Droid-IoT: Detect Android IoT Malicious Applications Using ML and Blockchain

被引:3
|
作者
Alshahrani, Hani Mohammed [1 ]
机构
[1] Najran Univ, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 01期
关键词
Android; blockchain; analysis; malware;
D O I
10.32604/cmc.2022.019623
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most rapidly growing areas in the last few years is the Internet of Things (IoT), which has been used in widespread fields such as healthcare, smart homes, and industries. Android is one of the most popular operating systems (OS) used by IoT devices for communication and data exchange. Android OS captured more than 70 percent of the market share in 2021. Because of the popularity of the Android OS, it has been targeted by cybercriminals who have introduced a number of issues, such as stealing private information. As reported by one of the recent studies Android malware are developed almost every 10 s. Therefore, due to this huge exploitation an accurate and secure detection system is needed to secure the communication and data exchange in Android IoT devices. This paper introduces Droid-IoT, a collaborative framework to detect Android IoT malicious applications by using the blockchain technology. Droid-IoT consists of four main engines: (i) collaborative reporting engine, (ii) static analysis engine, (iii) detection engine, and (iv) blockchain engine. Each engine contributes to the detection and minimization of the risk of malicious applications and the reporting of any malicious activities. All features are extracted automatically from the inspected applications to be classified by the machine learning model and store the results into the blockchain. The performance of Droid-IoT was evaluated by analyzing more than 6000 Android applications and comparing the detection rate of Droid-IoT with the state-of-the-art tools. Droid-IoT achieved a detection rate of 97.74% with a low false positive rate by using an extreme gradient boosting (XGBoost) classifier.
引用
收藏
页码:739 / 766
页数:28
相关论文
共 50 条
  • [21] Near-Ultrasonic Communications for IoT Applications using Android Smartphone
    Hornych, Yann
    Toledo, Javier Cafiada
    Wang, Boyang
    Yi, Won-Jae
    Saniie, Jafar
    2020 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2020, : 407 - 410
  • [22] Exploiting the Divergence between Output of ML Models to Detect Adversarial Attacks in Streaming IoT Applications
    Albaseer, Abdullatif
    Abdallah, Mohamed
    Al-Fuqaha, Ala
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3090 - 3095
  • [23] A Blockchain Tokenizer for Industrial IOT trustless applications
    Mazzei, Daniele
    Baldi, Giacomo
    Fantoni, Gualtiero
    Montelisciani, Gabriele
    Pitasi, Antonio
    Ricci, Laura
    Rizzello, Lorenzo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 105 : 432 - 445
  • [24] A PLS blockchain for IoT applications: protocols and architecture
    Alex Shafarenko
    Cybersecurity, 4
  • [25] Scalable Transport Mechanisms for Blockchain IoT Applications
    Schiller, Eryk
    Niya, Sina Rafati
    Surbeck, Timo
    Stiller, Burkhard
    2019 IEEE 44TH LOCAL COMPUTER NETWORKS (LCN) SYMPOSIUM ON EMERGING TOPICS IN NETWORKING (LCN SYMPOSIUM 2019), 2019, : 34 - 41
  • [26] On the Security of Permissioned Blockchain Solutions for IoT Applications
    Brotsis, Sotirios
    Kolokotronis, Nicholas
    Limniotis, Konstantinos
    Shiaeles, Stavros
    PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, 2020, : 465 - 472
  • [27] IoT and Blockchain Integration: Applications, Opportunities, and Challenges
    Adhikari, Naresh
    Ramkumar, Mahalingam
    NETWORK, 2023, 3 (01): : 115 - 141
  • [28] Blockchain applications for Internet of Things (IoT): A review
    Laghari, Asif Ali
    Li, Hang
    Shoulin, Yin
    Karim, Shahid
    Khan, Abdullah Ayub
    Ibrar, Muhammad
    MULTIAGENT AND GRID SYSTEMS, 2023, 19 (04) : 363 - 379
  • [30] MysteryChecker: Unpredictable Attestation to Detect Repackaged Malicious Applications in Android
    Jeong, Jihwan
    Seo, Dongwon
    Lee, Chanyoung
    Kwon, Jonghoon
    Lee, Heejo
    Milburn, John
    PROCEEDINGS OF THE 2014 9TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), 2014, : 50 - 57