Abstract
Volunteer Computing provision of seamless connectivity that enables convenient and rapid deployment of greener and cheaper computing infrastructure is extremely promising to complement next-generation distributed computing systems. Undoubtedly, without tactile Internet and secure VC ecosystems, harnessing its full potentials and making it an alternative viable and reliable computing infrastructure is next to impossible. Android-enabled smart devices, applications, and services are inevitable for Volunteer computing. Contrarily, the progressive developments of sophisticated Android malware may reduce its exponential growth. Besides, Android malwares are considered the most potential and persistent cyber threat to mobile VC systems. To secure Android-based mobile volunteer computing, the authors proposed MulDroid, an efficient and self-learning autonomous hybrid (Long-Short-Term Memory, Convolutional Neural Network, Deep Neural Network) multi-vector Android malware threat detection framework. The proposed mechanism is highly scalable with well-coordinated infrastructure and self-optimizing capabilities to proficiently tackle fast-growing dynamic variants of sophisticated malware threats and attacks with 99.01% detection accuracy. For a comprehensive evaluation, the authors employed current state-of-the-art malware datasets (Android Malware Dataset, Androzoo) with standard performance evaluation metrics. Moreover, MulDroid is compared with our constructed contemporary hybrid DL-driven architectures and benchmark algorithms. Our proposed mechanism outperforms in terms of detection accuracy with a trivial tradeoff speed efficiency. Additionally, a 10-fold cross-validation is performed to explicitly show unbiased results.
- Mohammed Al-Khafajiy, Thar Baker, Muhammad Asim, Zehua Guo, Rajiv Ranjan, Antonella Longo, Deepak Puthal, and Mark Taylor. 2020. COMITMENT: A fog computing trust management approach. J. Parallel Distrib. Comput. 137 (2020), 1–16.Google Scholar
Digital Library
- Mohammed Al-Khafajiy, Safa Otoum, Thar Baker, Muhammad Asim, Zakaria Maamar, Moayad Aloqaily, M. J. Taylor, and Martin Randles. 2021. Intelligent control and security of fog resources in healthcare systems via a cognitive fog model. ACM Trans. Internet Technol. 21, 3 (2021), 1–23. Google Scholar
Digital Library
- Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon. 2016. AndroZoo: Collecting millions of Android apps for the research community. In 13th International Conference on Mining Software Repositories (MSR’16). ACM, New York, NY, 468–471. DOI:https://doi.org/10.1145/2901739.2903508 Google Scholar
Digital Library
- Hani Alshahrani, Harrison Mansourt, Seaver Thorn, Ali Alshehri, Abdulrahman Alzahrani, and Huirong Fu. 2018. DDefender: Android application threat detection using static and dynamic analysis. In IEEE International Conference on Consumer Electronics (ICCE’18). IEEE, 1–6.Google Scholar
Cross Ref
- David P. Anderson. 2019. BOINC: A platform for volunteer computing. J. Grid Comput. (2019), 1–24.Google Scholar
- Iram Bibi, Adnan Akhunzada, Jahanzaib Malik, Ghufran Ahmed, and Mohsin Raza. 2019. An effective Android ransomware detection through multi-factor feature filtration and recurrent neural network. In UK/China Emerging Technologies (UCET’19). IEEE, 1–4.Google Scholar
- Iram Bibi, Adnan Akhunzada, Jahanzaib Malik, Javed Iqbal, Arslan Mussaddiq, and Sungwon Kim. 2020. A dynamic DL-driven architecture to combat sophisticated Android malware. IEEE Access 8 (2020), 129600–129612.Google Scholar
Cross Ref
- Mauro Conti, Qian Qian Li, Alberto Maragno, and Riccardo Spolaor. 2018. The dark side (-channel) of mobile devices: A survey on network traffic analysis. IEEE Commun. Surv. Tutor. 20, 4 (2018), 2658–2713.Google Scholar
Digital Library
- Shahzeb Haider, Adnan Akhunzada, Iqra Mustafa, Tanil Bharat Patel, Amanda Fernandez, Kim-Kwang Raymond Choo, and Javed Iqbal. 2020. A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks. IEEE Access 8 (2020), 53972–53983.Google Scholar
Cross Ref
- Yasmin Salah Ibrahim Hamed, Sarah Nabil Abdullah Abdul Kader, and Mostafa-Sami M. Mostafa. 2019. Mobile malware detection: A survey. Int. J. Comput. Sci. Inf. Secur. 17, 1 (2019).Google Scholar
- Chihiro Hasegawa and Hitoshi Iyatomi. 2018. One-dimensional convolutional neural networks for Android malware detection. In IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA’18). IEEE, 99–102.Google Scholar
- Patcharaporn Jenviriyakul, Gantaphon Chalumporn, Tiranee Achalakul, Filippo Costa, and Khajonpong Akkarajitsakul. 2019. ALICE Connex: A volunteer computing platform for the time-of-flight calibration of the ALICE experiment. An opportunistic use of CPU cycles on Android devices. Fut. Gen. Comput. Syst. 94 (2019), 510–523.Google Scholar
Cross Ref
- ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, and Djedjiga Mouheb. 2018. MalDozer: Automatic framework for Android malware detection using deep learning. Digit. Investig. 24 (2018), S48–S59.Google Scholar
Cross Ref
- TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, and Eul Gyu Im. 2018. A multimodal deep learning method for Android malware detection using various features. IEEE Trans. Inf. Forens. Secur. 14, 3 (2018), 773–788.Google Scholar
Cross Ref
- Erick Lavoie and Laurie Hendren. 2019. Personal volunteer computing. In 16th ACM International Conference on Computing Frontiers. 240–246. Google Scholar
Digital Library
- William Younghoo Lee, Joshua Saxe, and Richard Harang. 2019. SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks. In Deep Learning Applications for Cyber Security. Springer, 197–210.Google Scholar
- Hongliang Liang, Yan Song, and Da Xiao. 2017. An end-to-end model for Android malware detection. In IEEE International Conference on Intelligence and Security Informatics (ISI’17). IEEE, 140–142.Google Scholar
Cross Ref
- Shahzana Liaqat, Adnan Akhunzada, Fatema Sabeen Shaikh, Athanasios Giannetsos, and Mian Ahmad Jan. 2020. SDN orchestration to combat evolving cyber threats in internet of medical things (IoMT). Comput. Commun. (2020).Google Scholar
- Liu Liu, Olivier De Vel, Qing-Long Han, Jun Zhang, and Yang Xiang. 2018. Detecting and preventing cyber insider threats: A survey. IEEE Commun. Surv. Tutor. 20, 2 (2018), 1397–1417.Google Scholar
Cross Ref
- Jahanzaib Malik, Adnan Akhunzada, Iram Bibi, Muhammad Imran, Arslan Musaddiq, and Sung Won Kim. 2020. Hybrid deep learning: An efficient reconnaissance and surveillance detection mechanism in SDN. IEEE Access 8 (2020), 134695–134706.Google Scholar
Cross Ref
- Jahanzaib Malik, Adnan Akhunzada, Iram Bibi, Muhammad Talha, Mian Ahmad Jan, and Muhammad Usman. 2020. Security-aware data-driven intelligent transportation systems. IEEE Sens. J. (2020).Google Scholar
Cross Ref
- Fabio Martinelli, Fiammetta Marulli, and Francesco Mercaldo. 2017. Evaluating convolutional neural network for effective mobile malware detection. Procedia Comput. Sci. 112 (2017), 2372–2381. Google Scholar
Digital Library
- Tessema M. Mengistu and Dunren Che. 2019. Survey and taxonomy of volunteer computing. ACM Comput. Surv. 52, 3 (2019), 1–35. Google Scholar
Digital Library
- Mohammad Sabokrou, Mohsen Fayyaz, Mahmood Fathy, Zahra Moayed, and Reinhard Klette. 2018. Deep-anomaly: Fully convolutional neural network for fast anomaly detection in crowded scenes. Comput. Vis. Image Underst. 172 (2018), 88–97.Google Scholar
Cross Ref
- Sevil Sen, Emre Aydogan, and Ahmet I. Aysan. 2018. Coevolution of mobile malware and anti-malware. IEEE Trans. Inf. Forens. Secur. 13, 10 (2018), 2563–2574.Google Scholar
Cross Ref
- Latika Singh and Markus Hofmann. 2017. Dynamic behavior analysis of Android applications for malware detection. In International Conference on Intelligent Communication and Computational Techniques (ICCT’17). IEEE, 1–7.Google Scholar
Cross Ref
- Statista. 2019. Number of Smartphone Users Worldwide from 2016 to 2021 (in Billions). Retrieved from https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/.Google Scholar
- Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, and Lorenzo Cavallaro. 2017. The evolution of Android malware and Android analysis techniques. ACM Comput. Surv. 49, 4 (2017), 1–41. Google Scholar
Digital Library
- Alaa Tharwat. 2018. Classification assessment methods. Appl. Comput. Inform. (2018).Google Scholar
- Steven Walczak. 2019. Artificial neural networks. In Advanced Methodologies and Technologies in Artificial Intelligence, Computer Simulation, and Human-Computer Interaction. IGI Global, 40–53.Google Scholar
- Anjing Wang, Mohan Iyer, Rudra Dutta, George N. Rouskas, and Ilia Baldine. 2012. Network virtualization: Technologies, perspectives, and frontiers. J. Lightw. Technol. 31, 4 (2012), 523–537.Google Scholar
Cross Ref
- Wei Wang, Mengxue Zhao, and Jigang Wang. 2019. Effective Android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J. Amb. Intell. Human. Comput. 10, 8 (2019), 3035–3043.Google Scholar
Cross Ref
- Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, and Wu Zhou. 2017. Deep ground truth analysis of current Android malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 252–276.Google Scholar
Cross Ref
- Ping Yan and Zheng Yan. 2018. A survey on dynamic mobile malware detection. Softw. Qual. J. 26, 3 (2018), 891–919. Google Scholar
Digital Library
- Jingjing Yao, Tao Han, and Nirwan Ansari. 2019. On mobile edge caching. IEEE Commun. Surv. Tutor. (2019).Google Scholar
Cross Ref
- Chaoyun Zhang, Paul Patras, and Hamed Haddadi. 2019. Deep learning in mobile and wireless networking: A survey. IEEE Commun. Surv. Tutor. (2019).Google Scholar
Cross Ref
- Yi Zhang, Yuexiang Yang, and Xiaolei Wang. 2018. A novel Android malware detection approach based on convolutional neural network. In the 2nd International Conference on Cryptography, Security and Privacy. ACM, 144–149. Google Scholar
Digital Library
Index Terms
Secure Distributed Mobile Volunteer Computing with Android
Recommendations
Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
The number of malicious Android apps is increasing rapidly. Android malware can damage or alter other files or settings, install additional applications, and so on. To determine such behaviors, a security analyst can significantly benefit from ...
Lightweight, obfuscation-resilient detection and family identification of Android malware
ICSE '18: Proceedings of the 40th International Conference on Software EngineeringThe number of malicious Android apps has been and continues to increase rapidly. These malware can damage or alter other files or settings, install additional applications, obfuscate their behaviors, propagate quickly, and so on. To identify and handle ...
ScanMe mobile: a cloud-based Android malware analysis service
As mobile malware have increased in number and sophistication, it has become pertinent for users to have tools that can inform them of potentially malicious applications. To fulfill this need, we develop a cloud-based malware analysis service called ...






Comments