Research Article

On-Device Detection of Repackaged Android Malware via Traffic Clustering

Table 1

Main notation used in this paper.

NotationMeaning

iAndroid app i
uNumber of mobile devices with app i installed
rNumber of devices with repackaged app
fNetwork flow
C-IPfClient-side IP address of f
S-IPfServer-side IP address of f
S-PortfServer-side port of f
AppNfName of the app that generates f
AppVfVersion of the app that generates f
TiSet time interval
Recording time of flow fu at the edge server
diFeature set of app i
Plaintext word in the feature sets
V(di)Numerical vector of traffic contents
Feature vector for the encrypted flow j in di
Traffic behaviors of di
Content similarity between di and dk
Behavior similarity between di and dk
Final similarity between di and dk