DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System
المؤلف | Lu, Hui |
المؤلف | Jin, Chengjie |
المؤلف | Helu, Xiaohan |
المؤلف | Du, Xiaojiang |
المؤلف | Guizani, Mohsen |
المؤلف | Tian, Zhihong |
تاريخ الإتاحة | 2022-10-20T10:20:10Z |
تاريخ النشر | 2022-01-01 |
اسم المنشور | IEEE Transactions on Network Science and Engineering |
المعرّف | http://dx.doi.org/10.1109/TNSE.2021.3100750 |
الاقتباس | Lu, H., Jin, C., Helu, X., Du, X., Guizani, M., & Tian, Z. (2021). DeepAutoD: Research on distributed machine learning oriented scalable mobile communication security unpacking system. IEEE Transactions on Network Science and Engineering. |
الملخص | The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively protect important Android files on distributed systems / servers. However, it also brings some serious distributed security problems: for example, malicious applications use reinforcement methods to hide their high-risk code, and even hide in normal applications to avoid being detected by anti-virus engines. This makes it more difficult to filter or detect malware applications. In serious cases, it will greatly affect the efficiency of mobile communication and threaten the security of distributed computers. In this paper, we propose a generic and easy to deploy and extend unpacking framework called DeepAutoD (hereinafter referred to as d-ad). By eliminating the influence of reinforcement, the framework outputs the original DEX files containing malicious features, which can provide complete feature information input for distributed machine learning based on malicious code detection. The unpacking technology solution we use integrates the deep deception call chain, which can detect the mainstream applications in the application market in a short time (a large number of malicious code will be hidden in the conventional applications), and the algorithm can adapt to any high version of Android system. Data analysis and experimental results show that the program is superior to the existing main programs in terms of safety and effectiveness. |
راعي المشروع | This work was supported in part by the Guangdong Province Key Area R&D Program of China under Grant 2019B010137004, in part by the National Natural Science Foundation of China under Grants 61972108, U20B2046, and 61871140, in part by National Key Research and Development Plan under Grant 2018YFB0803504, and in part by Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2019). |
اللغة | en |
الناشر | IEEE Computer Society |
الموضوع | deception call chain Distributed computing distributed security problem machine learning malicious application malicious features mobile communication unpacking |
النوع | Article |
الصفحات | 2052-2065 |
رقم العدد | 4 |
رقم المجلد | 9 |
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2427 items ]