Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/3061
Title: Application of Federated Learning in Health Care Sector for Malware Detection and Mitigation Using Software Defined Networking Approach
Authors: Panagoda, D
Malinda, C
Wijetunga, C
Rupasinghe, L
Bandara, B
Liyanapathirana, C
Keywords: Application
Federated Learning
Health Care Sector
Malware Detection
Mitigation
Using Software
Defined Networking Approach
Issue Date: 11-Oct-2022
Publisher: IEEE
Citation: D. Panagoda, C. Malinda, C. Wijetunga, L. Rupasinghe, B. Bandara and C. Liyanapathirana, "Application of Federated Learning in Health Care Sector for Malware Detection and Mitigation Using Software Defined Networking Approach," 2022 2nd Asian Conference on Innovation in Technology (ASIANCON), 2022, pp. 1-6, doi: 10.1109/ASIANCON55314.2022.9909488.
Series/Report no.: 2022 2nd Asian Conference on Innovation in Technology (ASIANCON);
Abstract: This research takes us forward with the concepts of Federated Learning and SDN to introduce an efficient malware detection technique and provide a mitigation mechanism to give birth to a resilient and automated healthcare sector network system by also adding the feature of extended privacy preservation. Due to the daily transformation of new malware attacks on hospital ICEs, the healthcare industry is at an undefinable peak of never knowing its continuity direction. The state of blindness by the array of indispensable opportunities that new medical device inventions and their connected coordination offer daily, a factor that should be focused driven is not yet entirely understood by most healthcare operators and patients. This solution has the involvement of four clients in the form of hospital networks to build up the federated learning experimentation architectural structure with different geographical participation to reach the most reasonable accuracy rate with privacy preservation. While the logistic regression with cross-entropy conveys the detection, SDN comes in handy in the second half of the research to stack up the initial development phases of the system with malware mitigation based on policy implementation. The overall evaluation sums up with a system that proves the accuracy with the added privacy. It is no longer needed to continue with traditional centralized systems that offer almost everything but not privacy.
URI: https://rda.sliit.lk/handle/123456789/3061
ISSN: 978-1-6654-6851-0
Appears in Collections:Department of Computer Systems Engineering
Research Papers - Dept of Computer Systems Engineering
Research Papers - IEEE
Research Papers - SLIIT Staff Publications



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.