FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities

被引:1
作者
Chang, Yu-Wei [1 ]
Chen, Hong-Yen [1 ]
Han, Chansu [2 ]
Morikawa, Tomohiro [3 ]
Takahashi, Takeshi [2 ]
Lin, Tsung-Nan [1 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Taipei 10617, Taiwan
[2] Natl Inst Informat & Commun Technol, Koganei 1848795, Japan
[3] Univ Hyogo, Kobe, Hyogo 6512197, Japan
关键词
Darknet; federated learning; malware activity; nonnegative matrix factorization; 5G MEC; ALGORITHMS;
D O I
10.1109/TETC.2023.3292924
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
5G networks with the vast number of devices pose security threats. Manual analysis of such extensive security data is complex. Dark-NMF can detect malware activities by monitoring unused IP address space, i.e., the darknet. However, the challenges of cooperative training for Dark-NMF are immense computational complexity with Big Data, communication overhead, and privacy concern with darknet sensor IP addresses. Darknet sensors can observe multivariate time series of packets from the same hosts, represented as intersecting columns in different data matrices. Previous works do not consider intersecting columns, losing a host's semantics because they do not aggregate the host's time series. To solve these problems, we proposed a federated IoT malware detection NMF for intersecting source hosts (FINISH) algorithm for offloading computing tasks to 5G multiaccess edge computing (MEC). The experiments show that FINISH is scalable to a data size with a shorter computational time and has a lower false positive detection performance than Dark-NMF. The comparison results demonstrate that FINISH has better computation and communication efficiency than related works and a short communication time, taking only 1/10 the execution time in a simulated 5G MEC. The experimental results can provide substantial insights into developing federated cybersecurity in the future.
引用
收藏
页码:934 / 949
页数:16
相关论文
共 31 条
  • [1] Akiyama Mitsuaki., 2007, Proceedings of the 2007 International Symposium on Applications and the Internet Workshops, SAINT-W07, P82
  • [2] Alshabrawy OS, 2012, FED CONF COMPUT SCI, P695
  • [3] Alsulaimawi Z., 2020, PROC IEEE 22 INT WOR, P1
  • [4] Detection of Botnet Activities Through the Lens of a Large-Scale Darknet
    Ban, Tao
    Zhu, Lei
    Shimamura, Jumpei
    Pang, Shaoning
    Inoue, Daisuke
    Nakao, Koji
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 442 - 451
  • [5] A federated deep learning framework for privacy preservation and communication efficiency
    Cao, Tien-Dung
    Tram, Truong-Huu
    Tran, Hien
    Tran, Khanh
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 124
  • [6] Etsi M., 2020, ETSI GS MEC, V3
  • [7] Accelerated Multiplicative Updates and Hierarchical ALS Algorithms for Nonnegative Matrix Factorization
    Gillis, Nicolas
    Glineur, Francois
    [J]. NEURAL COMPUTATION, 2012, 24 (04) : 1085 - 1105
  • [8] A multilevel approach for nonnegative matrix factorization
    Gillis, Nicolas
    Glineur, Francois
    [J]. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2012, 236 (07) : 1708 - 1723
  • [9] Survey on Federated-Learning Approaches in Distributed Environment
    Gupta, Ruchi
    Alam, Tanweer
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (02) : 1631 - 1652
  • [10] Automated Detection of Malware Activities Using Nonnegative Matrix Factorization
    Han, Chansu
    Takeuchi, Jun'ichi
    Takahashi, Takeshi
    Inoue, Daisuke
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 548 - 556