Xiaoheng Deng; Haowen Tang; Xinjun Pei; Deng Li; Kaiping Xue, "MDHE: A Malware Detection System Based on Trust Hybrid User-Edge Evaluation in IoT Network," in IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2023.3318947. IEEE Transactions on Information Forensics and Security. (CCF-A期刊, 2024)
Hits:
Release time:2024-03-13
Abstract:Abstract— With the coming of the Internet of Things (IoT) era, malware attacks targeting IoT networks have posed serious threats to users. Recently, the emerging of edge computing have paved the way for new data processing paradigms in IoT networks, but it is still a challenge for deploying malware detection systems on the IoT devices. This paper develops an IoT malware detection system based on trust hybrid user-edge evaluation, namely MDHE. This system decomposes a large and complex deep learning model into two parts, which are deployed on edge servers and end devices, respectively. Specifically, a trust evaluation mechanism is used to select the trusted devices to participate the model training. Moreover, we develop a private feature generation that leverages a graph mining technology to extract the subgraph features, which then are perturbed by leveraging the differential privacy technology to prevent user privacy from leaking. Finally, we reconstruct the perturbed features on edge server, and propose a Capsule Network (CapsNet) to identify malware. Experimental results show that MDHE can effectively detect malware. Specifically, it can reduce sensitive inference while maintaining the utility of data.
Note:http://faculty.csu.edu.cn/dengxiaoheng/zh_CN/lwcg/10445/content/49306.htm
Translation or Not:no
-
Attachments:
-
3-MDHE_A_Malware_Detection_System_Based_on_Trust_Hybrid_User-Edge_Evaluation_in_IoT_Network.pdf
Pre One:Xinjun Pei; Xiaoheng Deng; Shengwei Tian; Jianqing Liu; Kaiping Xue, "Privacy-Enhanced Graph Neural Network for Decentralized Local Graphs," in IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2023.3329971. IEEE Transactions on Information Forensics and Security. (CCF-A期刊, 2024)
Next One:Tingxuan Liang, Lingyi Chen, Mingfeng Huang, Xiaoheng Deng, Shaobo Zhang, Neal N. Xiong, Anfeng Liu, "RLTD: A Reinforcement Learning-based Truth Data Discovery scheme for decision support systems under sustainable environments," in Applied Soft Computing, doi: 10.1016/j.asoc.2023.110369. Applied Soft Computing. (中科院 1区, 2023)
|
 Postal Address:8d6e5f159904516b64e4092b5baa5f61e0469444b1d12af19a4b3b1583ca5d1e1d4f5aa7f7de7db96baa1b340627c69c8827f184349db54eabf8bda368ff7bfa30235a3fab0dfc9651004c10185cf328ad409c189543868f07b5b3f890615dd96f3bfde92e77ecc76d1ad428d32adb64d2e4d4d55ec7273707b01f54b5ad33a2
 Email:1cf0901cf1c5deeee2603089a14ec3d52f2cb2ae56a8437b0dca49488e08adf1359460f3d8665198bf217dda36eee161cf321dc6b7ce3a57e9307a9579c4c46a3b453ad5c63112dfbc1607c0da31bec1bf63cf5b96f2e5266c9e8533fdd4937ea4cfc98ca79c6c8538cea46b510850fdf956191ab2035fbd5f4a480ca6017800
|