A Fog-Based Collusion Detection System

  • Po-Yang Hsiung
  • Chih Hung Li
  • Shih Hung Chang
  • Bo-Chao ChengEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 895)


The threat of malicious software (malware) programs on users’ privacy is now worse than ever. Some malwares can even collude to increase their permissions through sharing, making it easier to breach users’ privacy. However, detecting malware on a mobile phone consumes a considerable amount of a mobile phone’s energy. While the advancements of cloud technology make it possible to transmit malware data to the cloud for analysis, transmitting large amounts of data contributes to the energy consumption problem of mobile phones. Therefore, this study proposes a fog-based computing technique that targets intelligent collusion attacks and intelligently controls the collection and transmission behavior to reduce the amount of data that is transmitted to lower the energy consumption of mobile phones. This study conducts experiments using an official application and compares it with other methods. The experimental results show that the proposed method transmits less data than other methods and saves the energy consumption of mobile phones.


Mobile malware detection Collusion attack Fog-based computing Energy consumption 



This work was supported by the Ministry of Science and Technology (MOST), Taiwan, under MOST Grants: 107-2221-E-194-022 – & 105-2221-E-194-014-MY2.


  1. 1.
    Peng, S., Yu, S., Yang, A.: Smartphone malware and its propagation modeling: a survey. IEEE Commun. Surv. Tutor. 16(2), 925–941 (2014)Google Scholar
  2. 2.
    Wang, D., Cheng, H., He, D., Wang, P.: On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst. J. 12(1), 916–925 (2018)Google Scholar
  3. 3.
    Bhandari, S., Jaballah, W.B., Jain, V., Laxmi, V., Zemmari, A., Gaur, M.S., Mosbah, M., Conti, M.: Android inter-app communication threats and detection techniques. Comput. Secur. 70, 392–421 (2017)Google Scholar
  4. 4.
    Chen, H., Su, J., Qiao, L., Zhang, Y., Xin, Q.: Malware collusion attack against machine learning based methods: issues and countermeasures. In: ICCCS, vol. 5, pp. 465–477 (2018)Google Scholar
  5. 5.
    Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid android: versatile protection for smartphones. In: ACSAC 2010, pp. 347–356 (2010)Google Scholar
  6. 6.
    Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: SPSM@CCS 2011, pp. 15–26 (2011)Google Scholar
  7. 7.
    Xu, M., Ma, Y., Liu, X., Lin, F.X., Liu, Y.: AppHolmes: detecting and characterizing app collusion among third-party android markets. In: WWW 2017, pp. 143–152 (2017)Google Scholar
  8. 8.
    Kashefi, I., Kassiri, M., Salleh, M.: Preventing collusion attack in android. Int. Arab J. Inf. Technol. 12(6A), 719–727 (2015)Google Scholar
  9. 9.
    Gupta, H., Dastjerdi, A.D., Ghosh, S.K., Buyya, R.: iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments. Softw. Pract. Exper. 47(9), 1275–1296 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Po-Yang Hsiung
    • 1
  • Chih Hung Li
    • 1
  • Shih Hung Chang
    • 1
  • Bo-Chao Cheng
    • 1
    Email author
  1. 1.Department of Communications EngineeringNational Chung Cheng UniversityChia-YiTaiwan

Personalised recommendations