Mobile cloud offloading for malware detections with learning

Accurate malware detections on mobile devices such as smartphones require fast processing of a large number of data and thus cloud offloading can be used to improve the security performance of mobile devices with limited resources. The performance of malware detection with cloud offloading depends on the computation speed of the cloud, the population sharing the cloud resources and the bandwidth of the radio access. In the paper, we investigate the offloading rates of smartphones connecting to the same security server in a cloud under dynamic network bandwidths and formulate their interactions as a non-cooperative mobile cloud offloading game. The Nash equilibrium of the mobile cloud offloading game and the existence condition are presented. An offloading algorithm based on Q-learning is proposed for smartphones to determine their offloading rates for malware detection with unknown parameters such as transmission costs. Simulation results show that the proposed offloading strategy can achieve the optimal rate and improve the user's utility under dynamic network bandwidths.

[1]  Ayumu Kubota,et al.  Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[2]  Bharat K. Bhargava,et al.  A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.

[3]  Saman A. Zonouz,et al.  A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[4]  Man Ho Au,et al.  Security and privacy in big data , 2016, Concurr. Comput. Pract. Exp..

[5]  Herbert Bos,et al.  Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.

[6]  Massoud Pedram,et al.  A Bayesian Game Formulation of Power Dissipation and Response Time Minimization in a Mobile Cloud Computing System , 2013 .

[7]  Katinka Wolter,et al.  Tradeoff between performance improvement and energy saving in mobile cloud offloading systems , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[8]  Jean-Pierre Seifert,et al.  pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.

[9]  Sokol Kosta,et al.  To offload or not to offload? The bandwidth and energy costs of mobile cloud computing , 2013, 2013 Proceedings IEEE INFOCOM.

[10]  H. Vincent Poor,et al.  Prospect theoretic analysis of anti-jamming communications in cognitive radio networks , 2014, 2014 IEEE Global Communications Conference.

[11]  H. Vincent Poor,et al.  Prospect Theoretic Analysis of Energy Exchange Among Microgrids , 2015, IEEE Transactions on Smart Grid.

[12]  K. J. Ray Liu,et al.  Indirect Reciprocity Security Game for Large-Scale Wireless Networks , 2012, IEEE Transactions on Information Forensics and Security.

[13]  H. Vincent Poor,et al.  Secure mobile crowdsensing game , 2015, 2015 IEEE International Conference on Communications (ICC).

[14]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[15]  Jules White,et al.  Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[16]  Frank Buschmann,et al.  Innovation Reconsidered , 2013, IEEE Software.

[17]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[18]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[19]  Chandra Krintz,et al.  Using bandwidth data to make computation offloading decisions , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[20]  Martin J. Osborne Corrections and updates for fourth printing of Osborne and Rubinstein's "A Course in Game Theory" (MIT Press, 1994) , 2012 .