Skip to main content
Log in

Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model

  • Original Article
  • Published:
International Journal of Machine Learning and Cybernetics Aims and scope Submit manuscript

Abstract

The protection and privacy of the 5G-IoT framework is a major challenge due to the vast number of mobile devices. Specialized applications running these 5G-IoT systems may be vulnerable to clone attacks. Cloning applications can be achieved by stealing or distributing commercial Android apps to harm the advanced services of the 5G-IoT framework. Meanwhile, most Android app stores run and manage Android apps that developers have submitted separately without any central verification systems. Android scammers sell pirated versions of commercial software to other app stores under different names. Android applications are typically stored on cloud servers, while API access services may be used to detect and prevent cloned applications from being released. In this paper, we proposed a hybrid approach to the Control Flow Graph (CFG) and a deep learning model to secure the smart services of the 5G-IoT framework. First, the newly submitted APK file is extracted and the JDEX decompiler is used to retrieve Java source files from possibly original and cloned applications. Second, the source files are broken down into various android-based components. After generating Control-Flow Graphs (CFGs), the weighted features are stripped from each component. Finally, the Recurrent Neural Network (RNN) is designed to predict potential cloned applications by training features from different components of android applications. Experimental results have shown that the proposed approach can achieve an average accuracy of 96.24% for cloned applications selected from different android application stores.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. http://stackoverflow.com/questions/5600143/android-game-keepsgetting-hacked.

  2. http://googlemobile.blogspot.com/2012/02/android-and-security.html.

References

  1. Wang D et al (2018) From IoT to 5G I-IoT: the next generation IoT-based intelligent algorithms and 5G technologies. IEEE Commun Mag 56(10):114–120

    Article  Google Scholar 

  2. Al-Turjman F (2019) 5G-enabled devices and smart-spaces in social-IoT: an overview. Fut Gen Comput Syst 92:732–744

    Article  Google Scholar 

  3. Al-Turjman F (2019) 5G-enabled devices and smart-spaces in social-IoT: an overview. Fut Gen Comput Syst 92:732–744

  4. Ul Ain Q et al (2019) A model-driven approach for token based code clone detection techniques-an introduction to UMLCCD. In: Proceedings of the 2019 8th International Conference on Educational and Information Technology

  5. Roy CK, Cordy JR (2007) A survey on software clone detection research. Queen’s School Comput TR 541(115):64–68

    Google Scholar 

  6. Basit HA, Jarzabek S. Efficient token based clone detection with flexible tokenization. in Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering. 2007

  7. Yu H et al (Neural detection of semantic code clones via tree-based convolution. in 2019) IEEE/ACM 27th International Conference on Program Comprehension (ICPC). 2019. IEEE

  8. Ullah F, Al-Turjman F, Nayyar A (2020) IoT-based green city architecture using secured and sustainable android services. Environ Technol Innovat 20:101091

    Article  Google Scholar 

  9. Gautam P, Saini H (2017) Non-trivial software clone detection using program dependency graph. IJOSSP 8(2):1–24

  10. Patil SS et al (2017) Code clone detection using hybrid approach. In: International Journal of Innovative Research and Creative Technology. IJIRCT

  11. Zarpelao BB et al (2017) A survey of intrusion detection in Internet of Things. Journal of Network Computer Applications 84:25–37

    Article  Google Scholar 

  12. Chahid Y, Benabdellah M, Azizi A. Internet of things security. in (2017) International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS). 2017. IEEE

  13. Zarpelao BB et al (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37

    Article  Google Scholar 

  14. Su X, Chuah M, Tan G. Smartphone dual defense protection framework: Detecting malicious applications in android markets. in (2012) 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN). 2012. IEEE

  15. Zhou Y et al. Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. in NDSS. 2012

  16. Baker BS (1997) Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM J Comput 26(5):1343–1362

    Article  MathSciNet  Google Scholar 

  17. Ducasse S, Nierstrasz O, Rieger M (2006) On the effectiveness of clone detection by string matching. Journal of Software Maintenance Evolution: Research Practice 18(1):37–58

    Article  Google Scholar 

  18. Smith R, Horwitz S. Detecting and measuring similarity in code clones. in Proceedings of the International workshop on Software Clones (IWSC). 2009

  19. Van Rysselberghe F, Demeyer S. Evaluating clone detection techniques. in Proceedings of the international workshop on evolution of large scale industrial software applications. 2003

  20. Jan B et al (2019) Deep learning in big data analytics: a comparative study. Comput Electr Eng 75:275–287

    Article  Google Scholar 

  21. Rattan D, Bhatia R, Singh M (2013) Software clone detection: A systematic review. Inf Softw Technol 55(7):1165–1199

    Article  Google Scholar 

  22. Bowyer KW, Hall LO. Experience using” MOSS” to detect cheating on programming assignments. in FIE’99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No. 99CH37011 (1999) IEEE

  23. Burd E, Bailey J. Evaluating clone detection tools for use during preventative maintenance. in Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation (2002) IEEE

  24. Deokate B, Hanchate DB (2016) Software source code plagiarism detection: a survey. Journal of Multidisciplinary Engineering Science Technology 3(1):3747–3750

    Google Scholar 

  25. Li L et al (Cclearner: A deep learning-based clone detection approach. in 2017) IEEE International Conference on Software Maintenance and Evolution (ICSME). 2017. IEEE

  26. Lazar F-M, Banias O. Clone detection algorithm based on the abstract syntax tree approach. in (2014) IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI). 2014. IEEE

  27. Rahman W et al (2020) Clone Detection on Large Scala Codebases. in 2020 IEEE 14th International Workshop on Software Clones (IWSC). IEEE

  28. Sun X et al (2014) Detecting code reuse in android applications using component-based control flow graph. in IFIP international information security conference. Springer

  29. White M et al (Deep learning code fragments for code clone detection. in 2016) 31st IEEE/ACM International Conference on Automated Software Engineering (ASE). 2016. IEEE

  30. Falcón R et al., Rough clustering with partial supervision, in Rough Set Theory: A True Landmark in Data Analysis. 2009, Springer. p. 137–161

  31. Wijesiriwardana C, Wimalaratne P. Component-based experimental testbed to faciltiate code clone detection research. in (2017) 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2017. IEEE

  32. Gabel M, Jiang L, Su Z. Scalable detection of semantic clones. in Proceedings of the 30th international conference on Software engineering. 2008

  33. Svacina J, Simmons J, Cerny T. Semantic code clone detection for enterprise applications. in Proceedings of the 35th Annual ACM Symposium on Applied Computing. 2020

  34. Fu D et al., Wastk: A weighted abstract syntax tree kernel method for source code plagiarism detection. Scientific Programming, 2017. 2017

  35. Abadi M et al. Tensorflow: A system for large-scale machine learning. in 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 2016

  36. Baylor D et al (2017) Tfx: A tensorflow-based production-scale machine learning platform. in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM

  37. Gulli A, Pal S, Deep Learning with Keras (2017) Packt Publishing Ltd

  38. Agostinelli F et al., Learning activation functions to improve deep neural networks. arXiv preprint arXiv:1412.6830, 2014

  39. Sharma S, Activation functions in neural networks. Towards Data Science, 2017. 6

  40. Rice L, Wong E, Kolter JZ, overfitting in adversarially robust deep learning. arXiv preprint arXiv:2002.11569, 2020

  41. Son J-W et al (2013) An application for plagiarized source code detection based on a parse tree kernel. Eng Appl Artif Intell 26(8):1911–1918

    Article  Google Scholar 

  42. Guo S, Liu J. An Approach to Source Code Plagiarism Detection Based on Abstract Implementation Structure Diagram. in MATEC Web of Conferences (2018) EDP Sciences

  43. Wang C et al. Go-clone: graph-embedding based clone detector for Golang. in Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. 2019

  44. Wang W et al (Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree. in 2020) IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). 2020. IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farhan Ullah.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ullah, F., Naeem, M.R., Mostarda, L. et al. Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model. Int. J. Mach. Learn. & Cyber. 12, 3115–3127 (2021). https://doi.org/10.1007/s13042-020-01246-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13042-020-01246-9

Keywords

Navigation