iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3536425
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:43:43Z","timestamp":1725615823781},"reference-count":71,"publisher":"Association for Computing Machinery (ACM)","issue":"2s","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2022,6,30]]},"abstract":"\n In recent years, malware detection has become an active research topic in the area of Internet of Things (IoT) security. The principle is to exploit knowledge from large quantities of continuously generated malware. Existing algorithms practise available malware features for IoT devices and lack real-time prediction behaviours. More research is thus required on malware detection to cope with real-time misclassification of the input IoT data. Motivated by this, in this article, we propose an adversarial self-supervised architecture for detecting malware in IoT networks, SETTI, considering samples of IoT network traffic that may not be labeled. In the SETTI architecture, we design\n three<\/jats:italic>\n self-supervised attack techniques, namely,\n Self-MDS<\/jats:italic>\n ,\n GSelf-MDS,<\/jats:italic>\n and\n ASelf-MDS<\/jats:italic>\n . The Self-MDS method considers the IoT input data and the adversarial sample generation in real-time. The GSelf-MDS builds a generative adversarial network model to generate adversarial samples in the self-supervised structure. Finally, ASelf-MDS utilises\n three<\/jats:italic>\n well-known perturbation sample techniques to develop adversarial malware and inject it over the self-supervised architecture. Also, we apply a defence method to mitigate these attacks, namely,\n adversarial self-supervised training,<\/jats:italic>\n to protect the malware detection architecture against injecting the malicious samples. To validate the attack and defence algorithms, we conduct experiments on two recent IoT datasets: IoT23 and NBIoT. Comparison of the results shows that in the IoT23 dataset, the Self-MDS method has the most damaging consequences from the attacker\u2019s point of view by reducing the accuracy rate from 98% to 74%. In the NBIoT dataset, the ASelf-MDS method is the most devastating algorithm that can plunge the accuracy rate from 98% to 77%.\n <\/jats:p>","DOI":"10.1145\/3536425","type":"journal-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T13:29:15Z","timestamp":1652794155000},"page":"1-21","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["SETTI: A\n S<\/u>\n elf-supervised Adv\n E<\/u>\n rsarial Malware De\n T<\/u>\n ection Archi\n T<\/u>\n ecture in an\n I<\/u>\n oT Environment"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5139-1214","authenticated-orcid":false,"given":"Marjan","family":"Golmaryami","sequence":"first","affiliation":[{"name":"Computer Engineering and Information Technology Department, ShirazUniversity of Technology, Modares Blv, Shiraz, Farse, Iran"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4078-3105","authenticated-orcid":false,"given":"Rahim","family":"Taheri","sequence":"additional","affiliation":[{"name":"King\u2019s Communications, Learning and Information Processing (kclip) lab, King\u2019s College London, London, United Kingdom"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3767-0377","authenticated-orcid":false,"given":"Zahra","family":"Pooranian","sequence":"additional","affiliation":[{"name":"5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3284-5086","authenticated-orcid":false,"given":"Mohammad","family":"Shojafar","sequence":"additional","affiliation":[{"name":"5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7886-5878","authenticated-orcid":false,"given":"Pei","family":"Xiao","sequence":"additional","affiliation":[{"name":"5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,10,6]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3462635"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2873980"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.23919\/ICITST.2017.8356357"},{"key":"e_1_3_1_5_2","article-title":"Self-supervised learning by cross-modal audio-video clustering","volume":"33","author":"Alwassel Humam","year":"2020","unstructured":"Humam Alwassel, Dhruv Mahajan, Bruno Korbar, Lorenzo Torresani, Bernard Ghanem, and Du Tran. 2020. Self-supervised learning by cross-modal audio-video clustering. Adv. Neural Inf. Process. Syst. 33 (2020).","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2792941"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2013.6620049"},{"issue":"1","key":"e_1_3_1_8_2","first-page":"4","article-title":"Pyramidal implementation of the affine Lucas Kanade feature tracker description of the algorithm","volume":"5","author":"Bouguet Jean-Yves","year":"2001","unstructured":"Jean-Yves Bouguet et\u00a0al. 2001. Pyramidal implementation of the affine Lucas Kanade feature tracker description of the algorithm. Intel Corp. 5, 1\u201310 (2001), 4.","journal-title":"Intel Corp."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2621888"},{"key":"e_1_3_1_10_2","article-title":"Electra: Pre-training text encoders as discriminators rather than generators","author":"Clark Kevin","year":"2020","unstructured":"Kevin Clark, Minh-Thang Luong, Quoc V. Le, and Christopher D. Manning. 2020. Electra: Pre-training text encoders as discriminators rather than generators. arXiv preprint arXiv:2003.10555 (2020).","journal-title":"arXiv preprint arXiv:2003.10555"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2599841"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.191"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11865"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/10.1145\/3488932.3517393"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271768"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.167"},{"key":"e_1_3_1_18_2","first-page":"10542","volume-title":"Proceedings of the Conference on Advances in Neural Information Processing Systems","author":"Donahue Jeff","year":"2019","unstructured":"Jeff Donahue and Karen Simonyan. 2019. Large scale adversarial representation learning. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 10542\u201310552."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2496141"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3506852"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64701-2_14"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220114"},{"key":"e_1_3_1_23_2","article-title":"Unsupervised representation learning by predicting image rotations","author":"Gidaris Spyros","year":"2018","unstructured":"Spyros Gidaris, Praveer Singh, and Nikos Komodakis. 2018. Unsupervised representation learning by predicting image rotations. arXiv preprint arXiv:1803.07728 (2018).","journal-title":"arXiv preprint arXiv:1803.07728"},{"key":"e_1_3_1_24_2","first-page":"2672","volume-title":"Proceedings of the Conference on Neural Information Processing Systems","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Proceedings of the Conference on Neural Information Processing Systems. 2672\u20132680."},{"key":"e_1_3_1_25_2","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).","journal-title":"arXiv preprint arXiv:1412.6572"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2997359"},{"key":"e_1_3_1_27_2","first-page":"4182","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Henaff Olivier","year":"2020","unstructured":"Olivier Henaff. 2020. Data-efficient image recognition with contrastive predictive coding. In Proceedings of the International Conference on Machine Learning. PMLR, 4182\u20134192."},{"key":"e_1_3_1_28_2","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","author":"Hendrycks Dan","year":"2019","unstructured":"Dan Hendrycks and Thomas Dietterich. 2019. Benchmarking neural network robustness to common corruptions and perturbations. arXiv preprint arXiv:1903.12261 (2019).","journal-title":"arXiv preprint arXiv:1903.12261"},{"key":"e_1_3_1_29_2","first-page":"15663","volume-title":"Proceedings of the Conference on Advances in Neural Information Processing Systems","author":"Hendrycks Dan","year":"2019","unstructured":"Dan Hendrycks, Mantas Mazeika, Saurav Kadavath, and Dawn Song. 2019. Using self-supervised learning can improve model robustness and uncertainty. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 15663\u201315674."},{"key":"e_1_3_1_30_2","first-page":"10456","volume-title":"Proceedings of the Conference on Advances in Neural Information Processing Systems","author":"Hendrycks Dan","year":"2018","unstructured":"Dan Hendrycks, Mantas Mazeika, Duncan Wilson, and Kevin Gimpel. 2018. Using trusted data to train deep networks on labels corrupted by severe noise. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 10456\u201310465."},{"key":"e_1_3_1_31_2","article-title":"Learning deep representations by mutual information estimation and maximization","author":"Hjelm R. Devon","year":"2018","unstructured":"R. Devon Hjelm, Alex Fedorov, Samuel Lavoie-Marchildon, Karan Grewal, Phil Bachman, Adam Trischler, and Yoshua Bengio. 2018. Learning deep representations by mutual information estimation and maximization. arXiv preprint arXiv:1808.06670 (2018).","journal-title":"arXiv preprint arXiv:1808.06670"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00096"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00300"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.181"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00092"},{"key":"e_1_3_1_36_2","first-page":"10215","volume-title":"Proceedings of the Conference on Advances in Neural Information Processing Systems","author":"Kingma Durk P.","year":"2018","unstructured":"Durk P. Kingma and Prafulla Dhariwal. 2018. Glow: Generative flow with invertible 1x1 convolutions. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 10215\u201310224."},{"key":"e_1_3_1_37_2","article-title":"Adversarial examples in the physical world","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016).","journal-title":"arXiv preprint arXiv:1607.02533"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.96"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2970805"},{"key":"e_1_3_1_40_2","first-page":"273","volume-title":"Robotics: Science and Systems","author":"Lieb David","year":"2005","unstructured":"David Lieb, Andrew Lookingbill, and Sebastian Thrun. 2005. Adaptive road following using self-supervised learning and reverse optical flow. In Robotics: Science and Systems. MIT Press, Cambridge, Massachusetts, 273\u2013280."},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00470"},{"key":"e_1_3_1_42_2","first-page":"674","volume-title":"Proceedings of the 7th International Joint Conference on Artificial Intelligence","author":"Lucas Bruce D.","year":"1981","unstructured":"Bruce D. Lucas, Takeo Kanade et\u00a0al. 1981. An iterative image registration technique with an application to stereo vision. In Proceedings of the 7th International Joint Conference on Artificial Intelligence. 674\u2013679."},{"key":"e_1_3_1_43_2","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017).","journal-title":"arXiv preprint arXiv:1706.06083"},{"key":"e_1_3_1_44_2","first-page":"99","volume-title":"Proceedings of the Asian Conference on Computer Vision","author":"Mahendran Aravindh","year":"2018","unstructured":"Aravindh Mahendran, James Thewlis, and Andrea Vedaldi. 2018. Cross pixel optical-flow similarity for self-supervised learning. In Proceedings of the Asian Conference on Computer Vision. Springer, 99\u2013116."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12276"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298925"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485473"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2469253"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-010-9156-z"},{"key":"e_1_3_1_51_2","article-title":"Representation learning with contrastive predictive coding","author":"Oord Aaron van den","year":"2018","unstructured":"Aaron van den Oord, Yazhe Li, and Oriol Vinyals. 2018. Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748 (2018).","journal-title":"arXiv preprint arXiv:1807.03748"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_1_53_2","article-title":"A Labeled Dataset with Malicious and Benign IoT Network Traffic","author":"Parmisano A.","year":"2020","unstructured":"A. Parmisano, S. Garcia, and M. J. Erquiaga. 2020. A Labeled Dataset with Malicious and Benign IoT Network Traffic. Stratosphere Laboratory, Praha, Czech Republic. Stratosphere Laboratory: Praha, Czech Republic.","journal-title":"Stratosphere Laboratory, Praha, Czech Republic"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.240"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cagd.2020.101928"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10723"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3052888"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3009358"},{"key":"e_1_3_1_59_2","first-page":"5014","volume-title":"Proceedings of the Conference on Advances in Neural Information Processing Systems","author":"Schmidt Ludwig","year":"2018","unstructured":"Ludwig Schmidt, Shibani Santurkar, Dimitris Tsipras, Kunal Talwar, and Aleksander Madry. 2018. Adversarially robust generalization requires more data. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 5014\u20135026."},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/10.1145\/3524618"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04831-9"},{"key":"e_1_3_1_62_2","article-title":"FED-IIoT: A robust federated malware detection architecture in industrial IoT","author":"Taheri Rahim","year":"2020","unstructured":"Rahim Taheri, Mohammad Shojafar, Mamoun Alazab, and Rahim Tafazolli. 2020. FED-IIoT: A robust federated malware detection architecture in industrial IoT. IEEE Trans. Industr. Inform. 17, 12 (2020), 8442\u20138452.","journal-title":"IEEE Trans. Industr. Inform."},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01229"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2997564"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00097"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00212"},{"key":"e_1_3_1_67_2","first-page":"55","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Yu Lingjing","year":"2020","unstructured":"Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, and Qingyun Liu. 2020. You are what you broadcast: Identification of mobile and IoT devices from (public) WiFi. In Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920). 55\u201372."},{"key":"e_1_3_1_68_2","article-title":"Theoretically principled trade-off between robustness and accuracy","author":"Zhang Hongyang","year":"2019","unstructured":"Hongyang Zhang, Yaodong Yu, Jiantao Jiao, Eric P. Xing, Laurent El Ghaoui, and Michael I. Jordan. 2019. Theoretically principled trade-off between robustness and accuracy. arXiv preprint arXiv:1901.08573 (2019).","journal-title":"arXiv preprint arXiv:1901.08573"},{"key":"e_1_3_1_69_2","article-title":"Empowering things with intelligence: A survey of the progress, challenges, and opportunities in artificial intelligence of things","author":"Zhang Jing","year":"2021","unstructured":"Jing Zhang and Dacheng Tao. 2021. Empowering things with intelligence: A survey of the progress, challenges, and opportunities in artificial intelligence of things. IEEE Internet Things J. 8, 10 (2021), 7789\u20137817.","journal-title":"IEEE Internet Things J."},{"key":"e_1_3_1_70_2","first-page":"8778","article-title":"Generalized cross entropy loss for training deep neural networks with noisy labels","volume":"31","author":"Zhang Zhilu","year":"2018","unstructured":"Zhilu Zhang and Mert Sabuncu. 2018. Generalized cross entropy loss for training deep neural networks with noisy labels. Adv. Neural Inf. Process. Syst. 31 (2018), 8778\u20138788.","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"e_1_3_1_71_2","article-title":"Self-supervised adversarial example detection by disentangled representation","author":"Zhang Zhaoxi","year":"2021","unstructured":"Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Shengshan Hu, Jinyu Tian, and Jiantao Zhou. 2021. Self-supervised adversarial example detection by disentangled representation. arXiv preprint arXiv:2105.03689 (2021).","journal-title":"arXiv preprint arXiv:2105.03689"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2868648"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3536425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T07:30:36Z","timestamp":1672644636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3536425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,30]]},"references-count":71,"journal-issue":{"issue":"2s","published-print":{"date-parts":[[2022,6,30]]}},"alternative-id":["10.1145\/3536425"],"URL":"https:\/\/doi.org\/10.1145\/3536425","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,30]]},"assertion":[{"value":"2021-11-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}