Abstract
This paper presents the results from developing the system for detecting malicious Android applications based on the fuzzy clustering method. We have described the format of the application feature vector, as well as presented studies on the effectiveness of using different criteria for separability. The high efficiency of the proposed approach has been experimentally confirmed.
Similar content being viewed by others
References
IDC: Smartphone OS Market Share. http://www.idc.com/prodserv/smartphone-os-market-share.jsp.
Can, G., Ma, C., and Wu, J., Data Clustering: Theory, Algorithms, and Applications, Philadelphia: Society for Industrial and Applied Mathematics, 2007.
de Oliveira, J.V. and Pedrycz, W., Advances in Fuzzy Clustering and Its Applications, Hoboken: Wiley, 2007.
Wang, W. and Zhang, Y., On fuzzy cluster validity indices, Fuzzy Sets Syst., 2007, vol. 158, pp. 2095–2117.
Shlens, J., A Tutorial on Principal Component Analysis, University of California at San Diego: Systems Neurobiology Laboratory, 2005.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © E.Yu. Pavlenko, A.V. Yarmak, D.A. Moskvin, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
About this article
Cite this article
Pavlenko, E.Y., Yarmak, A.V. & Moskvin, D.A. Application of clustering methods for analyzing the security of Android applications. Aut. Control Comp. Sci. 51, 867–873 (2017). https://doi.org/10.3103/S0146411617080156
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411617080156