...
首页> 外文期刊>International journal of machine learning and cybernetics >Clone detection in 5G-enabled social loT system using graph semantics and deep learning model
【24h】

Clone detection in 5G-enabled social loT system using graph semantics and deep learning model

机译:使用曲线图和深度学习模型,启用5G的社交批次系统中的克隆检测

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The protection and privacy of the 5G-IoT framework is a major challenge due to the vast number of mobile devices. Specialized applications running these 5G-IoT systems may be vulnerable to clone attacks. Cloning applications can be achieved by stealing or distributing commercial Android apps to harm the advanced services of the 5G-IoT framework. Meanwhile, most Android app stores run and manage Android apps that developers have submitted separately without any central verification systems. Android scammers sell pirated versions of commercial software to other app stores under different names. Android applications are typically stored on cloud servers, while API access services may be used to detect and prevent cloned applications from being released. In this paper, we proposed a hybrid approach to the Control Flow Graph (CFG) and a deep learning model to secure the smart services of the 5G-IoT framework. First, the newly submitted APK file is extracted and the JDEX decompiler is used to retrieve Java source files from possibly original and cloned applications. Second, the source files are broken down into various android-based components. After generating Control-Flow Graphs (CFGs), the weighted features are stripped from each component. Finally, the Recurrent Neural Network (RNN) is designed to predict potential cloned applications by training features from different components of android applications. Experimental results have shown that the proposed approach can achieve an average accuracy of 96.24% for cloned applications selected from different android application stores.
机译:5G-IOT框架的保护和隐私是由于大量移动设备导致的主要挑战。运行这些5G-IOT系统的专业应用可能易于克隆攻击。可以通过窃取或分发商业Android应用程序来损害5G-IOT框架的高级服务来实现克隆应用。同时,大多数Android应用商店运行并管理开发人员在没有任何中央验证系统的情况下单独提交的Android应用程序。 Android诈骗者将盗版版本的商业软件出售给不同名称的其他应用商店。 Android应用程序通常存储在云服务器上,而API访问服务可用于检测和防止克隆应用被释放。在本文中,我们提出了对控制流程图(CFG)和深度学习模型的混合方法,以确保5G-IOT框架的智能服务。首先,提取新提交的APK文件,jdex decompiler用于从可能原始和克隆的应用程序检索Java源文件。其次,源文件分解为各种基于Android的组件。在生成控制流程图(CFG)之后,从每个组件剥离加权特征。最后,经常性神经网络(RNN)旨在通过来自Android应用程序的不同组件的训练功能来预测潜在的克隆应用。实验结果表明,对于选自不同Android应用商店的克隆应用,所提出的方法可以实现96.24%的平均精度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号