Federated malware detection based on many‐objective optimization in cross‐architectural IoT

Author:

Zhang Zhigang1ORCID,Zhang Zhixia1ORCID,Cui Zhihua1ORCID

Affiliation:

1. Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and Technology Taiyuan China

Abstract

SummaryWith the rising adoption of the Internet of Things (IoT) across a variety of industries, malware is increasingly targeting the large number of IoT devices that lack adequate protection. Malware hunting is challenging in the IoT due to the variety of instruction set architectures of devices, as shown by the differences in the relevant characteristics of malware on different platforms. There are also serious concerns about resource utilization and privacy leaks in the development of conventional detection models. This study suggests a novel federated malware detection framework based on many‐objective optimization (FMDMO) for the IoT to overcome the problems. First, the framework provides a cross‐platform compatible basis with the federated mechanism as the backbone, while avoiding raw data sharing to improve privacy protection. Second, an intelligent optimization‐based client selection method is designed for four objectives: learning performance, architectural selection deviation, time consumption, and training stability, which leads malware detection to retain a high degree of cross‐architectural generalization while enhancing training efficiency. Based on a large IoT malware dataset we constructed, containing 62,515 malware samples across seven typical architectures, the FMDMO is evaluated comprehensively in three scenarios. The experimental results demonstrate the FMDMO substantially enhances the model's cross‐platform detection performance while preserving effective training and flexibility.

Funder

National Natural Science Foundation of China

Publisher

Wiley

Subject

Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Theoretical Computer Science,Software

Reference70 articles.

1. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices

2. S. C. Labs.2022 SonicWall cyber threat report. Accessed April 26 2022.https://www.sonicwall.com/resources/white‐papers/2022‐sonicwall‐cyber‐threat‐report/

3. Unit.2020 Unit 42 IoT threat report. Accessed April 24 2022.https://unit42.paloaltonetworks.com/iot‐threat‐report‐2020

4. A Comprehensive Review on Malware Detection Approaches

5. Contrastive learning for robust android malware familial classification;Wu Y;IEEE Trans Dependable Secure Comput,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3