End-Edge Coordinated Inference for Real-Time BYOD Malware Detection using Deep Learning

Xinrui Tan, Hongjia Li, Liming Wang, Zhen Xu
{"title":"End-Edge Coordinated Inference for Real-Time BYOD Malware Detection using Deep Learning","authors":"Xinrui Tan, Hongjia Li, Liming Wang, Zhen Xu","doi":"10.1109/WCNC45663.2020.9120765","DOIUrl":null,"url":null,"abstract":"Bring-Your-Own-Device (BYOD) has been widely viewed as a definite trend among enterprises in which employees bring and use their personal smartphones for work. Despite the perceived opportunities of increasing productivity and reducing costs, BYOD raises severe security and privacy concerns: the corporate networks and data are directly exposed to malware apps running on the personal smartphones. This highlights the necessity for performing real-time mobile malware detection in BYOD environments. Deep learning seems to be a natural choice to handle such detection, due to its state-of-the-art detection effectiveness. However, deep learning inference is usually too computationally complex for resource-constrained smartphones, and the communication overhead of cloud-based inference may be unacceptable. As a result, it is hard to seek the tradeoff between the real-time demand and optimality of detection accuracy. In this paper, we tackle this issue by proposing an endedge coordinated inference approach that can support highlyaccurate and average latency guaranteed malware detection. Our proposed approach integrates the early-exit and model partitioning methods to allow fast, correct and smartphonelocalized inference to occur frequently. Extensive evaluations are carried out, demonstrating that our proposed approach offers a good compromise between detection accuracy and efficiency.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCNC45663.2020.9120765","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Bring-Your-Own-Device (BYOD) has been widely viewed as a definite trend among enterprises in which employees bring and use their personal smartphones for work. Despite the perceived opportunities of increasing productivity and reducing costs, BYOD raises severe security and privacy concerns: the corporate networks and data are directly exposed to malware apps running on the personal smartphones. This highlights the necessity for performing real-time mobile malware detection in BYOD environments. Deep learning seems to be a natural choice to handle such detection, due to its state-of-the-art detection effectiveness. However, deep learning inference is usually too computationally complex for resource-constrained smartphones, and the communication overhead of cloud-based inference may be unacceptable. As a result, it is hard to seek the tradeoff between the real-time demand and optimality of detection accuracy. In this paper, we tackle this issue by proposing an endedge coordinated inference approach that can support highlyaccurate and average latency guaranteed malware detection. Our proposed approach integrates the early-exit and model partitioning methods to allow fast, correct and smartphonelocalized inference to occur frequently. Extensive evaluations are carried out, demonstrating that our proposed approach offers a good compromise between detection accuracy and efficiency.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于深度学习的实时BYOD恶意软件检测的端到端协调推理
自带设备办公(BYOD)已被广泛认为是企业的必然趋势,员工在工作中携带和使用个人智能手机。尽管BYOD带来了提高生产力和降低成本的机会,但也引发了严重的安全和隐私问题:企业网络和数据直接暴露在个人智能手机上运行的恶意软件应用程序之下。这突出了在BYOD环境中执行实时移动恶意软件检测的必要性。深度学习似乎是处理这种检测的自然选择,因为它具有最先进的检测效率。然而,对于资源受限的智能手机来说,深度学习推理通常在计算上过于复杂,并且基于云的推理的通信开销可能是不可接受的。因此,很难在实时需求和检测精度的最优性之间寻求折衷。在本文中,我们通过提出一种边缘协调推理方法来解决这个问题,该方法可以支持高精度和平均延迟保证的恶意软件检测。我们提出的方法集成了早期退出和模型划分方法,以允许快速,正确和智能手机本地化的推理频繁发生。进行了广泛的评估,表明我们提出的方法在检测精度和效率之间提供了很好的折衷。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Precoding with the Assistance of Attitude Information in Millimeter Wave MIMO System Performance Analysis of Temporal Correlation in Finite-Area UAV Networks with LoS/NLoS Location-Privacy-Aware Service Migration in Mobile Edge Computing Filter Bank Multicarrier Transmission Based on the Discrete Hartley Transform Resource Allocation and Throughput Maximization in Decoupled 5G
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1