Thanks to visit codestin.com
Credit goes to GitHub.com

Skip to content

Federated learning–based IoT malware detection using the IoT-23 dataset, evaluated under adversarial settings including label flipping, gradient manipulation, sign flipping, and single-client backdoor attacks, with time-aware preprocessing and calibration analysis.

License

Notifications You must be signed in to change notification settings

sabanayyab/iot-malware-fl

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

IoT Malware Detection via Robust and Scalable Federated Learning

This repository contains a Google Colab–ready implementation of an IoT malware detection framework based on federated learning. The complete experimental pipeline is implemented in a single Python file (main.py), reflecting the setup used during thesis experimentation.

The framework evaluates malware detection performance under multiple adversarial and robustness scenarios, including data poisoning, model poisoning, and targeted backdoor attacks, using the IoT-23 preprocessed dataset.


Dataset

This project uses the IoT-23 preprocessed dataset available on Kaggle:

https://www.kaggle.com/datasets/engraqeel/iot23preprocesseddata

The dataset is not included in this repository due to licensing restrictions.


How to run (Google Colab)

Step 1: Download the dataset

Download the CSV file from Kaggle and upload it to your Google Drive. A typical path used in the code is:

/content/drive/MyDrive/iot23_preprocessed.csv


Step 2: Open Google Colab

Open Google Colab and either upload the main.py file or open this repository directly from GitHub using Colab.


Step 3: Run the script

The script automatically mounts Google Drive, installs required dependencies, loads the dataset, applies preprocessing and time-aware data splitting, and runs all federated learning experiments.

At the top of main.py, the following setup is used:

from google.colab import drive
drive.mount('/content/drive')

!pip install flwr

About

Federated learning–based IoT malware detection using the IoT-23 dataset, evaluated under adversarial settings including label flipping, gradient manipulation, sign flipping, and single-client backdoor attacks, with time-aware preprocessing and calibration analysis.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages