2023
DOI: 10.1109/access.2023.3235389
|View full text |Cite
|
Sign up to set email alerts
|

IoT Malware Analysis Using Federated Learning: A Comprehensive Survey

Abstract: The Internet of Things (IoT) has paved the way to a highly connected society where all things are interconnected and exchanging information has become more accessible through the internet. With the use of IoT devices, the threat of malware has increased rapidly. The increased number of existing and new malware variants has made protecting IoT devices and networks challenging. The malware can hide in the systems and disables its activity when there are attempts to discover and detect them. With technological ad… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(7 citation statements)
references
References 102 publications
0
5
0
Order By: Relevance
“… The length of the matrix LM must be at least greater than or equal to the length of the Cover-Media LCM  The length of the selected key LK must equal the length of the Message LMSG  The length of the Cover-Media LCM must be greater than length of the message LMSG: From Eq. ( 1), (2), and (3) we can conclude:…”
Section: A Matrix Selection Phasementioning
confidence: 78%
See 1 more Smart Citation
“… The length of the matrix LM must be at least greater than or equal to the length of the Cover-Media LCM  The length of the selected key LK must equal the length of the Message LMSG  The length of the Cover-Media LCM must be greater than length of the message LMSG: From Eq. ( 1), (2), and (3) we can conclude:…”
Section: A Matrix Selection Phasementioning
confidence: 78%
“…This transformation is largely fueled by the seamless integration of physical devices with digital networks, enabling them to communicate, analyze, and act upon data with unprecedented efficiency and scale [24]. However, this rapidly expanding network of interconnected devices presents substantial security challenges, particularly in the realm of data privacy and network integrity [2].…”
Section: Introductionmentioning
confidence: 99%
“…It allows models to be trained across multiple edge devices or servers while keeping data localized [588]. In agriculture, where data privacy is crucial, this technique enables collaborative model training without centralized data storage [589]. Farmers can contribute to a global model without sharing sensitive data, improving model accuracy for various agricultural tasks.…”
Section: ) Federated Learning (Fl)mentioning
confidence: 99%
“…The rapid increase in digital interconnectivity and reliance on technology has made cyber-attacks, especially malware, a significant global threat [ 1 , 2 , 3 ]. Malware, or malicious software, has evolved since the early 1970s, represented by various emerging types such as viruses, worms, Trojans, spyware, and ransomware [ 4 , 5 , 6 ]. Ransomware, which holds user data and files for ransom by denying access, gained popularity among attackers when enabling technologies such as Ransomware-as-a-Service (RaaS), internet, cryptography, and hard-to-trace digital currencies emerged [ 7 , 8 ].…”
Section: Introductionmentioning
confidence: 99%