An Automatic and Efficient Malware Traffic Classification Method for Secure Internet of Things

被引:6
|
作者
Zhang, Xixi [1 ]
Hao, Liang [2 ]
Gui, Guan [1 ]
Wang, Yu [1 ]
Adebisi, Bamidele [3 ]
Sari, Hikmet [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Telecommun & Informat Engn, Nanjing 210003, Peoples R China
[2] Nanjing Inst Measurement & Testing Technol, Dept Traff Safety Inspect, Nanjing 210000, Peoples R China
[3] Manchester Metropolitan Univ, Dept Engn, Fac Sci & Engn, Manchester M1 5GD, England
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 05期
关键词
Internet of Things; Search problems; Feature extraction; Data models; Malware; Computer architecture; Optimization; Deep learning (DL); malware traffic classification (MTC); network intrusion detection; neural architecture search (NAS); secure Internet of Things (IoT); INTRUSION DETECTION; NEURAL-NETWORKS;
D O I
10.1109/JIOT.2023.3318290
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware traffic classification (MTC) plays an important role in cyber security and network resource management for the secure Internet of Things (IoT). Many deep learning (DL)-based MTC methods have been proposed due to their robustness and effectiveness with self-designed model architecture. However, to completely adjust complex parameters in the DL model, the architecture design of the DL model requires substantial professional knowledge and effort from human experts. To solve these problems, we propose an automatic and efficient MTC method using neural architecture search via proximal iterations (NASP), which can automatically and efficiently search the optimal model architecture according to the network traffic in the realistic environment. Specifically, we first describe NAS as a constrained optimization problem by keeping the search space differentiable and forcing the architecture to be discrete in the search process. Second, a suitable regularizer is introduced to balance the complexity and performance of the model architecture. Finally, the simulation results show that the proposed NASP-aided MTC method not only can efficiently and accurately search the optimal classification model architecture on the USTC-TFC2016 data set and the Egde-IIoTset data set but also compared with the typical MTC methods it can achieve the optimal classification performance with the fewer parameters as well as the floating-point operations (FLOPs).
引用
收藏
页码:8448 / 8458
页数:11
相关论文
共 50 条
  • [41] Towards a Secure Internet of Things
    Levis, Phil
    2018 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2018, : 1 - 1
  • [42] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,
  • [43] Secure Association for the Internet of Things
    Benin, Almog
    Toledo, Sivan
    Tromer, Eran
    2015 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2015, : 25 - 34
  • [44] Building an Internet of Secure Things
    Kleidermacher, David
    COMPUTER, 2020, 53 (08) : 100 - 104
  • [45] Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"
    Vergnaud, Damien
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11) : 11327 - 11329
  • [46] SMER: a secure method of exchanging resources in heterogeneous internet of things
    Zhang, Yu
    Han, Yuxing
    Wen, Jiangtao
    FRONTIERS OF COMPUTER SCIENCE, 2019, 13 (06) : 1198 - 1209
  • [47] SMER: a secure method of exchanging resources in heterogeneous internet of things
    Yu Zhang
    Yuxing Han
    Jiangtao Wen
    Frontiers of Computer Science, 2019, 13 : 1198 - 1209
  • [48] A Secure Privacy Data Transmission Method for Medical Internet of Things
    Ye, Heping
    Yang, Jie
    Zhu, Junru
    Zhang, Ziyang
    Huang, Yakun
    Chen, Fulong
    INDUSTRIAL IOT TECHNOLOGIES AND APPLICATIONS, INDUSTRIAL IOT 2016, 2016, 173
  • [49] A Deep Convolutional Neural Network Stacked Ensemble for Malware Threat Classification in Internet of Things
    Naeem, Hamad
    Cheng, Xiaochun
    Ullah, Farhan
    Jabbar, Sohail
    Dong, Shi
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (17)
  • [50] Secure and Efficient E-health Scheme Based on the Internet of Things
    Hussien, Zaid Alaa
    Jin, Hai
    Abduljabbar, Zaid Ameen
    Hussain, Mohammed Abdulridha
    Yassin, Ali A.
    Abbdal, Salah H.
    Al Sibahee, Mustafa A.
    Zou, Deqing
    2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2016,