Health-care app detection using optimized clustering
Medical health-care apps have become ubiquitous in today’s world, enhancing health-care quality at affordable costs. The continuous development of new apps underscores their high acceptance and popularity. Machine learning techniques offer effective app identification owing to their high prediction accuracy, particularly with a training dataset of known apps. Although machine learning techniques provide high detection accuracy for known apps, they exhibit abysmal accuracy in detecting unknown and novel apps. This research proposes a novel approach to optimizing the K-means clustering algorithm for detecting zero-day apps. The proposed technique integrates a perceptron feed-forward neural network to determine the coordinates of the centroids of the clusters in K-means clustering. Experimental evaluations demonstrate the efficacy of the proposed approach in enhancing the performance of K-means clustering, providing improved detection for both known and unknown medical health-care apps. A total of 30 health-care apps was utilized in this evaluation. This research enhances the detection accuracy of medical healthcare apps, particularly zero-day apps. The intercluster similarity of the benign class improved to 0.99, and that of the malicious class improved to 0.91, highlighting the improved classification of the apps. The major contribution of this work is achieving an intercluster similarity of 0.89 for detecting novel apps.
- Moore AW, Papagiannaki K. Toward the accurate identification of network applications. Lect Notes Comput Sci. 2005;3431:41-54. doi: 10.1007/978-3-540-31966-5_4
- Zink T, Maier M. Analysis and Efficient Classification of P2P File Sharing Traffic. Technical Report KN-2010-DiSy-02. Germany: University of Konstanz; 2010. doi: 10.5281/zenodo.1234567
- Finsterbusch M, Richter C, Rocha E, Muller JA, Hanssgen K. A survey of payload-based traffic classification approaches. IEEE Commun Surv Tuto. 2014;16(2):1135-1156. doi: 10.1109/SURV.2013.100613.00161
- Smith R, Estan C, Jha S, Kong S. Deflating the Big Bang: Fast and Scalable Deep Packet Inspection with Extended Finite Automata. In: Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication; 2008. p. 207-218. doi: 10.1145/1402958.1402983
- Esteves AF, Inacio PR, Pereira M, et al. On-Line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The case of Goalbit. In: 2011 IEEE 10th International Symposium on Network Computing and Applications. United States: IEEE; 2011. p. 223-228. doi: 10.1109/nca.2011.38.
- Parekh JJ, Wang K, Stolfo SJ. Privacy-Preserving Payload- Based Correlation for Accurate Malicious Traffic Detection. In: Proceedings of the 2006 SIGCOMM Workshop on Large- Scale Attack Defense; 2006. p. 99-106. doi: 10.1145/1162666.1162679
- Ahmad A, Dey L. A k-mean clustering algorithm for mixed numeric and categorical data. Data Knowl Eng. 2007;63(2):503-527. doi: 10.1016/j.datak.2007.03.016
- Bezdek J, Ehrlich R. Numerical methods for fuzzy clustering. Comput Geosci. 1984;10:191-203. doi: 10.1016/0098-3004(84)90020-X
- Zhou ZH, Liu XY. Training cost-sensitive neural networks with methods addressing the class imbalance problem. IEEE Trans Knowl Data Eng. 2005;18(1):63-77. doi: 10.1109/TKDE.2005.14
- Anand R, Mehrotra KG, Mohan CK, Ranka S. An improved algorithm for neural network classification of imbalanced training sets. IEEE Trans Neural Netw. 1993;4(6):962-969. doi: 10.1109/72.258821
- Kumar NS, Rao KN, Govardhan A, Reddy KS, Mahmood AM. Undersampled k-means approach for handling imbalanced distributed data. Prog Artif Intell. 2014;3(1):29-38. doi: 10.1007/s13748-014-0040-7
- Wu J. The uniform effect of k-means clustering. In: Advances in K-means Clustering. Germany: Springer; 2012. p. 17-35. doi: 10.1007/978-3-642-31559-4_2
- Mindinventory. Mobile App for Healthcare. Available from: https://www.mindinventory.com/blog/advantages-mobileapp-for-healthcare [Last accessed on 2022 Dec 20].
- Haffey F, Brady RR, Maxwell S. A comparison of the reliability of smartphone apps for opioid conversion. Drug Saf. 2013;36(2):111-117. doi: 10.1007/s40264-013-0021-5
- Wolf JA, Moreau JF, Akilov O, et al. Diagnostic inaccuracy of smartphone applications for melanoma detection. JAMA Dermatol. 2013;149(4):422-426. doi: 10.1001/jamadermatol.2013.1241
- Rosser BA, Eccleston C. Smartphone applications for pain management. J Telemed Telecare. 2011;17(6):308-312. doi: 10.1258/jtt.2011.110202
- Ferrero NA, Morrell DS, Burkhart CN. Skin scan: A demonstration of the need for FDA regulation of medical apps on iPhone. J Am Acad Dermatol. 2013;68(3): 515-516. doi: 10.1016/j.jaad.2012.08.049
- Misra S, Lewis TL, Aungst TD. Medical application use and the need for further research and assessment for clinical practice: Creation and integration of standards for best practice to alleviate poor application design. JAMA Dermatol. 2013;149(6):661-662. doi: 10.1001/jamadermatol.2013.351
- Buijink AW, Visser BJ, Marshall L. Medical apps for smartphones: Lack of evidence undermines quality and safety. BMJ Evid Based Med. 2013;18(3):90-92. doi: 10.1136/eb-2013-101375
- McCartney M. How do we know whether medical apps work? BMJ. 2013;346:f1811. doi: 10.1136/bmj.f1190
- Hamilton A, Brady RW. Medical professional involvement in smartphone “apps” in dermatology. Br J Dermatol. 2012;167(1):220-221. doi: 10.1111/j.1365-2133.2012.11081.x
- Huckvale K, Car M, Morrison C, Car J. Apps for asthma selfmanagement: A systematic assessment of content and tools. BMC Med. 2012;10:144. doi: 10.1186/1741-7015-10-144
- Rodrigues M, Visvanathan A, Murchison J, Brady R. Radiology smartphone applications; current provision and cautions. Insights Imaging. 2013;4(5):555-562. doi: 10.1007/s13244-013-0275-2
- Van Velsen L, Beaujean DJ, Van Gemert-Pijnen JE. Why mobile health app overload drives us crazy, and how to restore the sanity. BMC Med Inform Decis Mak. 2013; 13:23. doi: 10.1186/1472-6947-13-1
- David J, Thomas C. Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic. Comput Secur. 2019;82:284-295. doi: 10.1016/j.cose.2018.11.00