algo Through IOT Based SN. In 2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 127-130). IEEE.
25. Raghul, K., Rajasolan, P., Rohinth, S., & Tharun, P. (2026). AI knowledge sharing web portal. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 9(3), 814–823. https://doi.org/10.15662/IJARCST.2026.0903004
26. Narayanan, L. K., Loganayagi, S., Hemavathi, R., Jayalakshmi, D., & Vimal, V. R. (2024, March). Machine learning-based predictive maintenance for industrial equipment optimization. In 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies (pp. 1-5). IEEE.
27. Sangeetha, D., Dharan, K. D., Krishna, A. C., & Karthikeyan, C. (2026). Speech and text conversion system for sign language using ML. International Journal of Computer Technology and Electronics Communication (IJCTEC), 9(3), 1000–1007. https://doi.org/10.15680/IJCTECE.2026.0903003
28. Rajasekar, M. (2024). Real-Time Predictive DevOps Intelligence for Risk-Aware Digital Business Processes in Cloud and SAP Ecosystems. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(4), 10713-10718.
29. Anbazhagan, K., SUGUMAR, D., Mahendran, M., & Natarajan, R. (2012). An efficient approach for statistical anonymization techniques for privacy preserving data mining. International Journal of Advanced Research in Computer and Communication Engineering, 1(7), 482-485.
30. Chowdary, P. B. K., Udayakumar, R., Jadhav, C., Mohanraj, B., & Vimal, V. R. (2024). An Efficient Intrusion Detection Solution for Cloud Computing Environments Using Integrated Machine Learning Methodologies. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 15(2), 14-26.
31. Seedha Devi, V., Kaavya, S., Deepika, B., Jayashree, D., & Nithikaa, L. (2026). AI-driven voter authentication and fraud detection system. International Journal of Computer Technology and Electronics Communication (IJCTEC), 9(3), 1008–1017. https://doi.org/10.15680/IJCTECE.2026.0903004
32. Mathew, A. (2021). Obfuscation Techniques for Magecart Detection and Prevention. International Journal of Computer Science and Mobile Computing, 10(2), 39-44.
33. Alangaram, S., Yuvaraj, G., Srivatsan, M. J., & Sathish, R. (2026). An IoT-based smart helmet for real-time rider safety monitoring and emergency response system. International Journal of Research in Production Engineering, Technology and Management (IJRPETM), 9(3), 1021–1030. https://doi.org/10.15662/IJRPETM.2026.0903003
34. Kaliappan, S., Ragunthar, T., Ali, M., & Murugeshwari, B. (2024). Implementation of Virtual High Speed Data Transfer in Satellite Communication Systems Using PLC and Cloud Computing. In AI Approaches to Smart and Sustainable Power Systems (pp. 274-286). IGI Global Scientific Publishing.
35. Naresh, D., Anand, P., Harish, M., Vamshi, A., Kethan, A., Nirmala, B., & Saravanan, M. (2026). Face Recognition Door Lock System with IoT &AI. International Journal of Computer Technology and Electronics Communication, 9(2), 526-534.
36. Prabha, S. P., & Rengarajan, A. (2025). ENHANCING CLOUD RESOURCE ALLOCATION WITH VISION TRANSFORMER, DEEP REINFORCEMENT LEARNING, AND IMPROVED SHRIKE OPTIMIZATION ALGORITHM. Corrosion Management ISSN: 1355-5243, 35(2), 233-245.
37. Raghul, K., Thamaraikannan, R., Sunil Kumar, S., & Siva, B. (2026). Plastitrack: A community-driven plastic waste collection and redemption platform. International Journal of Research and Applied Innovations (IJRAI), 9(3), 548–557. https://doi.org/10.15662/IJRAI.2026.0903006


