4.4 Article

CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices

期刊

SOFTWARE-PRACTICE & EXPERIENCE
卷 47, 期 3, 页码 421-441

出版社

WILEY
DOI: 10.1002/spe.2420

关键词

reversible sketch; suspicious bucket cross-filtering; signature-based; malware detection; cloud-based

资金

  1. National Science Foundation of China (NSFC) [61303264, 61202488]
  2. Guangxi cooperative innovation center of cloud Computing and big data [YD16505]
  3. Distinguished young scientist promotion of National University of Defense Technology
  4. program of Changjiang Scholars and Innovative Research Team in University [IRT1012]

向作者/读者索取更多资源

Because of the rapid increasing of malware attacks on the Internet of Things in recent years, it is critical for resource-constrained devices to guard against potential risks. The traditional host-based security solution becomes puffy and inapplicable with the development of malware attacks. Moreover, it is hard for the cloud-based security solution to achieve both the high performance detection and the data privacy protection simultaneously. This paper proposes a cloud-based anti-malware system, called CloudEyes, which provides efficient and trusted security services for resource-constrained devices. For the cloud server, CloudEyes presents suspicious bucket cross-filtering, a novel signature detection mechanism based on the reversible sketch structure, which provides retrospective and accurate orientations of malicious signature fragments. For the client, CloudEyes implements a lightweight scanning agent which utilizes the digest of signature fragments to dramatically reduce the range of accurate matching. Furthermore, by transmitting sketch coordinates and the modular hashing, CloudEyes guarantees both the data privacy and low-cost communications. Finally, we evaluate the performance of CloudEyes by utilizing both the campus suspicious traffic and normal files. The results demonstrate that the mechanisms in CloudEyes are effective and practical, and our system can outperform other existing systems with less time and communication consumption. Copyright (C) 2016 John Wiley & Sons, Ltd.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据