4.4 Article

CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices

Journal

SOFTWARE-PRACTICE & EXPERIENCE
Volume 47, Issue 3, Pages 421-441

Publisher

WILEY
DOI: 10.1002/spe.2420

Keywords

reversible sketch; suspicious bucket cross-filtering; signature-based; malware detection; cloud-based

Funding

  1. National Science Foundation of China (NSFC) [61303264, 61202488]
  2. Guangxi cooperative innovation center of cloud Computing and big data [YD16505]
  3. Distinguished young scientist promotion of National University of Defense Technology
  4. program of Changjiang Scholars and Innovative Research Team in University [IRT1012]

Ask authors/readers for more resources

Because of the rapid increasing of malware attacks on the Internet of Things in recent years, it is critical for resource-constrained devices to guard against potential risks. The traditional host-based security solution becomes puffy and inapplicable with the development of malware attacks. Moreover, it is hard for the cloud-based security solution to achieve both the high performance detection and the data privacy protection simultaneously. This paper proposes a cloud-based anti-malware system, called CloudEyes, which provides efficient and trusted security services for resource-constrained devices. For the cloud server, CloudEyes presents suspicious bucket cross-filtering, a novel signature detection mechanism based on the reversible sketch structure, which provides retrospective and accurate orientations of malicious signature fragments. For the client, CloudEyes implements a lightweight scanning agent which utilizes the digest of signature fragments to dramatically reduce the range of accurate matching. Furthermore, by transmitting sketch coordinates and the modular hashing, CloudEyes guarantees both the data privacy and low-cost communications. Finally, we evaluate the performance of CloudEyes by utilizing both the campus suspicious traffic and normal files. The results demonstrate that the mechanisms in CloudEyes are effective and practical, and our system can outperform other existing systems with less time and communication consumption. Copyright (C) 2016 John Wiley & Sons, Ltd.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available