Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications

Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2

Abstract

Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious applications are released by intruders, which are more difficult to identify and deal with because they use more sophisticated methods. Although methods have been provided to calculate the security risk and identify malicious apps, but with the expansion of the level and depth of their threats, the need for new methods in this field is still required. In this study, we have presented a new algorithm to calculate the security risk of Android apps, which can be used to identify malicious apps from benign ones. In this algorithm, to estimate the security risk of an input app, the nearest neighbors of the type of malicious apps and the nearest neighbors of the type of normal apps are determined separately using Hamming distance. Then, based on the criteria presented in this article, the security risk of an unknown input app can be computed. After implementing this algorithm and adjusting the parameter of the number of neighbors with the help of real data, extensive various experiments were conducted in order to evaluate the proposed method. In these experiments, the proposed method was compared with three previously known methods in the context of detecting malicious apps, using four different datasets. The results show the higher detection rate of the proposed method in most cases.

Authors and Affiliations

Mahmood Deypir

Keywords

Related Articles

Mobile botnets detection using deep learning techniques

Smartphones are now well integrated with advanced capabilities and technologies such as the Internet. Today, due to the facilities and capabilities and the widespread use of smart mobile devices, mobile security has beco...

Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks

Accurate timing is one of the key features of the Global Positioning System (GPS), which is employed in many critical infrastructures. Any imprecise time measurement in GPS-based structures, such as smart power grids, an...

Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning

The presence of misbehaving users in Cognitive Radio Networks (CRN) can disrupt the process of spectrum sensing and detecting the status of the Primary User (PU). In order to reduce the destructive effect of this group o...

A Trust Evaluation Model for Cloud Computing Using Bayesian Network

In recent years, cloud computing has attracted much attention as a new computing model for providing infrastructure, platform, and software as a service. There is an important challenge in trust management between cloud...

The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator

Recently, the radio frequency fingerprint (RFF) has received attention in applications such as specific emiiter identification, detection of deception in navigation signals and detection of intrusion in wireless networks...

Download PDF file
  • EP ID EP730062
  • DOI -
  • Views 48
  • Downloads 0

How To Cite

Mahmood Deypir (2023). Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications. Electronic and Cyber Defense, 11(2), -. https://europub.co.uk./articles/-A-730062