4.8 Article

Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 17, Issue 12, Pages 8442-8452

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2020.3043458

Keywords

Training; Shape; Heuristic algorithms; Generative adversarial networks; Collaborative work; Malware; Data models; Federated learning (FL); generative adversarial network (GAN); Internet of Things (IoT); malware

Ask authors/readers for more resources

Fed-IIoT is a robust architecture for detecting Android malware applications in IIoT, utilizing federated learning on both participant and server sides to enhance security and privacy protection.
The sheer volume of industrial Internet of Things (IIoT) malware is one of the most serious security threats in today's interconnected world, with new types of advanced persistent threats and advanced forms of obfuscations. This article presents a robust federated learning based architecture called Fed-IIoT for detecting Android malware applications in IIoT. Fed-IIoT consists of two parts: first, participant side, where the data are triggered by two dynamic poisoning attacks based on a generative adversarial network (GAN) and federated GAN; and second, server side, which aims to monitor the global model and shape a robust collaboration training model, by avoiding anomaly in aggregation by a GAN network (A3GAN) and adjust two GAN-based countermeasure algorithms. One of the main advantages of Fed-IIoT is that devices can safely participate in the IIoT and efficiently communicate with each other, with no privacy issues. We evaluate our solutions through experiments on various features using three IoT datasets. The results confirm the high accuracy rates of our attack and defense algorithms and show that the A3GAN defensive approach preserves the robustness of data privacy for Android mobile users and is about 8% higher accuracy with existing state-of-the-art solutions.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available