{"id":"https://openalex.org/W4315629833","doi":"https://doi.org/10.1109/globecom48099.2022.10000633","title":"Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT","display_name":"Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT","publication_year":2022,"publication_date":"2022-12-04","ids":{"openalex":"https://openalex.org/W4315629833","doi":"https://doi.org/10.1109/globecom48099.2022.10000633"},"language":"en","primary_location":{"id":"doi:10.1109/globecom48099.2022.10000633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10000633","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042195263","display_name":"Takayuki Nishio","orcid":"https://orcid.org/0000-0003-1026-319X"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]},{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takayuki Nishio","raw_affiliation_strings":["Tokyo Institute of Technology,Tokyo,Japan","KDDI Research, Inc., Saitama, Japan","Tokyo Institute of Technology, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology,Tokyo,Japan","institution_ids":["https://openalex.org/I114531698"]},{"raw_affiliation_string":"KDDI Research, Inc., Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"Tokyo Institute of Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112283259","display_name":"Masataka Nakahara","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masataka Nakahara","raw_affiliation_strings":["KDDI Research, Inc.,Saitama,Japan","KDDI Research, Inc., Saitama, Japan"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc.,Saitama,Japan","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI Research, Inc., Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021367845","display_name":"Norihiro Okui","orcid":"https://orcid.org/0009-0004-0699-4816"},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Norihiro Okui","raw_affiliation_strings":["KDDI Research, Inc.,Saitama,Japan","KDDI Research, Inc., Saitama, Japan"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc.,Saitama,Japan","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI Research, Inc., Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006183398","display_name":"Ayumu Kubota","orcid":"https://orcid.org/0000-0001-9146-6102"},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ayumu Kubota","raw_affiliation_strings":["KDDI Research, Inc.,Saitama,Japan","KDDI Research, Inc., Saitama, Japan"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc.,Saitama,Japan","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI Research, Inc., Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017896061","display_name":"Yasuaki Kobayashi","orcid":"https://orcid.org/0000-0003-3244-6915"},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasuaki Kobayashi","raw_affiliation_strings":["KDDI Research, Inc.,Saitama,Japan","KDDI Research, Inc., Saitama, Japan"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc.,Saitama,Japan","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI Research, Inc., Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112250160","display_name":"Keizo Sugiyama","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Keizo Sugiyama","raw_affiliation_strings":["KDDI Research, Inc.,Saitama,Japan","KDDI Research, Inc., Saitama, Japan"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc.,Saitama,Japan","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI Research, Inc., Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087831856","display_name":"Ryoichi Shinkuma","orcid":"https://orcid.org/0000-0003-2842-8941"},"institutions":[{"id":"https://openalex.org/I171481255","display_name":"Shibaura Institute of Technology","ror":"https://ror.org/020wjcq07","country_code":"JP","type":"education","lineage":["https://openalex.org/I171481255"]},{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryoichi Shinkuma","raw_affiliation_strings":["Shibaura Institute of Technology,Tokyo,Japan","KDDI Research, Inc., Saitama, Japan","Shibaura Institute of Technology, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Shibaura Institute of Technology,Tokyo,Japan","institution_ids":["https://openalex.org/I171481255"]},{"raw_affiliation_string":"KDDI Research, Inc., Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"Shibaura Institute of Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I171481255"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5042195263"],"corresponding_institution_ids":["https://openalex.org/I114531698","https://openalex.org/I4210164495"],"apc_list":null,"apc_paid":null,"fwci":1.7209,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85599668,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"299","last_page":"304"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.806303858757019},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.800713300704956},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7280312776565552},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.6812939643859863},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6546008586883545},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6022132635116577},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.46449995040893555},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4534001052379608},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4039445221424103},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36019977927207947},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3471929430961609},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3368871212005615},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3170212209224701}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.806303858757019},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.800713300704956},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7280312776565552},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.6812939643859863},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6546008586883545},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6022132635116577},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.46449995040893555},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4534001052379608},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4039445221424103},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36019977927207947},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3471929430961609},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3368871212005615},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3170212209224701},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom48099.2022.10000633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10000633","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2101234009","https://openalex.org/W2798720628","https://openalex.org/W2803255133","https://openalex.org/W2887731362","https://openalex.org/W2966906412","https://openalex.org/W3105122387","https://openalex.org/W3106312933","https://openalex.org/W3157680283","https://openalex.org/W3157916935","https://openalex.org/W4213258821","https://openalex.org/W4233815997","https://openalex.org/W4253269957","https://openalex.org/W4318619660","https://openalex.org/W6675354045","https://openalex.org/W6728757088","https://openalex.org/W6834718111"],"related_works":["https://openalex.org/W2033352828","https://openalex.org/W3208250511","https://openalex.org/W2355810117","https://openalex.org/W3098313552","https://openalex.org/W70177500","https://openalex.org/W2546418048","https://openalex.org/W2076427967","https://openalex.org/W2034129977","https://openalex.org/W1745773915","https://openalex.org/W2765820957"],"abstract_inverted_index":{"To":[0],"mitigate":[1,73],"cyberattacks,":[2],"detecting":[3],"anomalies":[4],"in":[5,39,117],"network":[6],"traffic":[7,29,87,94],"is":[8,31,46],"of":[9,23,25,36,52,61,76,123],"key":[10,44],"importance.":[11],"In":[12],"this":[13],"paper,":[14],"we":[15],"propose":[16],"a":[17,58],"model":[18,80],"training":[19,41],"method":[20,104],"for":[21],"detection":[22,121],"Internet":[24],"Things":[26],"(IoT)":[27],"anomalous":[28,37,77,113],"that":[30,101],"robust":[32],"against":[33],"the":[34,40,50,74,102,112,120],"contamination":[35],"samples":[38,78,114],"set.":[42],"The":[43,82],"idea":[45],"to":[47,72],"focus":[48],"on":[49,79],"nature":[51],"IoT":[53,62,86],"malware":[54,93],"infections":[55],"(i.e.,":[56],"only":[57],"limited":[59],"number":[60],"networks":[63],"contain":[64],"infected":[65],"devices)":[66],"and":[67,92],"employ":[68],"federated":[69],"learning":[70],"(FL)":[71],"impact":[75],"training.":[81],"simulation":[83],"evaluation":[84],"using":[85],"data":[88,95],"obtained":[89],"from":[90,97],"residences":[91],"collected":[96],"sandbox":[98],"experiments":[99],"demonstrates":[100],"proposed":[103],"does":[105,127],"not":[106],"cause":[107],"accuracy":[108,122],"degradation":[109],"even":[110],"when":[111],"are":[115],"contaminated,":[116],"contrast":[118],"with":[119],"baseline":[124],"methods,":[125],"which":[126],"degrade.":[128]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
