Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3526241.3530378acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
short-paper
Open access

RAFeL - Robust and Data-Aware Federated Learning-inspired Malware Detection in Internet-of-Things (IoT) Networks

Published: 06 June 2022 Publication History

Abstract

Federated Learning (FL) is a decentralized machine learning in which the training data is distributed on the Internet-of-Things (IoT) devices and learns a shared global model by aggregating local updates. However, the training data can be poisoned and manipulated by malicious adversaries, contaminating locally computed updates. To prevent this, detecting malicious IoT devices is very important. Since the local updates are large because of the high volume of data, minimizing the communication overhead is also necessary. This paper proposes a "RAFeL" framework, comprising of two techniques to tackle the above issues, (1) a robust defense technique and (2) a "Performance-aware bit-wise encoding" technique. "Robust and Active Protection with Intelligent Defense (RAPID)" is a defense system that detects malicious IoT devices and restricts the participation of the contaminated local updates computed by these malicious devices. To minimize communication cost, "Performance-aware bit-wise encoding" selects the appropriate encoding scheme for individual split bits based on their significance and effect on FL performance. The results illustrate that the proposed framework shows a 1.2-1.8x higher compression rate than lossy and lossless encoding techniques and has an average accuracy drop of 3% to 10% even with a fraction of malicious devices.

References

[1]
C. Adrián Martínez and et al. 2010. Malware detection based on Cloud Computing integrating Intrusion Ontology representation. In IEEE Latin-American Conference on Communications.
[2]
Clement Fung and et al. 2018. Mitigating Sybils in Federated Learning Poisoning. ArXiv (2018).
[3]
Song Han and et al. 2015. Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv:1510.00149 (2015).
[4]
Jamie Hayes and et al. 2018. Contamination attacks and mitigation in multi-party machine learning. In Advances in neural information processing systems.
[5]
U. Jayasankar and et al. 2021. A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. Journal of King Saud University - Computer and Information Sciences (2021).
[6]
Robert Karam and et al. 2017. Mixed-granular architectural diversity for device security in the Internet of Things. In 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
[7]
Jakub Konecny and et al. 2016. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016).
[8]
Chenxin Ma and et al. 2017. Distributed optimization with arbitrary local solvers. Optimization Methods and Software (2017).
[9]
Fabrice Muhlenbach and et al. 2004. Identifying and Handling Mislabelled Instances. J. Intell. Inf. Syst. (2004).
[10]
Milad Nasr and et al. 2019. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning. IEEE Symposium on Security and Privacy (SP) (2019).
[11]
B. Nelson and et al. 2009. Misleading Learners: Co-opting Your Spam Filter. Springer US (2009).
[12]
Miloc Nikolic and et al. 2018. Characterizing Sources of Ineffectual Computations in Deep Learning Networks. In IEEE International Symposium on Workload Characterization (IISWC).
[13]
Mingda Qiao and et al. 2018. Learning Discrete Distributions from Untrusted Batches. ArXiv (2018).
[14]
Noelle Rakotondravony and et al. 2017. Classifying malware attacks in IaaS cloud environments. Journal of Cloud Computing (2017).
[15]
Anit Kumar Sahu and et al. 2018. Federated Optimization for Heterogeneous Networks.
[16]
Ohad Shamir and et al. 2014. Communication-efficient distributed optimization using an approximate newton-type method. In ICML.
[17]
Sanket Shukla and et al. 2021. On-device Malware Detection using Performance-Aware and Robust Collaborative Learning. In (DAC).
[18]
Gang Wang and et al. 2014. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. In 23rd USENIX Conf. on Security Symposium.
[19]
Kan Xiao and et al. 2016. Hardware trojans: Lessons learned after one decade of research. ACM Transactions on Design Automation of Electronic Systems (2016).

Cited By

View all
  • (2023)Circuit Topology-Aware Vaccination-Based Hardware Trojan DetectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.323444042:9(2852-2862)Online publication date: 1-Sep-2023
  • (2023)PE-FedAvg: A Privacy-Enhanced Federated Learning for Distributed Android Malware Detection2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00094(474-481)Online publication date: 21-Dec-2023
  • (2022)Iron-Dome: Securing IoT Networked Systems at Runtime by Network and Device Characteristics to Confine Malware Epidemics2022 IEEE 40th International Conference on Computer Design (ICCD)10.1109/ICCD56317.2022.00046(259-262)Online publication date: Oct-2022

Index Terms

  1. RAFeL - Robust and Data-Aware Federated Learning-inspired Malware Detection in Internet-of-Things (IoT) Networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GLSVLSI '22: Proceedings of the Great Lakes Symposium on VLSI 2022
    June 2022
    560 pages
    ISBN:9781450393225
    DOI:10.1145/3526241
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 June 2022

    Check for updates

    Author Tags

    1. federated learning
    2. malware detection

    Qualifiers

    • Short-paper

    Conference

    GLSVLSI '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 312 of 1,156 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)143
    • Downloads (Last 6 weeks)30
    Reflects downloads up to 28 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Circuit Topology-Aware Vaccination-Based Hardware Trojan DetectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.323444042:9(2852-2862)Online publication date: 1-Sep-2023
    • (2023)PE-FedAvg: A Privacy-Enhanced Federated Learning for Distributed Android Malware Detection2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00094(474-481)Online publication date: 21-Dec-2023
    • (2022)Iron-Dome: Securing IoT Networked Systems at Runtime by Network and Device Characteristics to Confine Malware Epidemics2022 IEEE 40th International Conference on Computer Design (ICCD)10.1109/ICCD56317.2022.00046(259-262)Online publication date: Oct-2022

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media