An Automatic and Efficient Malware Traffic Classification Method for Secure Internet of Things

被引:6
|
作者
Zhang, Xixi [1 ]
Hao, Liang [2 ]
Gui, Guan [1 ]
Wang, Yu [1 ]
Adebisi, Bamidele [3 ]
Sari, Hikmet [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Telecommun & Informat Engn, Nanjing 210003, Peoples R China
[2] Nanjing Inst Measurement & Testing Technol, Dept Traff Safety Inspect, Nanjing 210000, Peoples R China
[3] Manchester Metropolitan Univ, Dept Engn, Fac Sci & Engn, Manchester M1 5GD, England
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 05期
关键词
Internet of Things; Search problems; Feature extraction; Data models; Malware; Computer architecture; Optimization; Deep learning (DL); malware traffic classification (MTC); network intrusion detection; neural architecture search (NAS); secure Internet of Things (IoT); INTRUSION DETECTION; NEURAL-NETWORKS;
D O I
10.1109/JIOT.2023.3318290
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware traffic classification (MTC) plays an important role in cyber security and network resource management for the secure Internet of Things (IoT). Many deep learning (DL)-based MTC methods have been proposed due to their robustness and effectiveness with self-designed model architecture. However, to completely adjust complex parameters in the DL model, the architecture design of the DL model requires substantial professional knowledge and effort from human experts. To solve these problems, we propose an automatic and efficient MTC method using neural architecture search via proximal iterations (NASP), which can automatically and efficiently search the optimal model architecture according to the network traffic in the realistic environment. Specifically, we first describe NAS as a constrained optimization problem by keeping the search space differentiable and forcing the architecture to be discrete in the search process. Second, a suitable regularizer is introduced to balance the complexity and performance of the model architecture. Finally, the simulation results show that the proposed NASP-aided MTC method not only can efficiently and accurately search the optimal classification model architecture on the USTC-TFC2016 data set and the Egde-IIoTset data set but also compared with the typical MTC methods it can achieve the optimal classification performance with the fewer parameters as well as the floating-point operations (FLOPs).
引用
收藏
页码:8448 / 8458
页数:11
相关论文
共 50 条
  • [31] CNN-Based Malware Variants Detection Method for Internet of Things
    Li, Qi
    Mi, Jiaxin
    Li, Weishi
    Wang, Junfeng
    Cheng, Mingyu
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (23) : 16946 - 16962
  • [32] An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things
    Shah, Tahir Ali
    Ullah, Insaf
    Khan, Muhammad Asghar
    Lorenz, Pascal
    Innab, Nisreen
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (01)
  • [33] A Few-Shot Learning-Based Automatic Modulation Classification Method for Internet of Things
    Aer Sileng
    Qi Chenhao
    China Communications, 2024, 21 (08) : 18 - 29
  • [34] Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks
    Liu, Zhicheng
    Li, Shuhao
    Zhang, Yongzheng
    Yun, Xiaochun
    Cheng, Zhenyu
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 397 - 403
  • [35] Anomaly traffic detection based on feature fluctuation for secure industrial internet of things
    Jie Yin
    Chuntang Zhang
    Wenwei Xie
    Guangjun Liang
    Lanping Zhang
    Guan Gui
    Peer-to-Peer Networking and Applications, 2023, 16 : 1680 - 1695
  • [36] Secure and dynamic access control for the Internet of Things (IoT) based traffic system
    Aftab, Muhammad Umar
    Oluwasanmi, Ariyo
    Alharbi, Abdullah
    Sohaib, Osama
    Nie, Xuyun
    Qin, Zhiguang
    Ngo, Son Tung
    PEERJ COMPUTER SCIENCE, 2021,
  • [37] Secure and Dynamic Access Control for the Internet of Things (IoT) Based Traffic System
    Aftab M.U.
    Oluwasanmi A.
    Alharbi A.
    Sohaib O.
    Nie X.
    Qin Z.
    Ngo S.T.
    PeerJ Computer Science, 2021, 7 : 1 - 26
  • [38] Anomaly traffic detection based on feature fluctuation for secure industrial internet of things
    Yin, Jie
    Zhang, Chuntang
    Xie, Wenwei
    Liang, Guangjun
    Zhang, Lanping
    Gui, Guan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (04) : 1680 - 1695
  • [39] A Heuristic Secure Resource Sharing Method In Internet Of Things Environment
    Kamalanathan, C.
    Karthick, S.
    Panda, Sunita
    Gopal, S. Raja
    Soundari, D., V
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (03) : 104 - 111
  • [40] Secure Implementations for the Internet of Things
    Schmidt, Joern-Marc
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 2 - 2