Skip to main content

Detecting IoT Malware Using Federated Learning

  • Conference paper
  • First Online:
Data Science and Applications (ICDSA 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 818))

Included in the following conference series:

  • 125 Accesses

Abstract

The surge in Internet of Things (IoT) device usage has concurrently seen a rise in cyber threats aimed at these devices. Conventional centralized machine learning methods for identifying malware frequently encounter privacy dilemmas and scalability challenges. In this study, we introduce a method based on federated learning to detect IoT malware. This method promotes cooperative learning across dispersed IoT devices, ensuring data confidentiality. We have crafted a federated learning model proficient in identifying a wide array of IoT malware with impressive precision. We put this model to the test using an authentic IoT malware dataset, showcasing its capability in pinpointing malicious operations. Our testing indicates that the federated learning method we suggest surpasses conventional centralized techniques in both accuracy and privacy maintenance. This newly proposed technique holds promise in bolstering IoT security and reducing vulnerabilities linked to IoT malware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alsmadi, T., & Alqudah, N. (2021). A survey on malware detection techniques. In 2021 International Conference on Information Technology (ICIT) (pp. 371–376). IEEE.

    Google Scholar 

  2. Chen, Y., Ning, Y., Slawski, M., & Rangwala, H. (2020). Asynchronous online federated learning for edge devices with non-iid data. In 2020 IEEE International Conference on Big Data (Big Data) (pp. 15–24). IEEE.

    Google Scholar 

  3. Dang, Q. V. (2022). Enhancing obfuscated malware detection with machine learning techniques. In Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications: 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23–25, 2022, Proceedings (pp. 731–738). Springer.

    Google Scholar 

  4. Dang, Q. V. (2022). Multi-layer intrusion detection on the USB-IDS-1 dataset. In International conference on hybrid intelligent systems (pp. 1114–1121). Springer.

    Google Scholar 

  5. Dang, Q. V., & Ignat, C. L. (2016). Computational trust model for repeated trust games. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 34–41). IEEE.

    Google Scholar 

  6. Dang, Q. V., & Nguyen, N. S. A. (2022). Evaluating the contribution of relationship information in detecting fraud using graph neural networks. In Inventive communication and computational technologies: Proceedings of ICICCT 2022 (pp. 865–875). Springer.

    Google Scholar 

  7. Dang, Q. V., Tran, M. L., Dang, M. H., Tran, T. M. T., Nguyen, H. N., Cai, T. M. H., & Phan, T. D. (2022). Group’s influence value in logistic regression model and gradient boosting model. In Proceedings of Sixth International Congress on Information and Communication Technology: ICICT 2021, London (Vol. 1, pp. 713–721). Springer.

    Google Scholar 

  8. Dang, Q. V., & Vo, T. H. (2022). Reinforcement learning for the problem of detecting intrusion in a computer system. In Proceedings of Sixth International Congress on Information and Communication Technology: ICICT 2021, London (Vol. 2, pp. 755–762). Springer.

    Google Scholar 

  9. Ghimire, B., & Rawat, D. B. (2022). Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet of Things Journal.

    Google Scholar 

  10. Li, J., Lyu, L., Liu, X., Zhang, X., & Lyu, X. (2021). Fleam: A federated learning empowered architecture to mitigate DDoS in industrial IoT. IEEE Transactions on Industrial Informatics, 18(6), 4059–4068.

    Article  Google Scholar 

  11. Li, L., Fan, Y., Tse, M., & Lin, K. Y. (2020). A review of applications in federated learning. Computers & Industrial Engineering, 149, 106854.

    Article  Google Scholar 

  12. Li, T., Sahu, A. K., Talwalkar, A., & Smith, V. (2020). Federated learning: Challenges, methods, and future directions. IEEE Signal Processing Magazine, 37(3), 50–60.

    Article  Google Scholar 

  13. Lin, K. Y., & Huang, W. R. (2020). Using federated learning on malware classification. In 2020 22nd International Conference on Advanced Communication Technology (ICACT) (pp. 585–589). IEEE.

    Google Scholar 

  14. Liu, Y., Tantithamthavorn, C., Li, L., & Liu, Y. (2022). Deep learning for android malware defenses: A systematic literature review. ACM Journal of the ACM (JACM)

    Google Scholar 

  15. Mohapatra, H. (2021). Socio-technical challenges in the implementation of smart city. In 2021 international conference on innovation and intelligence for informatics, computing, and technologies (3ICT) (pp. 57–62). IEEE.

    Google Scholar 

  16. Mohapatra, H., & Rath, A. K. (2023). Designing of fault-tolerant models for wireless sensor network-assisted smart city applications. In Intelligent technologies: Concepts, applications, and future directions (Vol. 2, pp. 25–43). Springer.

    Google Scholar 

  17. Rasha, A. H., Li, T., Huang, W., Gu, J., & Li, C. (2023). Federated learning in smart cities: Privacy and security survey. Information Sciences.

    Google Scholar 

  18. Sery, T., Shlezinger, N., Cohen, K., & Eldar, Y. C. (2021). Over-the-air federated learning from heterogeneous data. IEEE Transactions on Signal Processing, 69, 3796–3811.

    Article  MathSciNet  Google Scholar 

  19. Shahid, O., Pouriyeh, S., Parizi, R. M., Sheng, Q. Z., Srivastava, G., & Zhao, L. (2021). Communication efficiency in federated learning: Achievements and challenges. arXiv preprint arXiv:2107.10996

  20. Stoian, N. A. (2020). Machine Learning for anomaly detection in IoT networks: Malware analysis on the IoT-23 data set. B.S. thesis, University of Twente.

    Google Scholar 

  21. Ucci, D., Aniello, L., & Baldoni, R. (2019). Survey of machine learning techniques for malware analysis. Computers & Security, 81, 123–147.

    Article  Google Scholar 

  22. Venkatasubramanian, M., Lashkari, A. H., & Hakak, S. (2023). Iot malware analysis using federated learning: A comprehensive survey. IEEE Access.

    Google Scholar 

  23. Yu, B., Fang, Y., Yang, Q., Tang, Y., & Liu, L. (2018). A survey of malware behavior description and analysis. Frontiers of Information Technology & Electronic Engineering, 19, 583–603.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quang-Vinh Dang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dang, QV., Pham, TH. (2024). Detecting IoT Malware Using Federated Learning. In: Nanda, S.J., Yadav, R.P., Gandomi, A.H., Saraswat, M. (eds) Data Science and Applications. ICDSA 2023. Lecture Notes in Networks and Systems, vol 818. Springer, Singapore. https://doi.org/10.1007/978-981-99-7862-5_6

Download citation

Publish with us

Policies and ethics