4 research outputs found

    Mask Off: Analytic-based Malware Detection By Transfer Learning and Model Personalization

    Full text link
    The vulnerability of smartphones to cyberattacks has been a severe concern to users arising from the integrity of installed applications (\textit{apps}). Although applications are to provide legitimate and diversified on-the-go services, harmful and dangerous ones have also uncovered the feasible way to penetrate smartphones for malicious behaviors. Thorough application analysis is key to revealing malicious intent and providing more insights into the application behavior for security risk assessments. Such in-depth analysis motivates employing deep neural networks (DNNs) for a set of features and patterns extracted from applications to facilitate detecting potentially dangerous applications independently. This paper presents an Analytic-based deep neural network, Android Malware detection (ADAM), that employs a fine-grained set of features to train feature-specific DNNs to have consensus on the application labels when their ground truth is unknown. In addition, ADAM leverages the transfer learning technique to obtain its adjustability to new applications across smartphones for recycling the pre-trained model(s) and making them more adaptable by model personalization and federated learning techniques. This adjustability is also assisted by federated learning guards, which protect ADAM against poisoning attacks through model analysis. ADAM relies on a diverse dataset containing more than 153000 applications with over 41000 extracted features for DNNs training. The ADAM's feature-specific DNNs, on average, achieved more than 98% accuracy, resulting in an outstanding performance against data manipulation attacks

    A data placement approach for scientific workflow execution in hybrid clouds

    No full text
    Empirical thesis.Bibliography: pages 47-52.1. Introduction -- 2. Literature review -- 3. Problem statement -- 4. Hybrid scheduling for hybrid clouds -- 5. Evaluation -- 6. Conclusion -- List of symbols -- References.Cloud computing has been widely adopted by industry practitioners and researchers. Recently, applications in science and engineering such as scientific workflows have also been increasingly deployed in clouds. As these applications are becoming resource intensive in both data and computing, private clouds struggle to cope with their resource requirements. Public clouds claim to overcome many shortcomings of private clouds. However, the complete offloading of workflow execution to public clouds may introduce excessive data transfer and privacy/governance concerns. In this thesis, we propose a hybrid cloud solution for workflow scheduling explicitly considering data placement. To this end, we present Hybrid Scheduling for Hybrid Clouds (HSHC), which schedules scientific workflows across private and public clouds incorporating a novel dynamic data placement policy. HSHC consists of two phases: static and dynamic. The former uses an extended genetic algorithm to solve the problem of workflow scheduling with static information of workflows and cloud resources. The latter adjusts scheduling and data placement decisions reflecting changing conditions of workflow execution in the hybrid cloud. We evaluate HSHC with both real-world scientific applications and random workflows in performance and cost. Experimental results demonstrate HSHC’s two-phase approach effectively deals with the dynamic nature of the hybrid cloud.1 online resource (x, 52 pages) diagrams, graph
    corecore