IoT malware detection using static and dynamic analysis techniques: A systematic literature review

被引:1
作者
Kumar, Sumit [1 ]
Ahlawat, Prachi [1 ]
Sahni, Jyoti [2 ]
机构
[1] NorthCap Univ, Dept Comp Sci & Engn, Gurugram, India
[2] Victoria Univ Wellington, Sch Engn & Comp Sci, Wellington, New Zealand
关键词
dynamic analysis; IoT devices; IoT malware; IoT malware detection; machine learning; neural networks; static analysis; systematic literature review; THINGS MALWARE; INTERNET; CLASSIFICATION; FRAMEWORK;
D O I
10.1002/spy2.444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is reshaping the world with its potential to support new and evolving applications in areas, such as healthcare, automation, remote monitoring, and so on. This rapid popularity and growth of IoT-based applications coincides with a significant surge in threats and malware attacks on IoT devices. Furthermore, the widespread usage of Linux-based systems in IoT devices makes malware detection a challenging task. Researchers and practitioners have proposed a variety of techniques to address these threats in the IoT ecosystem. Both researchers and practitioners have proposed a range of techniques to counter these threats within the IoT ecosystem. However, despite the multitude of proposed techniques, there remains a notable absence of a comprehensive and systematic review assessing the efficacy of static and dynamic analysis methods in detecting IoT malware. This research work is a systematic literature review (SLR) that aims to offer a concise summary of the latest advancements in the field of IoT malware detection, specifically focusing on the utilization of static and dynamic analytic techniques. The SLR focuses on examining the present status of research, methodology, and trends in the area of IoT malware detection. It accomplishes this by synthesizing the findings from a wide range of scholarly works that have been published in well-regarded academic journals and conferences. Additionally, the SLR highlights the significance of the empirical process that includes the role of selecting datasets, accurate feature selection and the utilization of machine learning algorithms in enhancing the detection accuracy. The study also evaluates the capability of different analysis techniques to detect malware and compares the performance of various models for IoT malware detection. Furthermore, the review concluded by addressing several open issues and challenges that the research community as a whole must address.
引用
收藏
页数:31
相关论文
共 122 条
[1]  
Abomhara M., 2015, Journal of Cyber Security and Mobility, P65, DOI DOI 10.13052/JCSM2245-1439.414
[2]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[3]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[4]   Detecting A Crypto-mining Malware By Deep Learning Analysis [J].
Aljehani, Shahad ;
Alsuwat, Hatim .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06) :172-180
[5]   Graph-based malware detection using dynamic analysis [J].
Anderson, Blake ;
Quist, Daniel ;
Neil, Joshua ;
Storlie, Curtis ;
Lane, Terran .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04) :247-258
[6]  
Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
[7]  
[Anonymous], 2011, PROC 8 INT S VISUAL, DOI DOI 10.1145/2016904.2016908
[8]  
[Anonymous], 2023, HEIGHTENED DDOS THRE
[9]  
[Anonymous], 2018, Secur Commun Netw
[10]  
[Anonymous], 2023, LOOK EXAMPLES IOT DE