Affiliation:
1. Department of Computer Science & Engineering, Tagore Institute of Engineering and Technology, Attur, Tamil Nadu, India
2. Department of Electrical and Electronics Engineering, Tagore Institute of Engineering and Technology, Attur, Tamil Nadu, India
Abstract
The proliferation of mobile technology has given rise to a multitude of applications, among them those designed with malicious intent, aimed at compromising the integrity of mobile devices (MDs). To combat this issue, this study introduces an innovative anomaly application detection system leveraging Federated Learning in conjunction with a Hyperbolic Tangent Radial-Deep Belief Network (FL-HTR-DBN). This system operates through two distinct phases: training and testing. During the training phase, the system first extracts log files and transforms them into a structured format, harnessing the power of the Hadoop System. Subsequently, these structured logs are converted into vector representations using the Updating Gate-BERT (UG-BERT) technique, thereby facilitating feature extraction. These features are then annotated utilizing the Symmetric Kullback Leibler Divergence squared Euclidean distance-based K Means (SKLD-SED K Means) algorithm. The FL-HTR-DBN model is subsequently trained using these labelled features. The detected anomalies are hashed and securely stored within an index tree, alongside their corresponding hashed Media Access Control (MAC) addresses. In the testing phase, log files are cross-referenced with the hashed index tree to identify potential anomalies. Notably, this novel approach outperforms many valuable outcomes in comparison with the existing approaches ConAnomaly, QLLog and LogCAD in terms of precision 97.5, recall 97.1, accuracy 95.9, F-measure 93.9, sensitivity 94.8 and specificity 95.9.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference17 articles.
1. Deep learning based android anomaly detection using a combination of vulnerabilities dataset;Namrud;Applied Sciences (Switzerland),2021
2. vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS;Tang;IEEE Transactions on Computers,2022
3. A Survey on Mobile malware detection techniques;Vasilieious;IEICE Transactions on Information and Systems,2020
4. Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks, In LNICST;Xie;Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering,2023
5. A security monitoring framework for mobile devices;Lima;Electronics,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献