Research Article

AppFA: A Novel Approach to Detect Malicious Android Applications on the Network

Table 8

The computational performance.

Procedures Time

Constrained flow clustering (Algorithm 1)3 min
App identification (Algorithm 2)5.2 min
Network behavior profile construction1.7 min
Peer group analysis45 sec