Research Article
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network
Algorithm 1
App traffic clustering procedure.
(1) let denotes signature set and stands for the signature | seeds | (2) while the clustering signal is received do | (3) if is empty then | (4) | (5) end if | (6) carry out signature matching | (7) carry out constrained flow clustering | (8) update with the clustering results | (9) end while |
|