Edge-Based IIoT Malware Detection for Mobile Devices With Offloading

被引:6
|
作者
Deng, Xiaoheng [1 ,2 ]
Pei, Xinjun [1 ,2 ]
Tian, Shengwei [3 ]
Zhang, Lan [4 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Cent South Univ, Shenzhen Res Inst, Changsha 410083, Peoples R China
[3] Xinjiang Univ, Sch Software, Urumqi 830001, Peoples R China
[4] Michigan Technol Univ, Dept Elect & Comp Engn, Houghton, MI 49931 USA
基金
中国国家自然科学基金;
关键词
Coordinated representation learning; computation offloading; Internet of Things (IoT); malware detection; mobile edge computing (MEC); STRATEGIES; GAME;
D O I
10.1109/TII.2022.3216818
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of 5G brought new opportunities to leapfrog beyond current Industrial Internet of Things (IoT). However, the ever-growing IoT has also attracted adversaries to develop new malware attacks against various IoT applications. Although deep-learning-based methods are expected to combat the sophisticated malwares by exploring the latent attack patterns, such detection can be hardly supported by battery-powered end devices, such as Android-based smartphones. Edge computing enables the near-real-time analysis of IoT data by migrating artificial intelligence (AI)-enabled computation-intensive tasks from resource-constrained IoT devices to nearby edge servers. However, owing to varying channel conditions and the demanding latency requirements of malware detection, it is challenging to coordinate the computing task offloading among multiple users. By leveraging the computation capacity and the proximity benefits of edge computing, we propose a hierarchical security framework for IoT malware detection. Considering the complexity of the AI-enabled malware detection task, we provide a delay-aware computational offloading strategy with minimum delay. Specifically, we construct a coordinated representation learning model, named by Two-Stream Attention-Caps, to capture the latent behavioral patterns of evolving malware attacks. Experimental results show that our system consistently outperforms the state-of-the-art systems in detection performance on four benchmark datasets.
引用
收藏
页码:8093 / 8103
页数:11
相关论文
共 50 条
  • [1] Cloud-Based Malware Detection Game for Mobile Devices with Offloading
    Xiao, Liang
    Li, Yanda
    Huang, Xueli
    Du, XiaoJiang
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (10) : 2742 - 2750
  • [2] Edge-Based Intrusion Detection for IoT devices
    Mudgerikar, Anand
    Sharma, Puneet
    Bertino, Elisa
    [J]. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2020, 11 (04)
  • [3] Reinforcement Learning Based Mobile Offloading for Cloud-based Malware Detection
    Wan, Xiaoyue
    Sheng, Geyi
    Li, Yanda
    Xiao, Liang
    Du, Xiaojiang
    [J]. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [4] Efficient signature based malware detection on mobile devices
    Venugopal, Deepak
    Hu, Guoning
    [J]. MOBILE INFORMATION SYSTEMS, 2008, 4 (01) : 33 - 49
  • [5] Convnext-Eesnn: An effective deep learning based malware detection in edge based IIOT
    Maddali, Deepika
    [J]. Journal of Intelligent and Fuzzy Systems, 2024, 46 (04): : 10405 - 10421
  • [6] A novel extended edge-based compact PIFA antenna for mobile devices
    Saluja, Nitin
    Khanna, Rajesh
    [J]. OPTIK, 2015, 126 (18): : 1602 - 1605
  • [7] Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning-Aided Detection
    Yao, Haipeng
    Gao, Pengcheng
    Zhang, Peiying
    Wang, Jingjing
    Jiang, Chunxiao
    Lu, Lijun
    [J]. IEEE NETWORK, 2019, 33 (05): : 75 - 81
  • [8] Smart Edge-Based Driver Drowsiness Detection in Mobile Crowdsourcing
    Lamaazi, Hanane
    Alqassab, Aisha
    Fadul, Ruba Ali
    Mizouni, Rabeb
    [J]. IEEE ACCESS, 2023, 11 : 21863 - 21872
  • [9] A lightweight optimized intrusion detection system using machine learning for edge-based IIoT security
    Tiwari, Ravi Shekhar
    Lakshmi, D.
    Das, Tapan Kumar
    Tripathy, Asis Kumar
    Li, Kuan-Ching
    [J]. TELECOMMUNICATION SYSTEMS, 2024,
  • [10] Consortium Blockchain-Based Malware Detection in Mobile Devices
    Gu, Jingjing
    Sun, Binglin
    Du, Xiaojiang
    Wang, Jun
    Zhuang, Yi
    Wang, Ziwang
    [J]. IEEE ACCESS, 2018, 6 : 12118 - 12128