Proceedings 2022 Network and Distributed System Security Symposium 2022
DOI: 10.14722/ndss.2022.23153
|View full text |Cite
|
Sign up to set email alerts
|

FedCRI: Federated Mobile Cyber-Risk Intelligence

Abstract: In the present era of ubiquitous digitization more and more services are becoming available online which is amplified by the Corona pandemic. The fast-growing mobile service market opens up new attack surfaces to the mobile service ecosystem. Hence, mobile service providers are faced with various challenges to protect their services and in particular the associated mobile apps. Defenses for apps are, however, often limited to (lightweight) application-level protection such as app hardening and monitoring and i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Zhao et al [77] propose multi-task network anomaly detection using federated learning. Fereidooni et al [23] proposed federated learning to enable effective cyberrisk intelligence sharing for mobile devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhao et al [77] propose multi-task network anomaly detection using federated learning. Fereidooni et al [23] proposed federated learning to enable effective cyberrisk intelligence sharing for mobile devices.…”
Section: Related Workmentioning
confidence: 99%
“…To date, interorganizational cooperation is used primarily for sharing threat intelligence in the form of Indicators of Compromise (IoC), such as IP addresses, domain names, and URL patterns used during an attack [29], [73]. However, this approach has wellknown limitations as it relies on detection of ongoing attacks and their associated IoCs, while attackers can change their infrastructure and behavior to make the detected IoCs obsolete [23], [41], [69]. This observation leads to the natural question: Are there other, more proactive and reliable approaches to global defense coordination that could be effective against evolving, sophisticated cyber threats?…”
Section: Introductionmentioning
confidence: 99%
“…FL also improves on the resource usage, as the computationally expensive training is parallelized and outsourced to the participating clients. As a result, FL has become a popular technology and is applied in various applications, including image recognition [74], [78], [79], [80], e.g., between multiple hospitals [33], [74], [79], natural language processing (NLP), e.g., text prediction on smartphones [34], [57], personalization [17], risk classification [25], or threat detection in IoT networks [64].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, multiple hospitals can participate in training a global model for cancer classification without revealing individual patients' cancer records [21], [36], [46]. Similarly, multiple smartphones could train together a word suggestion model without sharing the individually typed texts [24], or detect threats based on risk indicators [12]. In FL, each client locally trains a model on its private dataset and sends the parameters of this local model to a (global) server, which aggregates the different local models from the clients into a global model (see App.…”
Section: Introductionmentioning
confidence: 99%