Edge-Based IIoT Malware Detection for Mobile Devices With Offloading

被引:8
|
作者
Deng, Xiaoheng [1 ,2 ]
Pei, Xinjun [1 ,2 ]
Tian, Shengwei [3 ]
Zhang, Lan [4 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Cent South Univ, Shenzhen Res Inst, Changsha 410083, Peoples R China
[3] Xinjiang Univ, Sch Software, Urumqi 830001, Peoples R China
[4] Michigan Technol Univ, Dept Elect & Comp Engn, Houghton, MI 49931 USA
基金
中国国家自然科学基金;
关键词
Coordinated representation learning; computation offloading; Internet of Things (IoT); malware detection; mobile edge computing (MEC); STRATEGIES; GAME;
D O I
10.1109/TII.2022.3216818
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of 5G brought new opportunities to leapfrog beyond current Industrial Internet of Things (IoT). However, the ever-growing IoT has also attracted adversaries to develop new malware attacks against various IoT applications. Although deep-learning-based methods are expected to combat the sophisticated malwares by exploring the latent attack patterns, such detection can be hardly supported by battery-powered end devices, such as Android-based smartphones. Edge computing enables the near-real-time analysis of IoT data by migrating artificial intelligence (AI)-enabled computation-intensive tasks from resource-constrained IoT devices to nearby edge servers. However, owing to varying channel conditions and the demanding latency requirements of malware detection, it is challenging to coordinate the computing task offloading among multiple users. By leveraging the computation capacity and the proximity benefits of edge computing, we propose a hierarchical security framework for IoT malware detection. Considering the complexity of the AI-enabled malware detection task, we provide a delay-aware computational offloading strategy with minimum delay. Specifically, we construct a coordinated representation learning model, named by Two-Stream Attention-Caps, to capture the latent behavioral patterns of evolving malware attacks. Experimental results show that our system consistently outperforms the state-of-the-art systems in detection performance on four benchmark datasets.
引用
收藏
页码:8093 / 8103
页数:11
相关论文
共 50 条
  • [21] “Chatty Devices” and edge-based activity classification
    Lakoju M.
    Javed A.
    Rana O.
    Burnap P.
    Atiba S.T.
    Cherkaoui S.
    Discover Internet of Things, 2021, 1 (01):
  • [22] A Computing Offloading Game for Mobile Devices and Edge Cloud Servers
    Li, Meiwen
    Wu, Qingtao
    Zhu, Junlong
    Zheng, Ruijuan
    Zhang, Mingchuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [23] EDGE-BASED TEXTURE GRANULARITY DETECTION
    Liang, Haoyi
    Weller, Daniel S.
    2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2016, : 3563 - 3567
  • [24] IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories
    Kim, Ho-myung
    Lee, Kyung-ho
    APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [25] Edge-Based Street Object Detection
    Nagaraj, Sushma
    Muthiyan, Bhushan
    Ravi, Swetha
    Menezes, Virginia
    Kapoor, Kalki
    Jeon, Hyeran
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [26] An edge-based approach to motion detection
    Sappa, Angel D.
    Dornaika, Fadi
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS, 2006, 3991 : 563 - 570
  • [27] Optimal edge-based shape detection
    Moon, H
    Chellappa, R
    Rosenfeld, A
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (11) : 1209 - 1227
  • [28] EC: an edge-based architecture against DDoS attacks and malware spread
    Karrer, Roger P.
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 49 - 53
  • [29] Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices
    Arora, Anshul
    Garg, Shree
    Peddoju, Sateesh K.
    2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST), 2014, : 66 - 71
  • [30] Effective malware detection scheme based on classified behavior graph in IIoT
    Sun, Yi
    Bashir, Ali Kashif
    Tariq, Usman
    Xiao, Fei
    AD HOC NETWORKS, 2021, 120