Edge-Based IIoT Malware Detection for Mobile Devices With Offloading

被引:8
|
作者
Deng, Xiaoheng [1 ,2 ]
Pei, Xinjun [1 ,2 ]
Tian, Shengwei [3 ]
Zhang, Lan [4 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Cent South Univ, Shenzhen Res Inst, Changsha 410083, Peoples R China
[3] Xinjiang Univ, Sch Software, Urumqi 830001, Peoples R China
[4] Michigan Technol Univ, Dept Elect & Comp Engn, Houghton, MI 49931 USA
基金
中国国家自然科学基金;
关键词
Coordinated representation learning; computation offloading; Internet of Things (IoT); malware detection; mobile edge computing (MEC); STRATEGIES; GAME;
D O I
10.1109/TII.2022.3216818
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of 5G brought new opportunities to leapfrog beyond current Industrial Internet of Things (IoT). However, the ever-growing IoT has also attracted adversaries to develop new malware attacks against various IoT applications. Although deep-learning-based methods are expected to combat the sophisticated malwares by exploring the latent attack patterns, such detection can be hardly supported by battery-powered end devices, such as Android-based smartphones. Edge computing enables the near-real-time analysis of IoT data by migrating artificial intelligence (AI)-enabled computation-intensive tasks from resource-constrained IoT devices to nearby edge servers. However, owing to varying channel conditions and the demanding latency requirements of malware detection, it is challenging to coordinate the computing task offloading among multiple users. By leveraging the computation capacity and the proximity benefits of edge computing, we propose a hierarchical security framework for IoT malware detection. Considering the complexity of the AI-enabled malware detection task, we provide a delay-aware computational offloading strategy with minimum delay. Specifically, we construct a coordinated representation learning model, named by Two-Stream Attention-Caps, to capture the latent behavioral patterns of evolving malware attacks. Experimental results show that our system consistently outperforms the state-of-the-art systems in detection performance on four benchmark datasets.
引用
收藏
页码:8093 / 8103
页数:11
相关论文
共 50 条
  • [31] Effective malware detection scheme based on classified behavior graph in IIoT
    Sun, Yi
    Bashir, Ali Kashif
    Tariq, Usman
    Xiao, Fei
    Ad Hoc Networks, 2021, 120
  • [32] Novel method of mobile edge computation offloading based on evolutionary game strategy for IoT devices
    Cui, Yuya
    Zhang, Degan
    Zhang, Ting
    Chen, Lu
    Piao, Mingjie
    Zhu, Haoli
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2020, 118 (118)
  • [33] Demo: Edge-based IPFS in a Disaggregated Mobile Core
    Valente, Pedro
    Oliveira, Jose
    Raposo, Duarte
    Rito, Pedro
    Sargento, Susana
    2023 IEEE 24TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM, 2023, : 346 - 348
  • [34] Privacy-Aware Data Offloading for Mobile Devices in Edge Computing
    Xu, Xiaolong
    Tang, Bowei
    Jiang, Gaoxing
    Liu, Xihua
    Xue, Yuan
    Yuan, Yuan
    2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 170 - 175
  • [35] A Mobile Edge-Based CrowdSensing Framework for Heterogeneous IoT
    Lamaazi, Hanane
    Mizouni, Rabeb
    Singh, Shakti
    Otrok, Hadi
    IEEE ACCESS, 2020, 8 (207524-207536) : 207524 - 207536
  • [36] Mobile Cloud Offloading for Malware Detections with Learning
    Li, Yanda
    Liu, Jinliang
    Li, Qiangda
    Xiao, Liang
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2015, : 197 - 201
  • [37] Edge-based fault detection in a DiffServ network
    Striegel, A
    Manimaran, G
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 79 - 88
  • [38] Human motion detection: Energy or edge-based?
    Hess, RF
    Bex, PJ
    Brady, N
    Fredericksen, RE
    INVESTIGATIVE OPHTHALMOLOGY & VISUAL SCIENCE, 1996, 37 (03) : 4219 - 4219
  • [39] Edge-based blur metric for tamper detection
    Cao, Gang
    Zhao, Yao
    Ni, Rongrong
    Journal of Information Hiding and Multimedia Signal Processing, 2010, 1 (01): : 20 - 27
  • [40] RGB-D Edge Detection and Edge-based Registration
    Choi, Changhyun
    Trevor, Alexander J. B.
    Christensen, Henrik I.
    2013 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2013, : 1568 - 1575