Skip to main content
Erschienen in: International Journal of Machine Learning and Cybernetics 11/2021

10.01.2021 | Original Article

Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model

verfasst von: Farhan Ullah, Muhammad Rashid Naeem, Leonardo Mostarda, Syed Aziz Shah

Erschienen in: International Journal of Machine Learning and Cybernetics | Ausgabe 11/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The protection and privacy of the 5G-IoT framework is a major challenge due to the vast number of mobile devices. Specialized applications running these 5G-IoT systems may be vulnerable to clone attacks. Cloning applications can be achieved by stealing or distributing commercial Android apps to harm the advanced services of the 5G-IoT framework. Meanwhile, most Android app stores run and manage Android apps that developers have submitted separately without any central verification systems. Android scammers sell pirated versions of commercial software to other app stores under different names. Android applications are typically stored on cloud servers, while API access services may be used to detect and prevent cloned applications from being released. In this paper, we proposed a hybrid approach to the Control Flow Graph (CFG) and a deep learning model to secure the smart services of the 5G-IoT framework. First, the newly submitted APK file is extracted and the JDEX decompiler is used to retrieve Java source files from possibly original and cloned applications. Second, the source files are broken down into various android-based components. After generating Control-Flow Graphs (CFGs), the weighted features are stripped from each component. Finally, the Recurrent Neural Network (RNN) is designed to predict potential cloned applications by training features from different components of android applications. Experimental results have shown that the proposed approach can achieve an average accuracy of 96.24% for cloned applications selected from different android application stores.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Wang D et al (2018) From IoT to 5G I-IoT: the next generation IoT-based intelligent algorithms and 5G technologies. IEEE Commun Mag 56(10):114–120CrossRef Wang D et al (2018) From IoT to 5G I-IoT: the next generation IoT-based intelligent algorithms and 5G technologies. IEEE Commun Mag 56(10):114–120CrossRef
2.
Zurück zum Zitat Al-Turjman F (2019) 5G-enabled devices and smart-spaces in social-IoT: an overview. Fut Gen Comput Syst 92:732–744CrossRef Al-Turjman F (2019) 5G-enabled devices and smart-spaces in social-IoT: an overview. Fut Gen Comput Syst 92:732–744CrossRef
3.
Zurück zum Zitat Al-Turjman F (2019) 5G-enabled devices and smart-spaces in social-IoT: an overview. Fut Gen Comput Syst 92:732–744 Al-Turjman F (2019) 5G-enabled devices and smart-spaces in social-IoT: an overview. Fut Gen Comput Syst 92:732–744
4.
Zurück zum Zitat Ul Ain Q et al (2019) A model-driven approach for token based code clone detection techniques-an introduction to UMLCCD. In: Proceedings of the 2019 8th International Conference on Educational and Information Technology Ul Ain Q et al (2019) A model-driven approach for token based code clone detection techniques-an introduction to UMLCCD. In: Proceedings of the 2019 8th International Conference on Educational and Information Technology
5.
Zurück zum Zitat Roy CK, Cordy JR (2007) A survey on software clone detection research. Queen’s School Comput TR 541(115):64–68 Roy CK, Cordy JR (2007) A survey on software clone detection research. Queen’s School Comput TR 541(115):64–68
6.
Zurück zum Zitat Basit HA, Jarzabek S. Efficient token based clone detection with flexible tokenization. in Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering. 2007 Basit HA, Jarzabek S. Efficient token based clone detection with flexible tokenization. in Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering. 2007
7.
Zurück zum Zitat Yu H et al (Neural detection of semantic code clones via tree-based convolution. in 2019) IEEE/ACM 27th International Conference on Program Comprehension (ICPC). 2019. IEEE Yu H et al (Neural detection of semantic code clones via tree-based convolution. in 2019) IEEE/ACM 27th International Conference on Program Comprehension (ICPC). 2019. IEEE
8.
Zurück zum Zitat Ullah F, Al-Turjman F, Nayyar A (2020) IoT-based green city architecture using secured and sustainable android services. Environ Technol Innovat 20:101091CrossRef Ullah F, Al-Turjman F, Nayyar A (2020) IoT-based green city architecture using secured and sustainable android services. Environ Technol Innovat 20:101091CrossRef
9.
Zurück zum Zitat Gautam P, Saini H (2017) Non-trivial software clone detection using program dependency graph. IJOSSP 8(2):1–24 Gautam P, Saini H (2017) Non-trivial software clone detection using program dependency graph. IJOSSP 8(2):1–24
10.
Zurück zum Zitat Patil SS et al (2017) Code clone detection using hybrid approach. In: International Journal of Innovative Research and Creative Technology. IJIRCT Patil SS et al (2017) Code clone detection using hybrid approach. In: International Journal of Innovative Research and Creative Technology. IJIRCT
11.
Zurück zum Zitat Zarpelao BB et al (2017) A survey of intrusion detection in Internet of Things. Journal of Network Computer Applications 84:25–37CrossRef Zarpelao BB et al (2017) A survey of intrusion detection in Internet of Things. Journal of Network Computer Applications 84:25–37CrossRef
12.
Zurück zum Zitat Chahid Y, Benabdellah M, Azizi A. Internet of things security. in (2017) International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS). 2017. IEEE Chahid Y, Benabdellah M, Azizi A. Internet of things security. in (2017) International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS). 2017. IEEE
13.
Zurück zum Zitat Zarpelao BB et al (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37CrossRef Zarpelao BB et al (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37CrossRef
14.
Zurück zum Zitat Su X, Chuah M, Tan G. Smartphone dual defense protection framework: Detecting malicious applications in android markets. in (2012) 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN). 2012. IEEE Su X, Chuah M, Tan G. Smartphone dual defense protection framework: Detecting malicious applications in android markets. in (2012) 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN). 2012. IEEE
15.
Zurück zum Zitat Zhou Y et al. Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. in NDSS. 2012 Zhou Y et al. Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. in NDSS. 2012
16.
Zurück zum Zitat Baker BS (1997) Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM J Comput 26(5):1343–1362MathSciNetCrossRef Baker BS (1997) Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM J Comput 26(5):1343–1362MathSciNetCrossRef
17.
Zurück zum Zitat Ducasse S, Nierstrasz O, Rieger M (2006) On the effectiveness of clone detection by string matching. Journal of Software Maintenance Evolution: Research Practice 18(1):37–58CrossRef Ducasse S, Nierstrasz O, Rieger M (2006) On the effectiveness of clone detection by string matching. Journal of Software Maintenance Evolution: Research Practice 18(1):37–58CrossRef
18.
Zurück zum Zitat Smith R, Horwitz S. Detecting and measuring similarity in code clones. in Proceedings of the International workshop on Software Clones (IWSC). 2009 Smith R, Horwitz S. Detecting and measuring similarity in code clones. in Proceedings of the International workshop on Software Clones (IWSC). 2009
19.
Zurück zum Zitat Van Rysselberghe F, Demeyer S. Evaluating clone detection techniques. in Proceedings of the international workshop on evolution of large scale industrial software applications. 2003 Van Rysselberghe F, Demeyer S. Evaluating clone detection techniques. in Proceedings of the international workshop on evolution of large scale industrial software applications. 2003
20.
Zurück zum Zitat Jan B et al (2019) Deep learning in big data analytics: a comparative study. Comput Electr Eng 75:275–287CrossRef Jan B et al (2019) Deep learning in big data analytics: a comparative study. Comput Electr Eng 75:275–287CrossRef
21.
Zurück zum Zitat Rattan D, Bhatia R, Singh M (2013) Software clone detection: A systematic review. Inf Softw Technol 55(7):1165–1199CrossRef Rattan D, Bhatia R, Singh M (2013) Software clone detection: A systematic review. Inf Softw Technol 55(7):1165–1199CrossRef
22.
Zurück zum Zitat Bowyer KW, Hall LO. Experience using” MOSS” to detect cheating on programming assignments. in FIE’99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No. 99CH37011 (1999) IEEE Bowyer KW, Hall LO. Experience using” MOSS” to detect cheating on programming assignments. in FIE’99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No. 99CH37011 (1999) IEEE
23.
Zurück zum Zitat Burd E, Bailey J. Evaluating clone detection tools for use during preventative maintenance. in Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation (2002) IEEE Burd E, Bailey J. Evaluating clone detection tools for use during preventative maintenance. in Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation (2002) IEEE
24.
Zurück zum Zitat Deokate B, Hanchate DB (2016) Software source code plagiarism detection: a survey. Journal of Multidisciplinary Engineering Science Technology 3(1):3747–3750 Deokate B, Hanchate DB (2016) Software source code plagiarism detection: a survey. Journal of Multidisciplinary Engineering Science Technology 3(1):3747–3750
25.
Zurück zum Zitat Li L et al (Cclearner: A deep learning-based clone detection approach. in 2017) IEEE International Conference on Software Maintenance and Evolution (ICSME). 2017. IEEE Li L et al (Cclearner: A deep learning-based clone detection approach. in 2017) IEEE International Conference on Software Maintenance and Evolution (ICSME). 2017. IEEE
26.
Zurück zum Zitat Lazar F-M, Banias O. Clone detection algorithm based on the abstract syntax tree approach. in (2014) IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI). 2014. IEEE Lazar F-M, Banias O. Clone detection algorithm based on the abstract syntax tree approach. in (2014) IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI). 2014. IEEE
27.
Zurück zum Zitat Rahman W et al (2020) Clone Detection on Large Scala Codebases. in 2020 IEEE 14th International Workshop on Software Clones (IWSC). IEEE Rahman W et al (2020) Clone Detection on Large Scala Codebases. in 2020 IEEE 14th International Workshop on Software Clones (IWSC). IEEE
28.
Zurück zum Zitat Sun X et al (2014) Detecting code reuse in android applications using component-based control flow graph. in IFIP international information security conference. Springer Sun X et al (2014) Detecting code reuse in android applications using component-based control flow graph. in IFIP international information security conference. Springer
29.
Zurück zum Zitat White M et al (Deep learning code fragments for code clone detection. in 2016) 31st IEEE/ACM International Conference on Automated Software Engineering (ASE). 2016. IEEE White M et al (Deep learning code fragments for code clone detection. in 2016) 31st IEEE/ACM International Conference on Automated Software Engineering (ASE). 2016. IEEE
30.
Zurück zum Zitat Falcón R et al., Rough clustering with partial supervision, in Rough Set Theory: A True Landmark in Data Analysis. 2009, Springer. p. 137–161 Falcón R et al., Rough clustering with partial supervision, in Rough Set Theory: A True Landmark in Data Analysis. 2009, Springer. p. 137–161
31.
Zurück zum Zitat Wijesiriwardana C, Wimalaratne P. Component-based experimental testbed to faciltiate code clone detection research. in (2017) 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2017. IEEE Wijesiriwardana C, Wimalaratne P. Component-based experimental testbed to faciltiate code clone detection research. in (2017) 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2017. IEEE
32.
Zurück zum Zitat Gabel M, Jiang L, Su Z. Scalable detection of semantic clones. in Proceedings of the 30th international conference on Software engineering. 2008 Gabel M, Jiang L, Su Z. Scalable detection of semantic clones. in Proceedings of the 30th international conference on Software engineering. 2008
33.
Zurück zum Zitat Svacina J, Simmons J, Cerny T. Semantic code clone detection for enterprise applications. in Proceedings of the 35th Annual ACM Symposium on Applied Computing. 2020 Svacina J, Simmons J, Cerny T. Semantic code clone detection for enterprise applications. in Proceedings of the 35th Annual ACM Symposium on Applied Computing. 2020
34.
Zurück zum Zitat Fu D et al., Wastk: A weighted abstract syntax tree kernel method for source code plagiarism detection. Scientific Programming, 2017. 2017 Fu D et al., Wastk: A weighted abstract syntax tree kernel method for source code plagiarism detection. Scientific Programming, 2017. 2017
35.
Zurück zum Zitat Abadi M et al. Tensorflow: A system for large-scale machine learning. in 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 2016 Abadi M et al. Tensorflow: A system for large-scale machine learning. in 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 2016
36.
Zurück zum Zitat Baylor D et al (2017) Tfx: A tensorflow-based production-scale machine learning platform. in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM Baylor D et al (2017) Tfx: A tensorflow-based production-scale machine learning platform. in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM
37.
Zurück zum Zitat Gulli A, Pal S, Deep Learning with Keras (2017) Packt Publishing Ltd Gulli A, Pal S, Deep Learning with Keras (2017) Packt Publishing Ltd
38.
Zurück zum Zitat Agostinelli F et al., Learning activation functions to improve deep neural networks. arXiv preprint arXiv:1412.6830, 2014 Agostinelli F et al., Learning activation functions to improve deep neural networks. arXiv preprint arXiv:1412.6830, 2014
39.
Zurück zum Zitat Sharma S, Activation functions in neural networks. Towards Data Science, 2017. 6 Sharma S, Activation functions in neural networks. Towards Data Science, 2017. 6
40.
Zurück zum Zitat Rice L, Wong E, Kolter JZ, overfitting in adversarially robust deep learning. arXiv preprint arXiv:2002.11569, 2020 Rice L, Wong E, Kolter JZ, overfitting in adversarially robust deep learning. arXiv preprint arXiv:2002.11569, 2020
41.
Zurück zum Zitat Son J-W et al (2013) An application for plagiarized source code detection based on a parse tree kernel. Eng Appl Artif Intell 26(8):1911–1918CrossRef Son J-W et al (2013) An application for plagiarized source code detection based on a parse tree kernel. Eng Appl Artif Intell 26(8):1911–1918CrossRef
42.
Zurück zum Zitat Guo S, Liu J. An Approach to Source Code Plagiarism Detection Based on Abstract Implementation Structure Diagram. in MATEC Web of Conferences (2018) EDP Sciences Guo S, Liu J. An Approach to Source Code Plagiarism Detection Based on Abstract Implementation Structure Diagram. in MATEC Web of Conferences (2018) EDP Sciences
43.
Zurück zum Zitat Wang C et al. Go-clone: graph-embedding based clone detector for Golang. in Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. 2019 Wang C et al. Go-clone: graph-embedding based clone detector for Golang. in Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. 2019
44.
Zurück zum Zitat Wang W et al (Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree. in 2020) IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). 2020. IEEE Wang W et al (Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree. in 2020) IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). 2020. IEEE
Metadaten
Titel
Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model
verfasst von
Farhan Ullah
Muhammad Rashid Naeem
Leonardo Mostarda
Syed Aziz Shah
Publikationsdatum
10.01.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics / Ausgabe 11/2021
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-020-01246-9

Weitere Artikel der Ausgabe 11/2021

International Journal of Machine Learning and Cybernetics 11/2021 Zur Ausgabe