Secure Distributed Mobile Volunteer Computing with Android

被引:9
作者
Bibi, Iram [1 ]
Akhunzada, Adnan [2 ]
Malik, Jahanzaib [3 ]
Khan, Muhammad Khurram [4 ]
Dawood, Muhammad [5 ,6 ]
机构
[1] COMSATS Univ Islamabad, Islamabad, Pakistan
[2] Tech Univ Denmark, Cybersecur Sect, DTU Compute, Dtu Compute, Denmark
[3] NUST, Natl Cyber Secur Auditing & Evaluat Lab NCSAEL, Rawalpindi, Pakistan
[4] King Saud Univ, Coll Comp & Amp Informat Sci, Ctr Excellence Informat Assurance COEIA, Riyadh, Saudi Arabia
[5] Plymouth Univ, Ctr Secur Commun & Network Res, Plymouth, Devon, England
[6] Univ Appl Sci Darmstadt, Fac Comp Sci, Darmstadt, Germany
关键词
Volunteer computing (VC); tactile internet; android malware; deep learning (DL); MALWARE DETECTION; NETWORK; SURVEILLANCE; FRAMEWORK;
D O I
10.1145/3428151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Volunteer Computing provision of seamless connectivity that enables convenient and rapid deployment of greener and cheaper computing infrastructure is extremely promising to complement next-generation distributed computing systems. Undoubtedly, without tactile Internet and secure VC ecosystems, harnessing its full potentials and making it an alternative viable and reliable computing infrastructure is next to impossible. Android-enabled smart devices, applications, and services are inevitable for Volunteer computing. Contrarily, the progressive developments of sophisticated Android malware may reduce its exponential growth. Besides, Android malwares are considered the most potential and persistent cyber threat to mobile VC systems. To secure Android-based mobile volunteer computing, the authors proposedMulDroid, an efficient and self-learning autonomous hybrid (Long-Short-Term Memory, Convolutional Neural Network, Deep Neural Network) multi-vector Androidmalware threat detection framework. The proposed mechanism is highly scalable with well-coordinated infrastructure and self-optimizing capabilities to proficiently tackle fast-growing dynamic variants of sophisticated malware threats and attacks with 99.01% detection accuracy. For a comprehensive evaluation, the authors employed current state-of-the-art malware datasets (Android Malware Dataset, Androzoo) with standard performance evaluation metrics. Moreover, MulDroid is compared with our constructed contemporary hybrid DL-driven architectures and benchmark algorithms. Our proposed mechanism outperforms in terms of detection accuracy with a trivial tradeoff speed efficiency. Additionally, a 10-fold cross-validation is performed to explicitly show unbiased results.
引用
收藏
页数:21
相关论文
共 37 条
[1]   Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model [J].
Al-Khafajiy, Mohammed ;
Otoum, Safa ;
Baker, Thar ;
Asim, Muhammad ;
Maamar, Zakaria ;
Aloqaily, Moayad ;
Taylor, Mark ;
Randles, Martin .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
[2]   COMITMENT: A Fog Computing Trust Management Approach [J].
Al-khafajiy, Mohammed ;
Baker, Thar ;
Asim, Muhammad ;
Guo, Zehua ;
Ranjan, Rajiv ;
Longo, Antonella ;
Puthal, Deepak ;
Taylor, Mark .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :1-16
[3]  
Al-Shehri H, 2018, PARASITOLOGY, V145, P1715, DOI [10.1017/S003118201800029X, 10.1017/s003118201800029x]
[4]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[5]  
Anderson David P., 2019, J GRID COMPUT, P1
[6]  
Bibi I., 2019, 2019 UKCHINA EMERGIN, P1
[7]   A Dynamic DL-Driven Architecture to Combat Sophisticated Android Malware [J].
Bibi, Iram ;
Akhunzada, Adnan ;
Malik, Jahanzaib ;
Iqbal, Javed ;
Mussaddiq, Arslan ;
Kim, Sungwon .
IEEE ACCESS, 2020, 8 :129600-129612
[8]   The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis [J].
Conti, Mauro ;
Li, Qian Qian ;
Maragno, Alberto ;
Spolaor, Riccardo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :2658-2713
[9]   A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks [J].
Haider, Shahzeb ;
Akhunzada, Adnan ;
Mustafa, Iqra ;
Patel, Tanil Bharat ;
Fernandez, Amanda ;
Choo, Kim-Kwang Raymond ;
Iqbal, Javed .
IEEE ACCESS, 2020, 8 :53972-53983
[10]  
Hamed Y.S.I., 2019, INT J COMPUT SCI INF, V17