Skip to main content
Log in

Application of clustering methods for analyzing the security of Android applications

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This paper presents the results from developing the system for detecting malicious Android applications based on the fuzzy clustering method. We have described the format of the application feature vector, as well as presented studies on the effectiveness of using different criteria for separability. The high efficiency of the proposed approach has been experimentally confirmed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. IDC: Smartphone OS Market Share. http://www.idc.com/prodserv/smartphone-os-market-share.jsp.

  2. Can, G., Ma, C., and Wu, J., Data Clustering: Theory, Algorithms, and Applications, Philadelphia: Society for Industrial and Applied Mathematics, 2007.

    Google Scholar 

  3. de Oliveira, J.V. and Pedrycz, W., Advances in Fuzzy Clustering and Its Applications, Hoboken: Wiley, 2007.

    Book  Google Scholar 

  4. Wang, W. and Zhang, Y., On fuzzy cluster validity indices, Fuzzy Sets Syst., 2007, vol. 158, pp. 2095–2117.

    Article  MathSciNet  MATH  Google Scholar 

  5. Shlens, J., A Tutorial on Principal Component Analysis, University of California at San Diego: Systems Neurobiology Laboratory, 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Yu. Pavlenko.

Additional information

Original Russian Text © E.Yu. Pavlenko, A.V. Yarmak, D.A. Moskvin, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pavlenko, E.Y., Yarmak, A.V. & Moskvin, D.A. Application of clustering methods for analyzing the security of Android applications. Aut. Control Comp. Sci. 51, 867–873 (2017). https://doi.org/10.3103/S0146411617080156

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617080156

Keywords

Navigation