IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v17y2025i7p299-d1693841.html
   My bibliography  Save this article

Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection

Author

Listed:
  • Ma Viet Duc

    (School of Electrical and Electronic Engineering, Hanoi University of Science and Technology, Hanoi 100000, Vietnam)

  • Pham Minh Dang

    (School of Electrical and Electronic Engineering, Hanoi University of Science and Technology, Hanoi 100000, Vietnam)

  • Tran Thu Phuong

    (School of Electrical and Electronic Engineering, Hanoi University of Science and Technology, Hanoi 100000, Vietnam)

  • Truong Duc Truong

    (School of Electrical and Electronic Engineering, Hanoi University of Science and Technology, Hanoi 100000, Vietnam)

  • Vu Hai

    (School of Electrical and Electronic Engineering, Hanoi University of Science and Technology, Hanoi 100000, Vietnam)

  • Nguyen Huu Thanh

    (School of Electrical and Electronic Engineering, Hanoi University of Science and Technology, Hanoi 100000, Vietnam)

Abstract

Domain Generation Algorithms (DGAs) remain a persistent technique used by modern malware to establish stealthy command-and-control (C&C) channels, thereby evading traditional blacklist-based defenses. Detecting such evolving threats is especially challenging in decentralized environments where raw traffic data cannot be aggregated due to privacy or policy constraints. To address this, we present FedSAGE, a security-aware federated intrusion detection framework that combines Variational Autoencoder (VAE)-based latent representation learning with unsupervised clustering and resource-efficient client selection. Each client encodes its local domain traffic into a semantic latent space using a shared, pre-trained VAE trained solely on benign domains. These embeddings are clustered via affinity propagation to group clients with similar data distributions and identify outliers indicative of novel threats without requiring any labeled DGA samples. Within each cluster, FedSAGE selects only the fastest clients for training, balancing computational constraints with threat visibility. Experimental results from the multi-zones DGA dataset show that FedSAGE improves detection accuracy by up to 11.6% and reduces energy consumption by up to 93.8% compared to standard FedAvg under non-IID conditions. Notably, the latent clustering perfectly recovers ground-truth DGA family zones, enabling effective anomaly detection in a fully unsupervised manner while remaining privacy-preserving. These foundations demonstrate that FedSAGE is a practical and lightweight approach for decentralized detection of evasive malware, offering a viable solution for secure and adaptive defense in resource-constrained edge environments.

Suggested Citation

  • Ma Viet Duc & Pham Minh Dang & Tran Thu Phuong & Truong Duc Truong & Vu Hai & Nguyen Huu Thanh, 2025. "Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection," Future Internet, MDPI, vol. 17(7), pages 1-25, July.
  • Handle: RePEc:gam:jftint:v:17:y:2025:i:7:p:299-:d:1693841
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/17/7/299/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/17/7/299/
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:17:y:2025:i:7:p:299-:d:1693841. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.