Federated Defense for Malware Detection and Resilience Against Adversarial Attacks

被引:0
作者
Ullah, Farhan [1 ]
Srivastava, Gautam [2 ]
机构
[1] Northwestern Polytech Univ, Sch Software, Xian, Chin, Myanmar
[2] China Med Univ, Taichung, Taiwan
关键词
Malware; Training; Security; Data models; Consumer electronics; Accuracy; Servers; Adversarial machine learning; Cyberattack; LEARNING APPROACH;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Consumer electronics are substantially compromised by malware, which can traverse numerous operating systems and file formats. Considerable effort has been devoted to developing malware detection systems that employ machine learning and deep learning. However, these models are susceptible to adversarial attacks, where maliciously crafted inputs can bypass detection mechanisms. In this article, we present Fed-Adversarial, a novel technique for malware detection against adversarial attacks that employ intermittent clients-based federated learning. This method can improve adversarial attack detection while preserving data privacy for each client. The raw malware images are first normalized and converted to color to extract features efficiently. In addition, a wide range of adversarial examples is generated using normalized images to maximize evasion opportunities and reduce perturbations. Following this, adversarial examples are employed by deep convolutional neural networks during local training, resulting in local model updates (LMUs). After combining these LMUs, the global server produces global model updates, delivered to distant clients. The proposed approach is evaluated on standard datasets, including dumpware10, malimg, and MaleVis, and it obtains high detection accuracy of 99.18%, 98.12%, and 98.38%, respectively.
引用
收藏
页码:67 / 73
页数:7
相关论文
共 15 条
[1]  
Andriushchenko M., 2020, ADV NEURAL INF PROCE, P16048
[2]   Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision [J].
Bozkir, Ahmet Selman ;
Tahillioglu, Ersan ;
Aydos, Murat ;
Kara, Ilker .
COMPUTERS & SECURITY, 2021, 103
[3]   A novel framework for image-based malware detection with a deep neural network [J].
Jian, Yifei ;
Kuang, Hongbo ;
Ren, Chenglong ;
Ma, Zicheng ;
Wang, Haizhou .
COMPUTERS & SECURITY, 2021, 109
[4]   A Framework for Enhancing Deep Neural Networks Against Adversarial Malware [J].
Li, Deqiang ;
Li, Qianmu ;
Ye, Yanfang ;
Xu, Shouhuai .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01) :736-750
[5]   Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection [J].
Li, Deqiang ;
Li, Qianmu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :3886-3900
[6]  
Nagaraju R., 2022, Artificial Intelligence for Cybersecurity, P27
[7]   Internet of Things intrusion Detection: Centralized, On-Device, or Federated Learning? [J].
Rahman, Sawsan Abdul ;
Tout, Hanine ;
Talhi, Chamseddine ;
Mourad, Azzam .
IEEE NETWORK, 2020, 34 (06) :310-317
[8]   Federated Learning Under Intermittent Client Availability and Time-Varying Communication Constraints [J].
Ribero, Monica ;
Vikalo, Haris ;
de Veciana, Gustavo .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2023, 17 (01) :98-111
[9]   On Cooperative Federated Defense to Secure Multiaccess Edge Computing [J].
Sedjelmaci, Hichem ;
Ansari, Nirwan .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2024, 13 (04) :24-31
[10]   A Trusted Hybrid Learning Approach to Secure Edge Computing [J].
Sedjelmaci, Hichem ;
Senouci, Sidi-Mohammed ;
Ansari, Nirwan ;
Boualouache, Abdelwahab .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (03) :30-37