Towards moving target defense for IoT malware detection

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

Machine learning (ML) techniques show promise in malware defense for the Internet of Things (IoT), but are vulnerable to tailored adversarial attacks. Moving Target Defense (MTD) is a security strategy that actively raises the cost to the attacker of a potential attack by changing the target’s characteristics, preventing attackers from profiling the target. In this work we explore the potential for using MTD for IoT malware detection. Applying MTD to protect ML malware detection involves continuously changing the malware classification models, defeating attempts to profile the models. We research the state-of-the-art literature that uses an MTD-style strategy to increase ML model security. We identify two techniques: 'Naive MTD', which cycles between static models, and 'Full MTD', which refreshes models at runtime and is therefore more effective. Focusing on the studies in the ML literature that use Full MTD for adversarial robustness, we examine their approach, assessing features such as discard policy, decision-making and model updating schedule. We make a number of recommendations on development of a Full MTD strategy for ML IoT malware detection.
Original languageEnglish (Ireland)
Title of host publicationProceedings of the 8th International Workshop on Software Engineering Research and Practices for the IoT (SERP4IoT ’26)
PublisherAssociation for Computing Machinery (ACM)
Pages1-8
Number of pages8
DOIs
Publication statusAccepted/In press - 12 Apr 2026

Publication series

NameSERP4IoT

UCC Futures

  • Artificial Intelligence and Data Analytics

Keywords

  • Moving target defense
  • Malware
  • Internet of things
  • Malware defense
  • [ComputerScience]

Fingerprint

Dive into the research topics of 'Towards moving target defense for IoT malware detection'. Together they form a unique fingerprint.

Cite this