
412
Big Data: Storage, Sharing, and Security
malicious applications requested a total of 14,758 permissions, which are more than benign
applications that requested 4,470 permissions. Another important behavior is that some of
the permissions are only requested by the benign applications and not by the malicious
ones, and vice versa. Furthermore, common permissions and unique permissions are also
analyzed.
However, Table 17.2 lists the top 20 used permissions for benign and malicious applications.
In the table, it can be seen that there is a small difference in which 16 out of 20 popular used
permissions are common in both datasets. Now there is a