{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T22:54:53Z","timestamp":1752101693315,"version":"3.37.3"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T00:00:00Z","timestamp":1590883200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"],"award-info":[{"award-number":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"],"award-info":[{"award-number":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"],"award-info":[{"award-number":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"],"award-info":[{"award-number":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"],"award-info":[{"award-number":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"]}],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"],"award-info":[{"award-number":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"]}],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010743","name":"Nanjing Forestry University","doi-asserted-by":"publisher","award":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"],"award-info":[{"award-number":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"]}],"id":[{"id":"10.13039\/100010743","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010743","name":"Nanjing Forestry University","doi-asserted-by":"publisher","award":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"],"award-info":[{"award-number":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"]}],"id":[{"id":"10.13039\/100010743","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NUPTSF","award":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"],"award-info":[{"award-number":["2018YFD0401404","61702282","61802192","71801123","18KJB520024","17KJB520023","GXL016","CX2016026","NY217143"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,5,31]]},"abstract":"<jats:p>Malware has become a significant problem on the Android platform. To defend against Android malware, researchers have proposed several on-device detection methods. Typically, these on-device detection methods are composed of two steps: (i) extracting the apps\u2019 behavior features from the mobile devices and (ii) sending the extracted features to remote servers (such as a cloud platform) for analysis. By monitoring the behaviors of the apps that are running on mobile devices, available methods can detect suspicious applications (simply, <jats:italic>apps<\/jats:italic>) accurately. However, mobile devices are typically resource limited. The feature extraction and massive data transmission might consume substantial power and CPU resources; thus, the performance of mobile devices will be degraded. To address this issue, we propose a novel method for detecting Android malware by clustering apps\u2019 traffic at the edge computing nodes. First, a new integrated architecture of the cloud, edge, and mobile devices for Android malware detection is presented. Then, for repackaged Android malware, the network traffic content and statistics are extracted at the edge as detection features. Finally, in the cloud, similarities between apps are calculated, and the similarity values are automatically clustered to separate the original apps and the malware. The experimental results demonstrate that the proposed method can detect repackaged Android malware with high precision and with a minimal impact on the performance of mobile devices.<\/jats:p>","DOI":"10.1155\/2020\/8630748","type":"journal-article","created":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T23:31:31Z","timestamp":1590967891000},"page":"1-19","source":"Crossref","is-referenced-by-count":8,"title":["On-Device Detection of Repackaged Android Malware via Traffic Clustering"],"prefix":"10.1155","volume":"2020","author":[{"given":"Gaofeng","family":"He","sequence":"first","affiliation":[{"name":"College of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Key Laboratory of Computer Network and Information Integration (Southeast University), Ministry of Education, Nanjing, China"}]},{"given":"Bingfeng","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Nanjing Forestry University, Nanjing 210037, China"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Nanjing University of Finance & Economics, Nanjing 210046, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5840-2251","authenticated-orcid":true,"given":"Haiting","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"}]}],"member":"311","reference":[{"year":"2009","key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2016.2630689"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2656460"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2806891"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2870534"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0343-z"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.009"},{"volume-title":"AppFA: a novel approach to detect malicious android applications on the network","year":"2018","key":"14"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-015-1356-1"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2646641"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2016.2579198"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2017.2745575"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102423"},{"issue":"7","key":"32","first-page":"1944","volume":"14","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1170"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.04.044"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718817292"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.4.715-722"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.01.001"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2792941"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2682318"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2018.1700101"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.220"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2016.77"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2013.14004"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1126\/science.1242072"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8630748.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8630748.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8630748.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T23:31:35Z","timestamp":1590967895000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8630748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,31]]},"references-count":30,"alternative-id":["8630748","8630748"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8630748","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,5,31]]}}}