Research Article

On-Device Detection of Repackaged Android Malware via Traffic Clustering

Figure 14

Example of app clustering. Obviously, two clusters are identified. The dot in the top left corner is an outlier. The outlier is detected as an abnormal but harmless app by our method. This figure was generated by the density peak clustering tool.