Location
Huntsville (Ala.)
Start Date
6-7-2017
Presentation Type
Paper
Description
Because network infrastructure and bandwidth cannot keep up with the increasing demands, edge computing has sprung up to reorganize the cloud computing paradigm. As an application of edge computing, mobile malware detection requires significant resources that are unavailable to individual devices. The immediacy of malware detection is highly pertinent, as malicious software may already be in operation. In addition, the dispersion of mobile devices and massive simultaneous traffic make the offloading this work to remote data centers infeasible. In our study, we implement a typical edge node to perform Android malware detection. In our study, we collect an exceptional amount of mobile malware and benign samples, and demonstrate the ability of edge computing nodes to provide typical security functions for edge devices. We also show the ability to scale the operation for increasing data volumes.
Recommended Citation
Hatcher, William G.; Booz, Jarrett; McGiff, Josh; Lu, Chao; and Yu, Wei, "Edge Computing Based Machine Learning Mobile Malware Detection" (2017). National Cyber Summit. 4.
https://louis.uah.edu/cyber-summit/ncs2017/ncs2017papers/4
Edge Computing Based Machine Learning Mobile Malware Detection
Huntsville (Ala.)
Because network infrastructure and bandwidth cannot keep up with the increasing demands, edge computing has sprung up to reorganize the cloud computing paradigm. As an application of edge computing, mobile malware detection requires significant resources that are unavailable to individual devices. The immediacy of malware detection is highly pertinent, as malicious software may already be in operation. In addition, the dispersion of mobile devices and massive simultaneous traffic make the offloading this work to remote data centers infeasible. In our study, we implement a typical edge node to perform Android malware detection. In our study, we collect an exceptional amount of mobile malware and benign samples, and demonstrate the ability of edge computing nodes to provide typical security functions for edge devices. We also show the ability to scale the operation for increasing data volumes.