DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System

Hui Lu, Chengjie Jin, Xiaohan Helu, Xiaojiang Du, Mohsen Guizani, Zhihong Tian

Research output: Contribution to journalArticlepeer-review

37 Scopus citations

Abstract

The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively protect important Android files on distributed systems / servers. However, it also brings some serious distributed security problems: for example, malicious applications use reinforcement methods to hide their high-risk code, and even hide in normal applications to avoid being detected by anti-virus engines. This makes it more difficult to filter or detect malware applications. In serious cases, it will greatly affect the efficiency of mobile communication and threaten the security of distributed computers. In this paper, we propose a generic and easy to deploy and extend unpacking framework called DeepAutoD (hereinafter referred to as d-ad). By eliminating the influence of reinforcement, the framework outputs the original DEX files containing malicious features, which can provide complete feature information input for distributed machine learning based on malicious code detection. The unpacking technology solution we use integrates the deep deception call chain, which can detect the mainstream applications in the application market in a short time (a large number of malicious code will be hidden in the conventional applications), and the algorithm can adapt to any high version of Android system. Data analysis and experimental results show that the program is superior to the existing main programs in terms of safety and effectiveness.

Original languageEnglish
Pages (from-to)2052-2065
Number of pages14
JournalIEEE Transactions on Network Science and Engineering
Volume9
Issue number4
DOIs
StatePublished - 2022

Keywords

  • Distributed computing
  • deception call chain
  • distributed security problem
  • machine learning
  • malicious application
  • malicious features
  • mobile communication
  • unpacking

Fingerprint

Dive into the research topics of 'DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System'. Together they form a unique fingerprint.

Cite this