Federated malware detection based on many-objective optimization in cross-architectural IoT

被引:0
作者
Zhang, Zhigang [1 ]
Zhang, Zhixia [1 ]
Cui, Zhihua [1 ]
机构
[1] Taiyuan Univ Sci & Technol, Shanxi Key Lab Big Data Anal & Parallel Comp, Taiyuan, Peoples R China
基金
中国国家自然科学基金;
关键词
cross-architecture; federated learning (FL); Internet of Things (IoT); malware detection; many-objective optimization; EVOLUTIONARY ALGORITHM; SECURITY;
D O I
10.1002/cpe.7919
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the rising adoption of the Internet of Things (IoT) across a variety of industries, malware is increasingly targeting the large number of IoT devices that lack adequate protection. Malware hunting is challenging in the IoT due to the variety of instruction set architectures of devices, as shown by the differences in the relevant characteristics of malware on different platforms. There are also serious concerns about resource utilization and privacy leaks in the development of conventional detection models. This study suggests a novel federated malware detection framework based on many-objective optimization (FMDMO) for the IoT to overcome the problems. First, the framework provides a cross-platform compatible basis with the federated mechanism as the backbone, while avoiding raw data sharing to improve privacy protection. Second, an intelligent optimization-based client selection method is designed for four objectives: learning performance, architectural selection deviation, time consumption, and training stability, which leads malware detection to retain a high degree of cross-architectural generalization while enhancing training efficiency. Based on a large IoT malware dataset we constructed, containing 62,515 malware samples across seven typical architectures, the FMDMO is evaluated comprehensively in three scenarios. The experimental results demonstrate the FMDMO substantially enhances the model's cross-platform detection performance while preserving effective training and flexibility.
引用
收藏
页数:18
相关论文
共 70 条
  • [1] Alasmary H., ARXIV
  • [2] Alhanahnah M, 2018, IEEE CONF COMM NETW
  • [3] A Comprehensive Review on Malware Detection Approaches
    Aslan, Omer
    Samet, Refik
    [J]. IEEE ACCESS, 2020, 8 : 6249 - 6271
  • [4] Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
  • [5] A Multicloud-Model-Based Many-Objective Intelligent Algorithm for Efficient Task Scheduling in Internet of Things
    Cai, Xingjuan
    Geng, Shaojin
    Wu, Di
    Cai, Jianghui
    Chen, Jinjun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12): : 9645 - 9653
  • [6] A hybrid recommendation system with many-objective evolutionary algorithm
    Cai, Xingjuan
    Hu, Zhaoming
    Zhao, Peng
    Zhang, WenSheng
    Chen, Jinjun
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2020, 159
  • [7] A many-objective optimization recommendation algorithm based on knowledge mining
    Cai, Xingjuan
    Hu, Zhaoming
    Chen, Jinjun
    [J]. INFORMATION SCIENCES, 2020, 537 : 148 - 161
  • [8] An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search
    Cai, Xingjuan
    Niu, Yun
    Geng, Shaojin
    Zhang, Jiangjiang
    Cui, Zhihua
    Li, Jianwei
    Chen, Jinjun
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (05)
  • [9] Control Flow-Based Malware Variant Detection
    Cesare, Silvio
    Xiang, Yang
    Zhou, Wanlei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (04) : 304 - 317
  • [10] Chandrasekar K., INTERNET SECURITY TH