4.8 Article

Efficient and Lightweight Convolutional Networks for IoT Malware Detection: A Federated Learning Approach

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 10, Issue 8, Pages 7164-7173

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3229005

Keywords

Internet of Things; Malware; Security; Image edge detection; Feature extraction; Training; Detectors; Adversarial attacks; deep learning (DL); edge; fog computing; federated learning (FL); malware detection

Ask authors/readers for more resources

In this study, a new federated malware detection paradigm called FED-MAL is introduced to collaboratively train multiple distributed edge devices to detect malware. FED-MAL transforms malware binaries into an image format and uses a compact convolutional model named AM-NET to learn malware patterns. Experimental evaluation shows that FED-MAL is efficacious, reliable, expandable, generalizable, and communication efficient on publicly available malware datasets.
Over the past few years, billions of unsecured Internet of Things (IoT) devices have been produced and released, and that number will only grow as wireless technology advances. As a result of their susceptibility to malware, effective methods have become necessary for identifying IoT malware. However, the low generalizability and the nonindependently and identically distributed data (non-IID) still pose a major challenge to achieving this goal. In this work, a new federated malware detection paradigm, termed FED-MAL, is introduced to collaboratively train multiple distributed edge devices to detect malware. In FED-MAL, the malware binaries are transformed into an image format to lessen the impact on non-IID, and then a compact convolutional model, named AM-NET, is proposed to learn the malware patterns as an image recognition task. The compact nature of AM-NET makes it an appropriate choice for deployment on resource-constrained IoT devices. Following, a refined edge-based adversarial training is given in FED-MAL to empower generalizability and resistibility by generating adversarial samples from various participating clients. Experimental evaluation on publicly available malware data sets shows that the FED-MAL is efficacious, reliable, expandable, generalizable, and communication efficient.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available