Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications

Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2

Abstract

Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious applications are released by intruders, which are more difficult to identify and deal with because they use more sophisticated methods. Although methods have been provided to calculate the security risk and identify malicious apps, but with the expansion of the level and depth of their threats, the need for new methods in this field is still required. In this study, we have presented a new algorithm to calculate the security risk of Android apps, which can be used to identify malicious apps from benign ones. In this algorithm, to estimate the security risk of an input app, the nearest neighbors of the type of malicious apps and the nearest neighbors of the type of normal apps are determined separately using Hamming distance. Then, based on the criteria presented in this article, the security risk of an unknown input app can be computed. After implementing this algorithm and adjusting the parameter of the number of neighbors with the help of real data, extensive various experiments were conducted in order to evaluate the proposed method. In these experiments, the proposed method was compared with three previously known methods in the context of detecting malicious apps, using four different datasets. The results show the higher detection rate of the proposed method in most cases.

Authors and Affiliations

Mahmood Deypir

Keywords

Related Articles

Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis

Cybercriminals are targeting more humans than machines these days because they try to exploit users' vulnerabilities to achieve their destructive goals. The main purpose of this study is to identify the factors affecting...

A Malware Classification Method Using visualization and Word Embedding Features

With the explosive growth of threats to Internet security, malware visualization in malware classification has become a promising study area in security and machine learning. This paper proposes a visualization method fo...

A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks

During the very last decade, people have been spending lots of time working with social networks to interact with friends and to share information, thoughts, news, and etc. These social networks comprise a very important...

Analysis of exchange market disruptors using graph-based social network analysis

Today, increasing the science and technology and the communication technologies, especially in cyberspace, however physically act have become interact with cyberspace has caused a more significant effect on the culture a...

Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm

In most Internet of Things (IoT) applications, network nodes are limited in terms of energy source. Therefore, the need for innovative methods to eliminate energy loss which shortens the life of networks is fully felt in...

Download PDF file
  • EP ID EP730062
  • DOI -
  • Views 41
  • Downloads 0

How To Cite

Mahmood Deypir (2023). Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications. Electronic and Cyber Defense, 11(2), -. https://europub.co.uk/articles/-A-730062