Application of clustering methods for analyzing the security of Android applications


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

This paper presents the results from developing the system for detecting malicious Android applications based on the fuzzy clustering method. We have described the format of the application feature vector, as well as presented studies on the effectiveness of using different criteria for separability. The high efficiency of the proposed approach has been experimentally confirmed.

About the authors

E. Yu. Pavlenko

Peter the Great St. Petersburg Polytechnic University

Author for correspondence.
Email: jekon92@mail.ru
Russian Federation, St. Petersburg

A. V. Yarmak

Peter the Great St. Petersburg Polytechnic University

Email: jekon92@mail.ru
Russian Federation, St. Petersburg

D. A. Moskvin

Peter the Great St. Petersburg Polytechnic University

Email: jekon92@mail.ru
Russian Federation, St. Petersburg

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2017 Allerton Press, Inc.